Abstract

This study presents a critical review of disclosed, documented, and malicious cybersecurity incidents in the water sector to inform safeguarding efforts against cybersecurity threats. The review is presented within a technical context of industrial control system architectures, attack-defense models, and security solutions. Fifteen incidents were selected and analyzed through a search strategy that included a variety of public information sources ranging from federal investigation reports to scientific papers. For each individual incident, the situation, response, remediation, and lessons learned were compiled and described. The findings of this review indicate an increase in the frequency, diversity, and complexity of cyberthreats to the water sector. Although the emergence of new threats, such as ransomware or cryptojacking, was found, a recurrence of similar vulnerabilities and threats, such as insider threats, was also evident, emphasizing the need for an adaptive, cooperative, and comprehensive approach to water cyberdefense.

Get full access to this article

View all available purchase options and get full access to this article.

Data Availability Statement

No data, models, or code were generated or used during the study.

Acknowledgments

Mohsen Aghashahi and M. Katherine Banks are supported by Qatar National Research Fund (QNRF) under Grant NPRP8-1292-2-548. Riccardo Taormina and Stefano Galelli are supported in part by the National Research Foundation (NRF) of Singapore under its National Cybersecurity R&D Programme (Award no. NRF2014NCR-NCR001-40). Avi Ostfeld is supported by the EU H2020 STOP-IT project (Grant agreement 740610).

References

Ablon, L. 2018. “Data thieves: The motivations of cyber threat actors and their use and monetization of stolen data.” Accessed August 15, 2019. https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf.
Abrams, M., and J. Weiss. 2008. Malicious control system cyber security attack case study–Maroochy Water Services, Australia. McLean, VA: The MITRE Corporation.
Ahmed, C. M., C. Murguia, and J. Ruths. 2017. “Model-based attack detection scheme for smart water distribution networks.” In Proc., 2017 ACM on Asia Conf. on Computer and Communications Security, 101–113. New York: Association for Computing Machinery.
Amin, S., X. Litrico, S. Sastry, and A. M. Bayen. 2013. “Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks.” IEEE Trans. Control Syst. Technol. 21 (5): 1963–1970. https://doi.org/10.1109/TCST.2012.2211873.
Bodeau, D., and R. Graubart. 2013. Cyber resiliency and NIST special publication 800-53 rev. 4 controls. McLean, VA: MITRE Corporation.
Bodeau, D., R. Graubart, and W. Heinbockel. 2013. Characterizing effects on the cyber adversary. McLean, VA: MITRE Corporation.
Caltagirone, S., A. Pendergast, and C. Betz. 2013. Data thieves: The motivations of cyber threat actors and their use and monetization of stolen data. Hanover, MD: Center for Cyber Intelligence Analysis and Threat Research.
Cava, M. D. 2018. “Uber to pay $148 million over undisclosed data breach that ex-CEO paid hackers to keep quiet.” Accessed August 15, 2019. https://www.usatoday.com/story/tech/news/2018/09/26/uber-pay-148-million-over-undisclosed-data-breach-ex-ceo-paid-hackers-keep-quiet/1432335002.
Chandy, S. E., A. Rasekh, Z. A. Barker, and M. E. Shafiee. 2018. “Cyberattack detection using deep generative models with variational inference.” J. Water Resour. Plann. Manage. 145 (2): 04018093. https://doi.org/10.1061/(ASCE)WR.1943-5452.0001007.
Cimpanu, C. 2017. “Fired employee hacks and shuts down smart water readers in five US cities.” Accessed August 15, 2019. https://www.bleepingcomputer.com/news/security/fired-employee-hacks-and-shuts-down-smart-water-readers-in-five-us-cities/.
CIS (Center for Internet Security). 2019. “CIS controls.” Accessed August 15, 2019. https://www.cisecurity.org/controls.
Cuomo, A. 2016. “Statement from Governor Andrew M. Cuomo on cyber attack charges announced by U.S. Attorney General Loretta Lynch and FBI Director James Comey Involving the Bowman Avenue Dam in Westchester County.” Accessed August 15, 2019. https://www.governor.ny.gov/news/statement-governor-andrew-m-cuomo-cyber-attack-charges-announced-us-attorney-general-loretta.
Department of Energy. 2005. “21 steps to improve cyber security of SCADA network.” Accessed August 15, 2019. https://www.hsdl.org/?abstract&did=1826.
Department of Homeland Security. 2012. “Daily open source infrastructure report 27 March 2012.” Accessed February 11, 2020. https://www.dhs.gov/xlibrary/assets/DHS_Daily_Report_2012-03-27.pdf.
Department of Justice. 2017. “Bala Cynwyd man sentenced to prison for hacking computers of public utilities.” Accessed August 15, 2019. https://www.justice.gov/usao-edpa/pr/bala-cynwyd-man-sentenced-prison-hacking-computers-public-utilities.
District Court at Maroochydore. 2002. “Appeal against conviction and sentence proceedings regarding appellant Vitek Boden.” Accessed August 15, 2019. https://archive.sclqld.org.au/qjudgment/2002/QCA02-164.pdf.
Doris, T. 2019. “Why Riviera Beach agreed to pay a $600,000 ransom payment to regain data access… and will it work?” Accessed August 15, 2019. https://www.palmbeachpost.com/news/20190619/why-riviera-beach-agreed-to-pay-600000-ransom-payment-to-regain-data-access-and-will-it-work.
Ferrier, P. 2019. “Cyberattacker demands ransom from Northern Colorado utility.” Accessed August 15, 2019. https://www.coloradoan.com/story/money/2019/03/14/cyberattacker-demands-ransom-colorado-utility/3148951002.
Formby, D., S. Durbha, and R. Beyah. 2017. “Out of control: Ransomware for industrial control systems.” In Proc., RSA Conf. Bedford, MA: RSA Security.
Gallagher, S. 2017. “Some beers, anger at former employer, and root access add up to a year in prison.” Accessed August 15, 2019. https://arstechnica.com/information-technology/2017/06/ex-technician-convicted-of-possibly-drunken-attack-on-smart-water-meter-system.
Government Technology. 2012. “Report: Hacking lands Florida wastewater official in hot water.” Accessed August 15, 2019. https://www.govtech.com/public-safety/Report-Hacking-Lands-Florida-Wastewater-Official-in-Hot-Water.html.
Gray, P. 2018. “When it comes to ransomware demands, just say no.” Symantec. Accessed February 10, 2020. https://www.symantec.com/blogs/feature-stories/when-it-comes-ransomware-demands-just-say-no.
Hassanzadeh, A., and R. Burkett. 2018. “SAMIIT: Spiral attack model in IIOT mapping security alerts to attack life cycle phases.” In Proc., 2018 Int. Symp. for ICS and SCADA Cyber Security Research (ICS-CSR 2018), 11–20. London: British Computer Society.
Hassanzadeh, A., S. Modi, and S. Mulchandani. 2015. “Towards effective security control assignment in the industrial internet of things.” In Proc., 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 795–800. New York: IEEE.
Housh, M., and Z. Ohar. 2018. “Model-based approach for cyber-physical attack detection in water distribution systems.” Water Res. 139 (Aug): 132–143. https://doi.org/10.1016/j.watres.2018.03.039.
Hutchins, E. M., M. J. Cloppert, and R. M. Amin. 2011. “Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains.” In Vol. 1 of Leading issues information warfare security research, 187. Sonning Common, England: Academic Conferences and Publishing International Limited.
ICS-CERT (Industrial Control Systems Cyber Emergency Response Team). 2016a. ICS-CERT monitor: March/April 2016. Washington, DC: US Dept. of Homeland Security.
ICS-CERT (Industrial Control Systems Cyber Emergency Response Team). 2016b. NCCIC/ICS-CERT year in review: FY 2015. Washington, DC: US Dept. of Homeland Security.
ICS-CERT (Industrial Control Systems Cyber Emergency Response Team). 2019. “DHS critical infrastructure cyber community voluntary program.” Accessed August 15, 2019. https://www.cisa.gov/ccubedvp.
International Society of Automation. 2009. Security for industrial automation and control systems. ISA-62443. Durham, NC: International Society of Automation.
Jerome, S. 2017. “Utility cyberattack targets bandwidth, not water.” Accessed August 15, 2019. https://www.wateronline.com/doc/utility-cyberattack-targets-bandwidth-not-water-0001.
Kerner, S. 2018. “Water utility in Europe hit by cryptocurrency malware mining attack.” Accessed August 15, 2019. https://www.eweek.com/security/water-utility-in-europe-hit-by-cryptocurrency-malware-mining-attack.
Krutz, R. L. 2005. Securing SCADA systems. Chichester, UK: Wiley.
Kutner, M. 2016. “Alleged dam hacking raises fears of cyber threats to infrastructure.” Accessed August 15, 2019. https://www.newsweek.com/cyber-attack-rye-dam-iran-441940.
Lach, E. 2016. “Cyber war comes to the suburbs.” Accessed August 15, 2019. https://www.newyorker.com/tech/annals-of-technology/cyber-war-comes-to-the-suburbs.
Laszka, A., W. Abbas, Y. Vorobeychik, and X. Koutsoukos. 2017. “Synergic security for smart water networks: Redundancy, diversity, and hardening.” In Proc., 3rd Int. Workshop on CyberPhysical Systems for Smart Water Networks, 21–24. New York: Association for Computing Machinery.
Lund, P. D., J. Byrne, R. Haas, and D. Flynn, eds. 2019. Advances in energy systems: The large-scale renewable energy integration challenge. New York: Wiley.
Mahairas, A., and P. Beshar. 2018. “A perfect target for cybercriminals.” Accessed August 15, 2019. https://www.nytimes.com/2018/11/19/opinion/water-security-vulnerability-hacking.html.
Martin, A. 2018. “Russian hackers targeted Ukraine’s water supply, security service claims.” Accessed August 15, 2019. https://news.sky.com/story/russian-hackers-targeted-ukraines-water-supply-security-service-claims-11432826.
Mazzei, P. 2019. “Hit by ransomware attack, Florida city agrees to pay hackers $600,000.” Accessed August 15, 2019. https://www.nytimes.com/2019/06/19/us/florida-riviera-beach-hacking-ransom.html.
McGurk, S. P. 2008. Industrial control systems security: Protecting the critical infrastructure. Washington, DC: US Dept. of Homeland Security.
McMillan, R. 2006. “Hackers break into water system network.” Accessed August 15, 2019. https://www.computerworld.com/article/2547938/hackers-break-into-water-system-network.html.
McMillan, R. 2007. “Insider charged with hacking California canal system.” Accessed August 15, 2019. https://www.computerworld.com/article/2540235/insider-charged-with-hacking-california-canal-system.html.
Nakashima, E. 2011. “Water-pump failure in Illinois wasn’t a cyberattack after all.” Accessed August 15, 2019. https://www.washingtonpost.com/world/national-security/water-pump-failure-in-illinois-wasnt-cyberattack-after-all/2011/11/25/gIQACgTewNstory.html.
Newman, L. 2018. “Now cryptojacking threatens critical infrastructure, too.” Accessed August 15, 2019. https://www.wired.com/story/cryptojacking-critical-infrastructure.
NIST. 2012. Computer security incident handling guide. Washington, DC: NIST.
O’Donnell, L. 2019. “Post-ransomware attack, Florida city pays $600K.” Accessed August 15, 2019. https://threatpost.com/ransomware-florida-city-pays-600k-ransom/145869.
ONWASA (Onslow Water and Sewer Authority). 2018. “Cyber-criminals target critical utility in hurricane-ravaged area.” Accessed August 15, 2019. https://www.onwasa.com/DocumentCenter/View/3701/Scan-from-2018-10-15-08_08_13-A.
Parish, J. 2011. “Illinois water plant ‘hack’ was denied by FBI and DHS and later proved a false alarm.” Accessed August 15, 2019. https://www.theverge.com/2011/12/1/2604353/illinois-water-plant-hack-was-denied-by-fbi-and-dhs-and-later-proved.
Radiflow. 2018. “Detection of a crypto-mining malware attack at a water utility.” Accessed August 15, 2019. https://radiflow.com/case-studies/detection-of-a-crypto-mining-malware-attack-at-a-water-utility.
Ramotsoela, D. T., G. P. Hancke, and A. M. Abu-Mahfouz. 2019. “Attack detection in water distribution systems using machine learning.” Hum. Centric Comput. Inf. Sci. 9 (1): 13. https://doi.org/10.1186/s13673-019-0175-8.
Rasekh, A., A. Hassanzadeh, S. Mulchandani, S. Modi, and M. K. Banks. 2016. “Smart water networks and cyber security.” J. Water Resour. Plann. Manage. 142 (7): 01816004. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000646.
RISI (Repository of Industrial Security Incidents). 2019. “The Repository of Industrial Security Incidents.” Accessed August 15, 2019. https://www.risidata.com.
Rubin, G. T. 2019. “Many company hacks go undisclosed to SEC despite regulator efforts.” Accessed August 15, 2019. https://www.wsj.com/articles/many-company-hacks-go-undisclosed-to-sec-despite-regulator-efforts-11551218919.
Sayfayn, N., and S. Madnick. 2017. Cybersafety analysis of the Maroochy Shire sewage spill, working paper cisl# 2017-09. Cambridge, MA: Cybersecurity Interdisciplinary Systems Laboratory, Sloan School of Management, Massachusetts Institute of Technology.
Sobczak, B. 2019. “Hackers force water utilities to sink or swim.” Accessed August 15, 2019. https://www.eenews.net/stories/1060131769.
SWAN Forum Interoperability Workgroup. 2016. “Communication in smart water networks.” Accessed August 15, 2019. https://pdfs.semanticscholar.org/1aa7/59b64a0cf62364438f19648c57c64c5d4632.pdf.
Taormina, R., et al. 2018. “Battle of the attack detection algorithms: Disclosing cyber attacks on water distribution networks.” J. Water Resour. Plann. Manage. 144 (8): 04018048. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000969.
Taormina, R., and S. Galelli. 2018. “Deep-learning approach to the detection and localization of cyber-physical attacks on water distribution systems.” J. Water Resour. Plann. Manage. 144 (10): 04018065. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000983.
Taormina, R., S. Galelli, N. O. Tippenhauer, E. Salomons, and A. Ostfeld. 2017. “Characterizing cyber-physical attacks on water distribution systems.” J. Water Resour. Plann. Manage. 143 (5): 04017009. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000749.
USEPA. 2008. Cyber security 101 for water utilities. Washington, DC: USEPA.
USEPA. 2019a. Information about public water systems. Washington, DC: USEPA.
USEPA. 2019b. Water sector cybersecurity brief for states. Washington, DC: USEPA.
Vaas, L. 2017. “Beer + bitter former field engineer = hacked smart water meters.” Accessed August 15, 2019. https://nakedsecurity.sophos.com/2017/06/28/beer-bitter-former-field-engineer-hacked-smart-water-meters.
Verizon. 2016. “Data breach digest. Scenarios from the field.” Accessed August 15, 2019. https://enterprise.verizon.com/resources/reports/2016/data-breach-digest.pdf.
Walton, B. 2016. “Water sector prepares for cyberattacks.” Accessed August 15, 2019. https://www.circleofblue.org/2016/world/water-sector-prepares-cyberattacks.
Walton, B. 2017. “Water utility cyberattack rings up hefty data charges.” Accessed August 15, 2019. https://www.circleofblue.org/2017/water-management/water-utility-cyberattack-rings-hefty-data-charges.
WaterISAC (Water Information Sharing and Analysis Center). 2015. 10 basic cybersecurity measures: Best practices to reduce exploitable weaknesses and attacks. Washington, DC: WaterISAC.
Weiss, J. 2010. Protecting industrial control systems from electronic threats. New York: Momentum Press.
White House. 2013. “Presidential policy directive—Critical infrastructure security and resilience.” Accessed August 15, 2019. https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil.
White House. 2017. “Presidential executive order on strengthening the cybersecurity of federal networks and critical infrastructure.” Accessed August 15, 2019. https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure.
Willson, N. 2013. “Defensible security posture.” Accessed August 15, 2019. https://nigesecurityguy.wordpress.com/2013/06/04/defensible-security-posture.
Zetter, K. 2011. “H(ackers)2O: Attack on city water station destroys pump.” Accessed August 15, 2019. https://www.wired.com/2011/11/hackers-destroy-water-pump.

Information & Authors

Information

Published In

Go to Journal of Environmental Engineering
Journal of Environmental Engineering
Volume 146Issue 5May 2020

History

Published online: Feb 28, 2020
Published in print: May 1, 2020
Discussion open until: Jul 28, 2020

Permissions

Request permissions for this article.

Authors

Affiliations

Amin Hassanzadeh, Ph.D. [email protected]
R&D Principal, Accenture Labs, Cyber Fusion Center, 800 North Glebe Rd., Arlington, VA. Email: [email protected]
Industry Advisor, Zachry Dept. of Civil Engineering, Texas A&M Univ., 400 Bizzell St., College Station, TX 77843 (corresponding author). ORCID: https://orcid.org/0000-0003-3102-0525. Email: [email protected]
Stefano Galelli, Ph.D., M.ASCE https://orcid.org/0000-0003-2316-3243
Assistant Professor, Pillar of Engineering Systems and Design, Singapore Univ. of Technology and Design, 8 Somapah Rd., Singapore 487372. ORCID: https://orcid.org/0000-0003-2316-3243
Mohsen Aghashahi, S.M.ASCE
Doctoral Student, Zachry Dept. of Civil Engineering, Texas A&M Univ., 400 Bizzell St., College Station, TX 77843.
Riccardo Taormina, Ph.D.
Assistant Professor, Faculty of Civil Engineering and Geosciences, Dept. of Water Management, Delft Univ. of Technology, Stevinweg 1, 2628 CN Delft, Netherlands.
Avi Ostfeld, Ph.D., F.ASCE
Professor, Faculty of Civil and Environmental Engineering, Technion–Israel Institute of Technology, Haifa 32000, Israel.
M. Katherine Banks, Ph.D., F.ASCE
Professor, College of Engineering, Texas A&M Univ., 400 Bizzell St., College Station, TX 77843.

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share