{"id":39555,"date":"2021-02-12T17:15:00","date_gmt":"2021-02-12T17:15:00","guid":{"rendered":"https:\/\/www.darkreading.com\/attacks-breaches\/water-utility-hack-could-inspire-more-intruders\/d\/d-id\/1340163"},"modified":"2021-02-12T17:15:00","modified_gmt":"2021-02-12T17:15:00","slug":"water-utility-hack-could-inspire-more-intruders","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/","title":{"rendered":"Water Utility Hack Could Inspire More Intruders"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<header><\/header>\n<p><span class=\"strong black\">If past cyberattacks are any indication, success begets imitation. In the wake of last week&#8217;s hack of Florida water utility, other water utilities and users of remote desktop software would be wise to shore up defenses, experts say.<\/span><\/p>\n<p class>The attack on the water treatment system in the small town of Oldsmar, Fla., lacked technical sophistication, showed no insider knowledge of the system, and had all the hallmarks of a hacker joyride through a critical system.<\/p>\n<p>Yet the fact that an unsophisticated attacker compromised a system, changed the chemical mix for treating the water, and could have potentially harmed people will likely have a ripple effect and attract more attackers to test the cybersecurity of municipal water systems, says Padraic O&#8217;Reilly, co-founder and chief of product for CyberSaint, an IT risk management firm.<\/p>\n<p>&#8220;We don&#8217;t care whether it is a joy ride or not because now people know it&#8217;s possible,&#8221; he says. &#8220;It does not matter whether it&#8217;s a nation-state, because that is just guessing at this point. But what you are signaling to bad actors is that this is possible and maybe too easy to do.&#8221;<\/p>\n<p>Cyberattackers tend to go where there are demonstrated vulnerabilities, researchers say. In 2017, for example, independent research groups identified significant vulnerabilities in the Intel processor, <a href=\"https:\/\/www.darkreading.com\/analytics\/google-research-no-simple-fix-for-spectre-class-vulnerabilities\/d\/d-id\/1333911\" target=\"_blank\" rel=\"noopener noreferrer\">dubbed Meltdown and Spectre<\/a>. Over the next two years, researchers found <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/new-spectre-variants-add-to-vulnerability-worries\/d\/d-id\/1331873\" target=\"_blank\" rel=\"noopener noreferrer\">numerous<\/a> <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/newly-found-spectre-variants-bring-new-concerns\/d\/d-id\/1332280\" target=\"_blank\" rel=\"noopener noreferrer\">variations<\/a> of the vulnerability class in processors from Intel and other chipmakers.<\/p>\n<p>Previous attack trends have also demonstrated a link between successful exploitation of vulnerabilities and attacker interest. Vulnerabilities in OpenSSL server software \u2014&nbsp;<a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/heartbleed-examining-the-impact-\/d\/d-id\/1204330\" target=\"_blank\" rel=\"noopener noreferrer\">commonly known as Heartbleed<\/a>&nbsp;\u2014 led to widespread scanning for vulnerable systems and attacks. In addition, specific attacks \u2014 such as <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/10-years-since-stuxnet-is-your-operational-technology-safe-\/a\/d-id\/1338995\" target=\"_blank\" rel=\"noopener noreferrer\">the US-Israeli Stuxnet attack on Iran&#8217;s uranium processing capability<\/a>&nbsp;\u2014 arguably led to an escalation in nation-state-level cyber operations.<\/p>\n<p>The water utility sector, which includes facilities that treat drinking water or process waste water, or both, has taken the threat seriously but does have work to do, says Michael Arceneaux, managing director of the WaterISAC, an information sharing and analysis center (ISAC) for such water utilities.<\/p>\n<p>&#8220;Cybersecurity has been a concern over the last several years for the sector, and we have a number of resources, but there is room for improvement and for more resources for systems that are underfunded,&#8221; he says.<\/p>\n<p>On Thursday, the Cybersecurity and Infrastructure Security Agency (CISA), which is part of the US Department of Homeland Security, issued an alert with new details <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/florida-water-utility-hack-highlights-risks-to-critical-infrastructure\/d\/d-id\/1340112\" target=\"_blank\" rel=\"noopener noreferrer\">about the compromise<\/a>. The intrusion is being investigated by the Pinellas County Sheriff Office (PCSO), US Secret Service (USSS), and FBI.<\/p>\n<p>The alert notes that multiple government agencies &#8220;have observed cyber criminals targeting and exploiting desktop sharing software and computer networks running operating systems with end of life status to gain unauthorized access to systems.&#8221; The advisory singles out the use of both remote desktop software, such as TeamViewer and Microsoft&#8217;s RDP, and end-of-life operating systems, such as Windows 7, as dangerous.<\/p>\n<p>In both cases, attackers can use insecure installations of both remote desktop software and older operating systems to stealthily compromise networks.<\/p>\n<p>&#8220;Beyond its legitimate uses, TeamViewer allows cyber actors to exercise remote control over computer systems and drop files onto victim computers, making it functionally similar to Remote Access Trojans (RATs),&#8221; <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-042a\" target=\"_blank\" rel=\"noopener noreferrer\">the alert states<\/a>. &#8220;TeamViewer&#8217;s legitimate use, however, makes anomalous activity less suspicious to end users and system administrators compared to RATs.&#8221;<\/p>\n<p>While the Oldsmar water treatment plant intruders&nbsp;successfully gained access, they did not \u2014 and likely did not have the knowledge to \u2014 evade the operator&#8217;s visibility into plant operations or dodge the redundant checks on the water&#8217;s chemical composition. However, a more sophisticated intruder quite possibly could take such actions, stated Joe Slowik, senior security researchers at network security firm DomainTools, <a href=\"https:\/\/www.domaintools.com\/resources\/blog\/visibility-monitoring-and-critical-infrastructure-security\" target=\"_blank\" rel=\"noopener noreferrer\">in an analysis<\/a>.&nbsp;<\/p>\n<p>Compared to the US-Israeli Stuxnet operation, two Russian attacks on the Ukraine&#8217;s power network, and an attack on a petrochemical plant in Saudi Arabia \u2014 by Iran, security experts say \u2014 the Oldsmar intrusion lacked the capability to impair visibility into the actions being taken, he said.<\/p>\n<p>&#8220;Had the unknown entity spoofed or otherwise interfered with HMI [human-machine interface] display parameters or sensor data, the operator on duty would be less likely to notice the incident as it took place, resulting in an attack moving on to engineering and process controls for potential mitigation or detection,&#8221; Slowik said. &#8220;Not only did the intruder fail to limit or manipulate process view in the environment, they executed the event during primary working hours on a weekday, almost ensuring that such activity would be quickly noticed\u2014and mitigated.&#8221;<\/p>\n<p>For water utilities, then, focusing on improving redundancy and network visibility should be a priority. Yet the lack of funding for municipal and local water treatment facilities often means cybersecurity is an afterthought. The &#8220;austere cybersecurity profile&#8221; of using outdated operating systems, failing to implement best practices, and a budget that fails to keep cybersecurity up-to-date is common for public-sector organizations, threat intelligence firm Intel471 <a href=\"https:\/\/intel471.com\/blog\/scada-oldsmar-florida-water-treatment-plant-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">stated in a blog post<\/a>.<\/p>\n<p>&#8220;The actors in the cybercriminal underground understand that profile fits thousands of enterprises around the world, which gives them a rich target to set their [sights] on,&#8221; the company said.<\/p>\n<p><span class=\"italic\">Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT&#8217;s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=1161\">View Full Bio<\/a><\/span><\/p>\n<p><strong>Recommended Reading:<\/strong><\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/water-utility-hack-could-inspire-more-intruders\/d\/d-id\/1340163?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If past cyberattacks are any indication, success begets imitation. In the wake of last week&#8217;s hack of Florida water utility, other water utilities and users of remote desktop software would be wise to shore up defenses, experts say. Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/water-utility-hack-could-inspire-more-intruders\/d\/d-id\/1340163?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-39555","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Water Utility Hack Could Inspire More Intruders 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Water Utility Hack Could Inspire More Intruders 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-12T17:15:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Water Utility Hack Could Inspire More Intruders\",\"datePublished\":\"2021-02-12T17:15:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/\"},\"wordCount\":922,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/dr_staff_125x125.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/\",\"name\":\"Water Utility Hack Could Inspire More Intruders 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/dr_staff_125x125.jpg\",\"datePublished\":\"2021-02-12T17:15:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/#primaryimage\",\"url\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/dr_staff_125x125.jpg\",\"contentUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/dr_staff_125x125.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/water-utility-hack-could-inspire-more-intruders\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Water Utility Hack Could Inspire More Intruders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Water Utility Hack Could Inspire More Intruders 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/","og_locale":"en_US","og_type":"article","og_title":"Water Utility Hack Could Inspire More Intruders 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-02-12T17:15:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Water Utility Hack Could Inspire More Intruders","datePublished":"2021-02-12T17:15:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/"},"wordCount":922,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/","url":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/","name":"Water Utility Hack Could Inspire More Intruders 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","datePublished":"2021-02-12T17:15:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/#primaryimage","url":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","contentUrl":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/water-utility-hack-could-inspire-more-intruders\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Water Utility Hack Could Inspire More Intruders"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39555"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39555\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}