Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Security

Kansas Water Facility Switches to Manual Operations Following Cyberattack (securityweek.com) 28

A small city in Kansas switched was forced to switch its water treatment facility to manual operations after a suspected cyberattack was discovered on September 22. The precautionary measure was taken "to ensure plant operations remained secure," the city said. It reassured residents that the drinking water is safe and the water supply remains unaffected. SecurityWeek.com reports: Arkansas City says it has notified the relevant authorities of the incident and that they are working with cybersecurity experts to address the issue and return the facility's operations to normal. "Enhanced security measures are currently in place to protect the water supply, and no changes to water quality or service are expected for residents," the city said. While the city's notification does not share further details on the incident, it appears that the water treatment plant might have fallen victim to a ransomware attack. Switching to manual operations suggests that systems were shut down to contain the attack, which is the typical response to incidents involving ransomware.
This discussion has been archived. No new comments can be posted.

Kansas Water Facility Switches to Manual Operations Following Cyberattack

Comments Filter:
  • Good (Score:5, Insightful)

    by PhantomHarlock ( 189617 ) on Tuesday September 24, 2024 @09:15PM (#64814929)

    Good, now leave it that way. By placing critical infrastructure online we've created a lazy way for anyone who doesn't like us to bring us down while sitting in their underwear anywhere in the world.

    Can we all agree at this point there is no such thing as 'secure' when it comes to being connected to the wider internet? Hell, Natanz, which was disconnected from the internet, was *much* harder to sabotage, but they did it. The point is, we should make it that hard for all critical infrastructure. Put it offline and keep it there.

    • Re:Good (Score:5, Insightful)

      by davidwr ( 791652 ) on Tuesday September 24, 2024 @10:44PM (#64815047) Homepage Journal

      Can we all agree at this point there is no such thing as 'secure' when it comes to being connected to the wider internet?

      You can communicate with the wider internet without being on the internet.

      Industrial systems like this can have outbound status/alarm/I'm-still-alive communication with the outside world via a gateway to the internet. While I would discourage inbound communication from the internet there is good reason to have remote-control over an isolated communications network for things like "emergency shutdown" if the equipment is at an unmanned location or you want a backup "go into safe mode" plan in case everyone (or the only person) at the location is simultaneously incapacitated.

    • by will4 ( 7250692 ) on Tuesday September 24, 2024 @11:29PM (#64815113)

      Shouldn't public utilities and critical infrastructure do regular disaster planning a different levels?

      1, Single non-critical system failure
      2. Multiple critical system failures
      3. Internet / network connectivity goes down for 48 hours
      4. Cyberattack, fall back to manual operations

      Some level of those may not be possible, but as far as can be reasonably done there should be planning and actual testing of disaster recovery.

      And, rebooting all the Windows XP machines is specifically excluded from a disaster recovery test

    • "now leave it that way"

      Sure, just get everyone pay the higher taxes so we can staff at these levels all the time instead of on an emergency basis.

      • Nope, the taxes were never lowered when this shit was deployed, so why should they go up when it's removed? People are far cheaper than computers anyway. Because for every business that has a computer, they need an IT guy, and if not, then an IT company. Think of all the money they'll save.

    • It seems to me that they handled this pretty well. When disaster struck, they had a fallback plan and implemented it. That's how DR works. You consider the risks, mitigate them, and then make cost/benefit decisions. If a sports player gets a concussion playing their game of choice, we don't ban all sports. We take the risk into account and work to reduce it, and we keep playing.

      Being connected to the internet has many advantages, including being able to lower costs. Just because an incident occurs, doesn't

    • by tlhIngan ( 30335 )

      Good, now leave it that way. By placing critical infrastructure online we've created a lazy way for anyone who doesn't like us to bring us down while sitting in their underwear anywhere in the world.

      Can we all agree at this point there is no such thing as 'secure' when it comes to being connected to the wider internet? Hell, Natanz, which was disconnected from the internet, was *much* harder to sabotage, but they did it. The point is, we should make it that hard for all critical infrastructure. Put it offli

      • The most insecure part of any computer network is the humans using it. Replacing computers with humans just makes them the hacking target.

        This is the dumbest shit I've ever heard. Come over to my house and hack me, big boy.

  • by Joe_Dragon ( 2206452 ) on Tuesday September 24, 2024 @09:15PM (#64814931)

    our windows XP box with team viewer broke down so now we go manual.

    • You jest but I'll bet that's exactly what this is.
      • Amen to that. Every SCADA water system i've seen has the most awful security and is usually so old it belongs in a museum. Almost.

        How there hasn't been a major incident yet is beyond me.

        • by martin-boundary ( 547041 ) on Wednesday September 25, 2024 @07:40AM (#64815677)
          Major incidents is not what hackers do. It's the exception.

          You should think of hackers as scouts, their job is to explore, find connections and vulnerabilities, test the waters. The point is to make a list of compromised hosts, and to take over the systems just to see if it's possible, to see how to do it, without being too obvious or destructive. Then the hackers leave,and come back a few months later just to check it still works.

          The major incidents are reserved for when the war starts.

  • A small city in Kansas switched was forced to switch its water treatment facility to manual operations

    Where is "Kansas switched" located? I searched for it on a map and I couldn't find anything...

  • Mad as hell (Score:4, Insightful)

    by az-saguaro ( 1231754 ) on Tuesday September 24, 2024 @11:24PM (#64815105)

    In the early computer era, c1950-1980, computers inspired sci-fi books, movies, tv's that explored the upside and the noir cautionary downside, but mostly it was fun, and the overall tenor about computers was one of optimism.

    Circa 1980-2005, the PC age, then the early internet and smartphones brought even more exuberant optimism for the wonderful ways they would change our lives.

    Make no mistake about it, the benefits and upside optimism are real - but they have been overshadowed.

    The negatives and criminal abuse have overtaken the news, and the problems have spiraled beyond comprehension in the past 20 years.
    In the "two to tango" principle of human society, the partner or facilitators of the criminals are the victims. People or organizations buy into or believe the hype of what some software or system can do, for the usual reasons - riding the bandwagon, fomo, the emperor's new clothes, a sucker's born every minute, fomo, a fool and his money are soon parted, fomo - and similar weak minded excuses to switch your enterprise to new computer technologies "just because".

    Sure, many enterprises or systems do indeed need technology, but many worked fine for decades or centuries without computer "help", but they made the switch because "wow, that's cool, we need that too".

    In the same vein of this article, the adjacent Slashdot post on air traffic control systems has this comment by davidwr ( 791652 ):
    https://news.slashdot.org/stor... [slashdot.org]
    Quote:

    Not a problem. My income-tax suite runs just fine on mid-20th-century tech, namely, a ballpoint pen and paper.

    Computerizing systems that can run fine without them brings risks.
    It costs money for services and products from outside, often shady, unvetted, or unreliable vendors.
    It deadens the worker skills who then maintain software instead of machinery, adles their brains and system knowledge.

    Switching to manual operations reduces tech risk.
    It creates local employment.
    It maintains brains and vital skills.

    It seems to me that the three main technological advances of computers in the past 5-10 years are:
    Creeping invasion of privacy and abuse by companies and government.
    Criminal activities and quasi-criminal such as crypto.
    AI

    None of these are hardware or foundational tech achievements, just more effort to use well-established tech for nefarious purposes, sadly ignored by corrupt and dysfunctional "governments" everywhere.

    I suspect - or at least hope - we will start seeing more and more articles like this - small companies, people, municipalities, organizations, etc. fighting back by getting rid of the problem which is the tech.

    For modernists who cannot image life without their cell phones and Facebook and Tinder accounts, this is not a return to a Neolithic lifestyle. It is potentially a return to a more balanced lifestyle when people had, or are taking back, some basic controls and privacy and protection in their lives.

    Enough is enough.
    Like Howard Beale said in the 1976 movie Network, "I'm as mad as hell, and I'm not gonna take this anymore."
    Maybe we are starting to see the start of a new movement.

    Or, maybe people are so brain-adled at this point that they still do not care.
    Interesting times.
    We shall see.

    • by kackle ( 910159 )
      I've been in water for 20 years, have two hardware patents in the field and used to teach state-EPA-certified classes for professional credits for the attendees. This post is spot on.

      And since the incoming kids only know "Ethernet", that's the hammer they swing. Serial data (over wires and radio) were common when I started; despite some of the tradeoffs, one can't really hack "serial" unless he is present locally, and even that would be limited.

      Further, to the IT and desk jockies who think these sy
      • I've been in water for 20 years

        Your skin must be pretty wrinkled by now.
        I have an app for that.

        Seriously though, thanks for the kind words and the additional examples.

        • by kackle ( 910159 )

          Your skin must be pretty wrinkled by now. I have an app for that.

          Does it come with rice to dry out the phone afterward?

  • Nation state sponsored hackers testing the waters so to speak? Practice on the small fish before reeling in the big catch.

    • Nation state sponsored hackers testing the waters so to speak?

      I don't think so.

      Nation states don't put their cards on the table for low stakes.

      Sure, they may learn something from an attack, but the defender will learn far more.

      This was a kid in a basement. Maybe it was Suki [youtube.com].

  • by BrendaEM ( 871664 ) on Wednesday September 25, 2024 @03:04AM (#64815369) Homepage
    This should be a no-brainer: get mission critical infrastructure off of the internet.
    • This should be a no-brainer: get mission critical infrastructure off of the internet.

      WhAAAAt? But that's NOT what Gardner says to do. It's off to "Complete Online AI" for us -- there, we don't have to do anything but watch the glorious computers control our entire physical planet!

      Just THINK of it -- Google Mini and Amazon's Alexa (and now Rufus) existing EVERYWHERE and managing your fridge, cooking your meals, and managing you bank account.

      "Alexa, cook me a steak."
      - "I'm sorry Dave, I can't do that. Your daily subscription fees haven't gone thru yet since your bank account is ne

  • Someone found the internet facing VNC service running on a Windows XP computer and guessed the password (probably "waterwet" or something)...

  • Why would the system not be air gapped from the internet, or was there a physical intrusion ?

Pohl's law: Nothing is so good that somebody, somewhere, will not hate it.

Working...