{"id":48091,"date":"2022-08-21T22:00:01","date_gmt":"2022-08-21T22:00:01","guid":{"rendered":"http:\/\/b82d4084-dff6-4825-bfca-7a5084cc1d3a"},"modified":"2022-08-21T22:00:01","modified_gmt":"2022-08-21T22:00:01","slug":"critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/","title":{"rendered":"Critical infrastructure is under attack from hackers. Securing it needs to be a priority &#8211; before it&#8217;s too late"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\/\" alt=\"istock-silly-hacker-hands.jpg\" height=\"800.377358490566\" width=\"1200\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Getty Images\/iStockphoto<\/span><\/figcaption><\/figure>\n<p>Cyber attacks don&#8217;t just affect the virtual world: they can have concerning real-world consequences for everyone, and a recent incident seemingly involving a near miss has demonstrated just how disruptive they can be.<\/p>\n<p>South Staffordshire Water, which provides drinking water for over 1.6 million people in the UK, <a href=\"https:\/\/www.zdnet.com\/article\/confused-cyber-criminals-have-hacked-a-water-company-in-a-bizarre-case-of-mistaken-identity\/\" rel=\"follow\">was hit by what it described as &#8220;a criminal cyber attack&#8221;<\/a> which caused disruption to corporate IT networks.&nbsp;<\/p>\n<p>Crucially, despite claims by the Clop <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-attacks-are-the-biggest-global-cyber-threat-and-still-evolving-warns-cybersecurity-chief\/\" rel=\"follow\">ransomware<\/a> group that they had access to industrial systems that control chemicals in the water, the company said this wasn&#8217;t the case and a government statement said there was no impact on South Staffordshire Water&#8217;s ability to safely supply drinking water.&nbsp;<\/p>\n<p>Clop also claimed that despite gaining access to the network, they didn&#8217;t encrypt any data, citing that they &#8220;do not attack critical infrastructure.&#8221; Nonetheless, the hackers said they stole over 5TB of data and <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-theres-been-a-big-rise-in-double-extortion-attacks-as-gangs-try-out-new-tricks\/\" rel=\"follow\">attempted to extort a ransom payment in return for not releasing it<\/a>.&nbsp;<\/p>\n<p>It&#8217;s still unclear how the situation was resolved, but the attack raises a worrying question: what would&#8217;ve happened if cyber criminals had managed to encrypt the networks that control water supplies?&nbsp;<\/p>\n<p>For starters, it&#8217;s a particularly bad time for something like this to happen: dought has been declared in many areas of the UK following months of heatwaves, and a restriction to the water supply could&#8217;ve made things much worse.&nbsp;<\/p>\n<p><strong><strong>SEE:&nbsp;<\/strong><a href=\"http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/#link=%7B%22role%22:%22standard%22,%22href%22:%22http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3EA%20winning%20strategy%20for%20cybersecurity%3C\/strong%3E%22%7D\" rel=\"follow\"><strong>A winning strategy for cybersecurity<\/strong><\/a><strong>&nbsp;(ZDNET special report)<\/strong><\/strong><\/p>\n<p>Then there&#8217;s the prospect of what might have happened if cyber criminals really were able to change the chemical balance of the water. In this case, it&#8217;s unclear if they would&#8217;ve had the power to do so \u2013 but it&#8217;s not a theoretical form of cyber attack, because hackers have already demonstrated they can do this.<\/p>\n<p>One such infamous case of this took place at a water treatment plant in <a href=\"https:\/\/www.zdnet.com\/article\/what-hacking-attacks-can-teach-us-about-defending-networks\/\" rel=\"follow\">in Florida last year, when an unidentified hacker was able to tamper with chemical levels<\/a> in the water supply to the extent it would&#8217;ve been poisonous to drink. Thankfully, the incident was caught before any contaminated water left the plant \u2013 but the consequences could&#8217;ve been dire.&nbsp;<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/attacks-against-industrial-networks-will-become-a-bigger-problem-we-need-to-fix-security-now\/\" rel=\"follow\">Critical infrastructure is often vulnerable to cyber attacks and cyber criminals know it<\/a>. Just look at last year&#8217;s <a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\" rel=\"follow\">Colonial Pipeline ransomware attack<\/a>, an incident that panicked people into rushing to gas stations and attempting to hoard it for themselves: another case of a cyber attack influencing real-world actions.&nbsp;<\/p>\n<p>These networks can be decades old, relying on old operating systems that are unable to receive security updates anymore, making them prime targets. In addition, these networks are <a href=\"https:\/\/www.zdnet.com\/article\/the-industrial-internet-of-things-is-still-big-mess-when-it-comes-to-security\/\" rel=\"follow\">increasingly being connected to Internet of Things devices and sensors<\/a>, which can also leave them vulnerable to attacks.<\/p>\n<p>Pipelines, power grids and water supplies, transport, and even <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-how-the-nhs-learned-the-lessons-of-wannacry-to-protect-hospitals-from-attack\/\" rel=\"follow\">hospitals<\/a> &#8211; all critical infrastructure vital to keep everything running, and therefore all tempting targets for hackers, be they ransomware groups out to make money, or <a href=\"https:\/\/www.zdnet.com\/article\/ukraine-says-it-has-stopped-russian-hackers-who-were-trying-to-attack-its-power-grid\/\" rel=\"follow\">nation-state-backed hacking groups looking to cause disruption<\/a>.<\/p>\n<p>&#8220;We can limit both the likelihood and impact of these threats by: safeguarding our networks, considering the way they are technically structured and who has access to them,&#8221; says <a href=\"https:\/\/www.ncsc.gov.uk\/section\/private-sector-cni\/cni\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">advice from the National Cyber Security Centre<\/a> (NCSC) which warns that an attack could result in &#8220;major detrimental impact on the availability, delivery or integrity of essential services, leading to severe economic or social consequences or to loss of life.&#8221; order to protect networks \u2013 and people \u2013 from the consequences of attacks, which could be significant.&nbsp; <\/p>\n<p><strong><strong>SEE:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/attacks-on-critical-infrastructure-are-dangerous-soon-they-could-turn-deadly-warns-analyst\/\" rel=\"follow\"><strong>Attacks on critical infrastructure are dangerous. Soon they could turn deadly, warn analysts<\/strong><\/a><\/strong><\/p>\n<p>Many of the recommended security measures are among the most commonly recommended and often simplest practices in place, like ensuring that <a href=\"https:\/\/www.zdnet.com\/article\/dont-use-these-passwords-these-are-the-most-popular-log-in-details-found-for-sale-online\/\" rel=\"follow\">default or easy-to-guess passwords<\/a> aren&#8217;t being used to secure networks and that <a href=\"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/\" rel=\"follow\">multi-factor authentication<\/a> (MFA) is applied, particularly to critical systems. For critical infrastructure and other organisations, actions like this can help protect against most attacks.&nbsp;<\/p>\n<p>Cybersecurity can become more complex for critical infrastructure, particularly when dealing with older systems, which is why it&#8217;s vital that those running them <a href=\"https:\/\/www.zdnet.com\/article\/the-key-to-stopping-cyberattacks-understanding-your-own-systems-before-the-hackers-strike\/\" rel=\"follow\">know their own network<\/a>, what&#8217;s connected to it and who has access. Taking all of this into account, providing access only when necessary can keep networks locked down.<\/p>\n<p>In some cases, that might mean ensuring older systems aren&#8217;t connected to the outside internet at all, but rather on a separate, air-gapped network, preferably offline. It might make some processes more inconvenient to manage, but it&#8217;s better than the alternative should a network be breached.<\/p>\n<p>Incidents like the South Staffordshire Water attack and the Florida water incident show that cyber criminals are targeting critical infrastructure more and more. Action needs to be taken sooner rather than later to prevent potentially disastrous consequences not just for organizations, but for people too.<\/p>\n<h3>ZDNET&#8217;S MONDAY OPENER &nbsp;<\/h3>\n<p><em>ZDNET&#8217;s Monday Opener is our opening take on the week in tech, written by members of our editorial team.&nbsp;<\/em><\/p>\n<h3> PREVIOUSLY ON ZDNET&#8217;S MONDAY OPENER :&nbsp;<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A ransomware gang recently infiltrated a water company, and critical infrastructure providers need to take lessons from it to avoid potentially catastrophic consequences.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48091","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Critical infrastructure is under attack from hackers. Securing it needs to be a priority - before it&#039;s too late 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical infrastructure is under attack from hackers. Securing it needs to be a priority - before it&#039;s too late 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-21T22:00:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Critical infrastructure is under attack from hackers. Securing it needs to be a priority &#8211; before it&#8217;s too late\",\"datePublished\":\"2022-08-21T22:00:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\\\/\"},\"wordCount\":876,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\\\/\",\"name\":\"Critical infrastructure is under attack from hackers. Securing it needs to be a priority - before it's too late 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\\\/\",\"datePublished\":\"2022-08-21T22:00:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical infrastructure is under attack from hackers. Securing it needs to be a priority &#8211; before it&#8217;s too late\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical infrastructure is under attack from hackers. Securing it needs to be a priority - before it's too late 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/","og_locale":"en_US","og_type":"article","og_title":"Critical infrastructure is under attack from hackers. Securing it needs to be a priority - before it's too late 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-21T22:00:01+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Critical infrastructure is under attack from hackers. Securing it needs to be a priority &#8211; before it&#8217;s too late","datePublished":"2022-08-21T22:00:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/"},"wordCount":876,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/","url":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/","name":"Critical infrastructure is under attack from hackers. Securing it needs to be a priority - before it's too late 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\/","datePublished":"2022-08-21T22:00:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\/","contentUrl":"https:\/\/www.zdnet.com\/article\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-before-its-too-late\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Critical infrastructure is under attack from hackers. Securing it needs to be a priority &#8211; before it&#8217;s too late"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48091"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48091\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}