![]() ![]() An employee allegedly clicked on a malicious email attachment. In the state of Michigan, the Lansing Board of Water & Light (BWL) fell victim to a ransomware attack. He then added that former employees could still have keys or passes they did not know about.Ī public provider in Michigan (USA) in 2016 When asked about the potential perpetrators, the station’s General Manager said that the employees’ vehicles were tracked and none of them were near the station at the time of the attack. They then changed the fluorine and chlorine settings, leading the management company to advise the 400 residents not to use the tap water for a few days. No doors or windows were broken into, the attackers are thought to have got into the station over the barbed wire before gaining access to the monitoring system. In April 2013, the drinking water facility of a small town in North Georgia was subjected to a physical attack. This former supervisor, who was responsible for the company’s IT systems, still had on-site access rights.Ī drinking water plant in Georgia (USA) in 2013 An installation that damaged the computer, part of the SCADA system. In the summer of 2007, a former employee of a small California canal system (Tehama Colusa Canal Authority in Willows) was charged with installing unauthorised software on a computer used to divert water from the Sacramento River for irrigation purposes. An attack that highlights the vulnerability of the world of water to cyber threats.Ī canal system in California (USA) in 2007 Before succeeding, the individual is thought to have carried out no fewer than 46 attempts to hack the factory’s information systems, without ever being detected. One of the pumps then stopped working, causing wastewater to be discharged into the seabed, poisoning local flora and fauna, and creating foul odours in the surrounding area. After his application for employment was rejected, he allegedly hijacked the activity of several pumps by sending spurious commands. A look back at the major attacks of recent years.Ī wastewater treatment plant in the Shire of Maroochy (Australia) in 2000ĭuring March and April 2000, a former technical contractor of the Maroochy sewage treatment plant in Australia took control of the plant’s systems for malicious purposes. However, one thing is certain: damaging the information systems of these infrastructures can have dramatic, wide-reaching consequences. And not all countries seem to be equal when it comes to the rise of this criminal trend, in a context of revenge of former employees or geopolitical issues. Cyber criminals have a thousand reasons for wanting to attack water. A weapon of destabilisation between countries, public health.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |