Three members of Congress have asked the U.S. Justice Department to investigate how foreign hackers breached a water authority near Pittsburgh, prompting the nation’s top cyberdefense agency to warn other water and sewage-treatment utilities that they may be vulnerable.
In a letter released Thursday, U.S. Sens. John Fetterman and Bob Casey and U.S. Rep. Chris Deluzio said Americans must know their drinking water and other basic infrastructure is safe from “nation-state adversaries and terrorist organizations.”
“Any attack on our nation’s critical infrastructure is unacceptable,” Fetterman, Casey and Deluzio wrote in their letter to Attorney General Merrick Garland. “If a hack like this can happen here in western Pennsylvania, it can happen anywhere else in the United States.”
The compromised industrial control system was made in Israel, and a photo from the Municipal Water Authority of Aliquippa, Pennsylvania, suggests the “hackivists” deliberately targeted that facility because of the equipment’s link to Israel. The image of the device screen shows a message from the hackers that said: “Every equipment ‘made in Israel’ is Cyber Av3ngers legal target.”
A group using that name used identical language on X, formerly Twitter, and Telegram on Sunday. The group claimed in an Oct. 30 social media post to have hacked 10 water treatment stations in Israel, though it is not clear if they shut down any equipment.
Casey’s office said it was told by U.S. officials that they believe Cyber Av3ngers is indeed behind the attack. The Aliquippa water authority’s chairman, Matthew Mottes, said federal officials told him that hackers also breached four other utilities and an aquarium.
“We’ve been told that we are not the only authority that’s been affected in the country, but we are believed to be the first,” Mottes said in an interview.
Leading cybersecurity companies Check Point Research and Google’s Mandiant have identified Cyber Av3ngers as hacktivists aligned with Iran’s government.
Since the beginning of the Israel-Hamas war, the group has expanded and accelerated targeting Israeli critical infrastructure, said Check Point’s Sergey Shykevich. Iran and Israel were engaged in low-level cyberconflict prior to the Oct. 7 Hamas attack on Israel and cybersecurity experts have said they expected a rise in hacktivism in response to Israel’s attacks in Gaza.
The device breached in Pennsylvania was made by Israel-based Unitronics, according to the U.S. Cybersecurity and Infrastructure Security Agency. Known as a programmable logic controller, it is used across a wide spectrum of industries including water and sewage-treatment utilities, electric companies and oil and gas producers. It regulates processes including pressure, temperature and fluid flow, according to the manufacturer.
Unitronics has not responded to queries about what other facilities with its equipment may have been hacked or could be vulnerable.
Experts say many water utilities have paid insufficient attention to cybersecurity.
In Pennsylvania, the hack prompted the water authority to temporarily halt pumping Saturday in a remote station that regulates water pressure for customers in two nearby towns. Crews took the system offline and switched to manual operation, officials said.
The attack came less than a month after a federal appeals court decision prompted the Environmental Protection Agency to rescind a rule that would have obliged U.S public water systems to include cybersecurity testing in their regular federally mandated audits. The rollback was triggered by a federal appeals court decision in a case brought by Missouri, Arkansas and Iowa, and joined by a water utility trade group.
The Biden administration has been trying to shore up cybersecurity of critical infrastructure — more than 80% of which is privately owned — and has imposed regulations on sectors including electric utilities, gas pipelines and nuclear facilities. But many experts complain that too many vital industries are permitted to self-regulate.
In its warning Tuesday, the U.S. cybersecurity agency said attackers likely breached the Unitronics device “by exploiting cybersecurity weaknesses, including poor password security and exposure to the internet.”
Mottes said he doesn’t know how the device in Aliquippa was hacked, but that he trusted the federal agency’s judgment.
0 Commentaires