{"id":51437,"date":"2023-04-12T16:19:45","date_gmt":"2023-04-12T16:19:45","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34517\/Much-Hyped-Water-Plant-Hack-Wasnt-A-Hack-Just-User-Error.html"},"modified":"2023-04-12T16:19:45","modified_gmt":"2023-04-12T16:19:45","slug":"much-hyped-water-plant-hack-wasnt-a-hack-just-user-error","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/","title":{"rendered":"Much-Hyped Water Plant Hack Wasn&#8217;t A Hack, Just User Error"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/articles\/6436c8505759069ba95c86cb\/lede\/1681311825098-screen-shot-2023-04-12-at-80328-am.png?image-resize-opts=Y3JvcD0wLjk3NDg1MTM5NDYwNDQ4MXh3OjF4aDtjZW50ZXIsY2VudGVyJnJlc2l6ZT0xMjAwOiomcmVzaXplPTEyMDA6Kg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30.709779179811\"><\/p>\n<p>The most highly publicized hack of a town\u2019s public water infrastructure, and one that seemingly showed the cybersecurity risks of America\u2019s water supply, <a href=\"https:\/\/www.vice.com\/en\/article\/88ab33\/hacker-poison-florida-water-pinellas-county\"><span>wasn\u2019t a hack at all<\/span><\/a>. The FBI determined that a 2021 security incident that changed the settings of Oldsmar, Florida\u2019s water supply wasn\u2019t a hack at all. <\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>A former top city official now says it was user error, and the FBI says it has found no evidence of a hack.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"40\"><\/p>\n<p>At the time, Pinellas County Sheriff Bob Gualtieri held a press conference where he claimed that a &#8220;The hacker changed the sodium hydroxide from about one hundred parts per million, to 11,100 parts per million,&#8221; in the town\u2019s water supply, \u201cnoting that these were \u201cdangerous&#8221; levels of the chemical. When asked if this should be considered an attempt at bioterrorism, Gualtieri said, &#8220;What it is is someone hacked into the system not just once but twice &#8230; opened the program and changed the levels from 100 to 11,100 parts per million with a caustic substance. So, you label it however you want, those are the facts.&#8221;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30.028037383178\"><\/p>\n<p>Now, more than two years later, Al Braithwaite, the city manager at the time, is calling it a \u201c<a href=\"https:\/\/www.publicadministrationtoday.com\/city-manager\/?open-article-id=23332594&amp;article-title=florida-city-water-cyber-incident-allegedly-caused-by-employee-error&amp;blog-domain=gcn.com&amp;blog-title=gcn\" target=\"_blank\" rel=\"noopener\"><span>nonevent<\/span><\/a>,\u201d according to comments he made at the American Society for Public Administration\u2019s <a href=\"https:\/\/www.aspanet.org\/Conference2023\/Conference2023\/Concurrent-Sessions\/Panel-Sessions.aspx?hkey=163db869-f572-4947-8a54-aaf7ff1c20c7\" target=\"_blank\" rel=\"noopener\"><span>annual conference<\/span><\/a>.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30.897810218978\"><\/p>\n<p>\u201cThe FBI concluded there was nothing, no evidence of any access from the outside, and that it was likely the same employee that was purported to be a hero for catching it, was actually banging on his keyboard,\u201d Braithwaite said, according to a <a href=\"https:\/\/www.publicadministrationtoday.com\/city-manager\/?open-article-id=23332594&amp;article-title=florida-city-water-cyber-incident-allegedly-caused-by-employee-error&amp;blog-domain=gcn.com&amp;blog-title=gcn\" target=\"_blank\" rel=\"noopener\"><span>writeup by the conference<\/span><\/a>.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p>The conference has not yet uploaded audio or video of Braithwaite\u2019s comments.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29.542319749216\"><\/p>\n<p>The FBI told the <em><a href=\"https:\/\/www.tampabay.com\/news\/pinellas\/2023\/04\/11\/oldsmar-cyberattack-water-supply-poisoning-fbi-update\/\" target=\"_blank\" rel=\"noopener\"><span>Tampa Bay Times<\/span><\/a> <\/em>that it has no evidence that this was a cyber attack: \u201cThrough the course of the investigation the FBI was not able to confirm that this incident was initiated by a targeted cyber intrusion of Oldsmar,\u201d the FBI told the <em>Times<\/em>. \u201cWe have no further comment beyond this statement.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>This apparent \u201cnon event\u201d is notable because the supposed hack against Oldsmar has been considered one of the more significant cybersecurity events affecting an American town. It is often used as an example by cybersecurity experts of the risks that hackers pose to critical infrastructure, and the tangible affect that hackers may have on the physical world.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>We still don\u2019t have full details of what happened in this case, but it still highlights the vulnerability of software-controlled water systems that can be accessed remotely. At the time, the city said that a hacker remotely accessed the software controls that affected the chemical levels of the system.<\/p>\n<p><\/span>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34517\/Much-Hyped-Water-Plant-Hack-Wasnt-A-Hack-Just-User-Error.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51438,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5158],"class_list":["post-51437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusafbi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Much-Hyped Water Plant Hack Wasn&#039;t A Hack, Just User Error 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Much-Hyped Water Plant Hack Wasn&#039;t A Hack, Just User Error 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-12T16:19:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/video-images.vice.com\/articles\/6436c8505759069ba95c86cb\/lede\/1681311825098-screen-shot-2023-04-12-at-80328-am.png?image-resize-opts=Y3JvcD0wLjk3NDg1MTM5NDYwNDQ4MXh3OjF4aDtjZW50ZXIsY2VudGVyJnJlc2l6ZT0xMjAwOiomcmVzaXplPTEyMDA6Kg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Much-Hyped Water Plant Hack Wasn&#8217;t A Hack, Just User Error\",\"datePublished\":\"2023-04-12T16:19:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\\\/\"},\"wordCount\":455,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error.jpg\",\"keywords\":[\"headline,government,usa,fbi\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\\\/\",\"name\":\"Much-Hyped Water Plant Hack Wasn't A Hack, Just User Error 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error.jpg\",\"datePublished\":\"2023-04-12T16:19:45+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,fbi\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusafbi\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Much-Hyped Water Plant Hack Wasn&#8217;t A Hack, Just User Error\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Much-Hyped Water Plant Hack Wasn't A Hack, Just User Error 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/","og_locale":"en_US","og_type":"article","og_title":"Much-Hyped Water Plant Hack Wasn't A Hack, Just User Error 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-12T16:19:45+00:00","og_image":[{"url":"https:\/\/video-images.vice.com\/articles\/6436c8505759069ba95c86cb\/lede\/1681311825098-screen-shot-2023-04-12-at-80328-am.png?image-resize-opts=Y3JvcD0wLjk3NDg1MTM5NDYwNDQ4MXh3OjF4aDtjZW50ZXIsY2VudGVyJnJlc2l6ZT0xMjAwOiomcmVzaXplPTEyMDA6Kg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Much-Hyped Water Plant Hack Wasn&#8217;t A Hack, Just User Error","datePublished":"2023-04-12T16:19:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/"},"wordCount":455,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error.jpg","keywords":["headline,government,usa,fbi"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/","url":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/","name":"Much-Hyped Water Plant Hack Wasn't A Hack, Just User Error 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error.jpg","datePublished":"2023-04-12T16:19:45+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/much-hyped-water-plant-hack-wasnt-a-hack-just-user-error\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,fbi","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusafbi\/"},{"@type":"ListItem","position":3,"name":"Much-Hyped Water Plant Hack Wasn&#8217;t A Hack, Just User Error"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51437"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51437\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51438"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}