Online attacks like this scenario aren’t hypothetical these days. For example, swift action by an operator at a water utility in 2021 prevented disastrous consequences as an unknown attacker tried to poison the water of a utility’s system by significantly increasing the concentration of sodium hydroxide used to treat acidity. Left unchecked, this attack on a utility’s customers could have led them to ingest high concentrations of a corrosive chemical that could have led to severe pain, vomiting, and internal hemorrhaging.
Community water systems in the United States provide service to more than 286 million people, and ensuring their water is safe, secure, and reliable is a constant challenge. Insufficient budgets, lack of dedicated information technology and cyber staff, limited cyber expertise, inadequate visibility, and ineffective defensive tools can all contribute to potentially catastrophic situations.
Attacks increasingly exploit ransomware, a type of malicious software designed to block access
to a computer system until a sum of money is paid. In the summer of 2021, ransomware criminals hacked a major US water utility serving nearly two million people. Although the utility had backup processes and was able to restore operations, other utilities hit with ransomware may not be so prepared.
Critical infrastructure is a compelling target for attackers. One compromised password prompted the Colonial Pipeline, a US oil pipeline system that originates in Houston, to shut down in the spring of 2021. The pipeline supplies 2.5 million barrels of fuel per day to the eastern United States, and the shutdown resulted in a spike in fuel prices and long lines at service stations. Internationally linked criminals used ransomware to extract 100 gigabytes of data and threatened to leak the data if the ransom wasn’t paid. Colonial paid $4.4 million in return for a decryption tool to unlock its computer systems.
Attackers have several ways to deliver ransomware, but phishing email campaigns are most often used because it is generally easy to deceive people. Despite significant awareness efforts to curb phishing, it only takes one person to click on the wrong link to bring a utility down. But why?
Phishing is a form of social engineering, a broad term used to describe a range of techniques to trick people into giving criminals what they want. According to Verizon’s 2021 Data Breach Investigations Report, 92% of breaches are caused by social engineering. Infamous ex-hacker turned cybersecurity consultant Kevin Mitnick attributes successful social engineering attacks to five traits: greed, curiosity, urgency, helpfulness, and fear.
Cyber criminals exploit human weaknesses, and they know what works. Mental health practitioners also understand what drives human behavior, and among these is the pursuit of wealth. Hackers are keenly aware of this, and thus it’s a frequent theme in phishing attacks. According to phishing mitigation company KnowBe4, LinkedIn phishing messages have dominated the social media category for the past three years, with variations including “people are looking at your profile” or “add me”.
Furthermore, almost one-third (31%) of phishing emails are about password checks. According to a February 2021 article from Infosec, “11 Phishing Email Subject Lines Your Employees Need to Recognize,” the most-clicked general email subject lines include the following:
Beware of Warning Signs
With breach costs often amounting to millions, there is real value in prevention, and user awareness training is a key component in preventing phishing from being successful. Be particularly cautious anytime you see the following indicators:
Phishing is particularly dangerous, yet according to KnowBe4, about 31% of untrained end users fail a phishing test. Even with training programs in place, organizations still often struggle, and phishing click rates currently average 4.7%. Energy and utility organizations range above average, between 4.9% and 5.4%, and government organizations range between 4.2% and 5.8%.
According to Avanan’s 2019 Global Phish Report, one in 99 emails involve phishing. Also, according to data in the aforementioned Verizon report, 36% of breaches start with phishing, and 10% of breaches involve ransomware.
With office workers receiving an estimated 120 emails daily, a small 80-employee organization receives just under 50,000 emails per work week. Even if employees are diligently trained on how to recognize phishing emails and achieve a 5% click rate, the organization may be hit with as many as eight breaches per week and three ransomware attacks per month. Getting attacked with ransomware is no longer academic; it may not happen today or tomorrow, but a cyberattack will happen sometime.
A layered, in-depth cybersecurity defense is needed to counter attacks. It’s particularly important to have identification and response controls to notify a utility that an attack is occurring. Layered defenses and configured controls can lessen an attack’s severity; they may even determine whether a utility continues to operate. There are four vital controls:
Given tight budgets, as well as the complexity of cybersecurity solutions and their costs, utilities need to leverage resources readily available to them. AWWA has developed cybersecurity tools and guidance for this purpose that can be viewed on the association’s Cybersecurity & Guidance webpage. Water ISAC provides current information on the latest threat tactics. Information can also be found through the US Environmental Protection Agency and the Cybersecurity and Infrastructure Security Agency.
Despite the guidance and tools available to utilities, assessing and mitigating cyberthreats requires trained personnel capable of understanding and acting on the information. A reputable, experienced cybersecurity consultant can also help navigate and cost-effectively mitigate cyberthreats.
Originally published in the Journal for American Water Works Association, April 2022.