A cyber attack against an Illinois water utility illustrates the weaknesses in our SCADA networks A water utility in Illinois was reportedly hacked in a cyber attack traced back to Russia. The motives arent clear, but the act alone demonstrates how vulnerable our SCADA (Supervisory Control and Data Acquisition) networks are, and the potential risks posed to the critical infrastructure of the United States.The FBI and DHS are investigating the incident. Attackers were able to obtain login credentials from a company that makes the software used to control industrial systems like the Illinois water pump, and remotely shut it down. The attackers reportedly enabled and disabled the pump repeatedly, eventually damaging it.This instance is more a nuisance than a real threat, but attacks against SCADA systems can have grave consequences. SCADA systems are specialized control devices used to monitor, manage, and maintain chemical plants, natural gas pipelines, dams, railroad switches, nuclear power facilities, and water treatment plants like the one hacked in Illinois. The potential for endangering lives with a compromised SCADA network is very serious.Dave Marcus, Director of Security Research for McAfee Labs, examines the issue of SCADA vulnerabilities in a recent blog post. Marcus says that the two main questions regarding SCADA security are How easy is it to attack SCADA networks? and Are we going to see more of these types of attacks? Attacking a SCADA system is not really any different than attacking any other system or network. It requires specific knowledge related to the SCADA devices being targeted, and enough time and dedication to develop a successful attack.In answer to the second question, though, Marcus points out that it seems fair to assume attackers will continue to attack SCADA networks. Attackers tend to focus on low-hanging fruit–systems that take the least effort to compromise while yielding the most impact possible. Depending on the motives of the attack, it is hard to imagine a more attractive target than a SCADA network. Marcus goes on, however, to address an even more important question: how do we know theyre not already under attack or compromised?The reason this is a concern is that SCADA networks lack the kinds of perimeter and host defense that are typically found protecting standard computer networks. Organizations that maintain SCADA networks dont have the tools or capabilities to detect cyber intrusions, or the skills to properly investigate suspected cyber attacks.With the stakes so high, it is important for SCADA networks to ramp up awareness and defensive capabilities. Marcus recommends that SCADA admins do the following:Include cyber in all risk managementSet up extensive penetration testingSet up extensive counter-social engineering trainingPut a SCADA-specific CERT plan and team in placeNetwork with law enforcement at all levelsExpect to get attacked and take appropriate countermeasuresSCADA networks are exposed and vulnerable, and represent targets of significant value–especially for terrorists, or politically-motivated attacks. It is time to start doing more to defend them. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe