In late 2024, one of the largest water utilities in the United States announced that it had been targeted in a cyberattack that left some of its systems vulnerable, including billing.
Cybersecurity threats, cyber attacks and what can be done to mitigate them has become a hot topic in the water industry. The threats became so significant that, in 2024, the U.S. Environmental Protection Agency (EPA) released an enforcement alert outlining the urgent cybersecurity threats and vulnerabilities to community water systems and the steps they need to take to mitigate them.
Cybersecurity threats to U.S. water systems
Water systems across the U.S. face a variety of cyber threats, from sabotage to ransomware. Some of the key threats include:
What is pivoting and lateral movement?
In cybersecurity, pivoting and lateral movement are related but distinct concepts that describe how cyber attackers move within a compromised network.
Lateral movement
A lateral movement defines how an attacker moves sideways across a network to access other systems or accounts. The goal of a lateral movement is to escalate privileges, access sensitive data or compromise critical infrastructure.
Examples of lateral movement include:
- Using stolen credentials to log into another server.
- Exploiting shared drives or Remote Desktop Protocol (RDP) to hop to another machine.
Pivoting
Pivoting is a technique used to route traffic through a compromised system to reach other devices that are not directly accessible. The goal of pivoting is to access isolated or segmented parts of a network.
Examples of pivoting include:
- Using tools like SSH or VPN to tunnel traffic.
- Installing a VPN on the compromised host to fully integrate into the network.