Aging US water systems under attack by ransomware

Black android smartphone on top of white book

December 17, 2023 Recent cyberattacks on U.S. water systems, including an incident involving an Iran-linked hacker group targeting a water authority in western Pennsylvania, have heightened federal focus on the cybersecurity vulnerabilities of water utilities. These attacks, which also affected a North Texas water utility with ransomware, did not disrupt water supplies but underscored the urgent need for improved cyber defenses.

Anne Neuberger, Deputy National Security Adviser for Cyber and Emerging Tech, emphasized the importance of these events as a wake-up call for utilities to enhance their cyber hygiene. The U.S. water system consists of about 150,000 individual systems, most of which are small, municipality-run entities with limited resources for cybersecurity staff and training. Many of these systems rely on older infrastructure, complicating upgrades and cloud integration.

Prior to these attacks, the Biden administration faced challenges in regulating cybersecurity in the water sector. An attempt by the Environmental Protection Agency to integrate basic cyber questions into sanitation inspections was withdrawn due to legal challenges.

However, a recent report by Microsoft and the Cyberspace Solarium Commission 2.0 (CSC 2.0) suggests ways forward. It recommends that water sector operators conduct risk assessments, implement multifactor authentication, and utilize available state funds for cybersecurity improvements. Over the next year, initiatives by Microsoft, the Cyber Readiness Institute, and the Foundation for Defense of Democracies will focus on coaching small water utilities in cybersecurity and employee training.

Tom Fanning, Executive Chairman of Southern Company, highlighted the urgency of the situation, urging water utilities to proactively utilize available cyber resources without waiting for new regulations.

Source: Axios

Top Stories

Related Articles

March 13, 2026 Artificial intelligence systems such as ChatGPT consume significantly different amounts of energy depending on the complexity of more...

March 13, 2026 Iran has identified offices and infrastructure linked to major U.S. technology companies as potential targets as tensions more...

March 13, 2026 Google is rolling out a new set of Gemini-powered features across Docs, Sheets, Slides and Drive designed more...

March 13, 2026 Atlassian will cut about 1,600 jobs as the company restructures to increase investment in artificial intelligence and more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn