{"id":479,"date":"2021-02-11T13:50:58","date_gmt":"2021-02-11T13:50:58","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=479"},"modified":"2021-02-11T13:50:58","modified_gmt":"2021-02-11T13:50:58","slug":"lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/","title":{"rendered":"Lye-poisoning attack in Florida shows cybersecurity gaps in water systems"},"content":{"rendered":"<p class=\"\">Oldsmar, Florida, experienced one of the biggest fears in cybersecurity Friday \u2014 hackers looking to poison its water supply.<\/p>\n<p class=\"\">It&#8217;s the kind of breach that has been warned about for years but is rarely seen. Experts say the hack, which was addressed quickly, is a prime example of why the cybersecurity of the U.S. water supply remains one of the greatest risks to the country&#8217;s infrastructure.<\/p>\n<p class=\"\">And like the U.S. election system, it tends to be a sprawling and varied challenge.<\/p>\n<p class=\"\">&#8220;Water facilities are particularly problematic,&#8221; said Suzanne Spaulding, who was the chief cybersecurity official at the Department of Homeland Security during the Obama administration. &#8220;When I first came into DHS and started getting the sector-specific briefings, my team said, &#8216;Here&#8217;s what you&#8217;ve got to know about water facilities: When you&#8217;ve seen one water facility, you&#8217;ve seen one water facility.'&#8221;<\/p>\n<p class=\"\">The U.S.&#8217;s 54,000 or so drinking water systems are run independently, by either local governments or small corporations. That means there are thousands of different security setups, often run by generalists who are responsible for the technology of their particular systems.<\/p>\n<p class=\"\">&#8220;I&#8217;ve been to numerous water treatment facilities where there is one IT person or two IT people,&#8221; said Lesley Carhart, a principal threat analyst at the cybersecurity company Dragos. &#8220;And they have to handle everything from provisioning computers and devices that keep the infrastructure running to trying to do security.<\/p>\n<p class=\"\">&#8220;Most are very conscious of it, but they&#8217;re just drowning,&#8221; she said. &#8220;They don&#8217;t know how to accomplish all the things they&#8217;re required to do to both keep things running from an IT perspective and also fill compliance checkboxes.&#8221;<\/p>\n<p class=\"\">All of Oldsmar&#8217;s cybersecurity services, including the water treatment plant&#8217;s, are managed by one man, City Manager Al Braithwaite, Assistant City Manager Felicia Donnelly said in an email.<\/p>\n<p class=\"\">In the case of the <a href=\"https:\/\/www.nbcnews.com\/tech\/security\/florida-near-miss-cybersecurity-worst-case-scenario-n1257091\">Oldsmar attack<\/a>, all the hackers needed to gain access was to log in to a TeamViewer account, which lets remote users take full control of a computer, that was associated with the plant. That let them open and toy with a program that sets the chemical content for the underground water reservoir that provides the drinking water for nearly 15,000 people. The facility has backup alarms to measure unsafe chemical levels, but the hackers were at least briefly able to order the plant to poison the water.<\/p>\n<p class=\"\">With a few clicks, they told it to raise the levels of lye in the water from 100 to 11,100 parts per million. Anything more than 10,000 can lead to &#8220;difficulty swallowing, nausea\/vomiting, abdominal pain, and potentially even damage to the gastrointestinal tract,&#8221; Dr. Kelly Johnson-Arbor, a medical toxicology physician at the National Capital Poison Center, said in an email.<\/p>\n<p class=\"\">Bryson Bort, a cybersecurity consultant who helped start ICS Village, a nonprofit that raises awareness of cybersecurity for industrial systems, said such a practice \u2014 setting up a computer program to allow users to take control of sensitive industrial systems \u2014 is extremely common in industrial systems that don&#8217;t have the means to employ staffs of experts to be on call at all hours.<\/p>\n<p>Source: NBC News<\/p>\n<p><a href=\"https:\/\/www.nbcnews.com\/tech\/security\/lye-poisoning-attack-florida-shows-cybersecurity-gaps-water-systems-n1257173\">Read the Full Story Here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Oldsmar, Florida, experienced one of the biggest fears in cybersecurity Friday \u2014 hackers looking to poison its water supply. It&#8217;s the kind of breach that has been warned about for years but is rarely seen. Experts say the hack, which was addressed quickly, is a prime example of why the cybersecurity of the U.S. water [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":480,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Lye-poisoning attack in Florida shows cybersecurity gaps in water systems - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lye-poisoning attack in Florida shows cybersecurity gaps in water systems - Community\" \/>\n<meta property=\"og:description\" content=\"Oldsmar, Florida, experienced one of the biggest fears in cybersecurity Friday \u2014 hackers looking to poison its water supply. It&#8217;s the kind of breach that has been warned about for years but is rarely seen. Experts say the hack, which was addressed quickly, is a prime example of why the cybersecurity of the U.S. water [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-11T13:50:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-meir-roth-87383.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/\",\"name\":\"Lye-poisoning attack in Florida shows cybersecurity gaps in water systems - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-meir-roth-87383.jpg\",\"datePublished\":\"2021-02-11T13:50:58+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-meir-roth-87383.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-meir-roth-87383.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lye-poisoning attack in Florida shows cybersecurity gaps in water systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lye-poisoning attack in Florida shows cybersecurity gaps in water systems - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/","og_locale":"en_US","og_type":"article","og_title":"Lye-poisoning attack in Florida shows cybersecurity gaps in water systems - Community","og_description":"Oldsmar, Florida, experienced one of the biggest fears in cybersecurity Friday \u2014 hackers looking to poison its water supply. It&#8217;s the kind of breach that has been warned about for years but is rarely seen. Experts say the hack, which was addressed quickly, is a prime example of why the cybersecurity of the U.S. water [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2021-02-11T13:50:58+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-meir-roth-87383.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/","name":"Lye-poisoning attack in Florida shows cybersecurity gaps in water systems - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-meir-roth-87383.jpg","datePublished":"2021-02-11T13:50:58+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-meir-roth-87383.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-meir-roth-87383.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/lye-poisoning-attack-in-florida-shows-cybersecurity-gaps-in-water-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Lye-poisoning attack in Florida shows cybersecurity gaps in water systems"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=479"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/479\/revisions"}],"predecessor-version":[{"id":481,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/479\/revisions\/481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/480"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}