Nov 13, 2021
0 0

Hackers undetected on Queensland water supplier server for 9 months

Written by

AMD fixes dozens of Windows 10 graphics driver security bugs
Void Balaur hackers-for-hire sell stolen mailboxes and private data
Russian ‘King of Fraud’ sentenced to 10 years for Methbot scheme
Windows 10 App Installer abused in BazarLoader malware attacks
FBI system hacked to email ‘urgent’ warning about fake cyberattacks
Fake end-to-end encrypted chat app distributes Android spyware
Surveillance firm pays $1 million fine after ‘spy van’ scandal
This pre-Black Friday deal lets you create a portable triple-screen setup
Qualys BrowserCheck
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Search Redirect
Remove the Search Redirect
Remove the Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
IT Certification Courses
Gear + Gadgets
water dam
Hackers stayed hidden for nine months on a server holding customer information for a Queensland water supplier, illustrating the need of better cyberdefenses for critical infrastructure.
SunWater is Australian government-owned water supplier responsible for operating 19 major dams, 80 pumping stations, and 1,600 miles long pipelines.
According to the annual financial audit report that was published by the Queensland Audit Office yesterday, SunWater was breached for nine months, with the actors remaining undetected the entire time.
While the report doesn’t name the entity directly, ABC Australia questioned the authority and confirmed it was SunWater.
The breach occurred between August 2020 and May 2021, and the actors managed to access a webserver used to store cutomer information by the water supplier.
It appears that the hackers weren’t interested in the exfiltration of sensitive data, as they instead just planted a custom malware to increase visitor traffic to an online video platform.
The audit report mentions that there is no evidence that the threat actors stole any customer or financial information, and the vulnerability the actors used has now been fixed.
The report underlines that the actors compromised the older and more vulnerable version of the system, leaving the modern and far more secure web servers untouched.
Finally, the report raises the issue of the lack of proper account security practices, such as giving users minimum access required to perform their jobs.
Instead, SunWater had several user accounts with access to multiple systems, increasing the risk in the case of a single point of compromise.
The auditors examined the internal controls of six water authorities in Australia and found deficiencies in three without naming them specifically.
From the absence of anti-fraud safeguards that would secure financial transactions from BEC actors to the presence of numerous vulnerabilities in IT systems, the report highlighted several key issues.
In summary, the auditors found that public entities have taken positive steps based on last year’s recommendations but still need to:
“We continue to identify several control deficiencies relating to information systems. Cyber-attacks continue to be a significant risk, with ongoing changes in entities’ working environments due to COVID-19.” – reads the auditors’ report.
While a financial loss is always a dire scenario, as we saw back in a 2017 attack against a UK-based water supplier who lost $645,000, it’s not nearly as severe as threatening public safety.
In February 2021, a hacker gained access to a water treatment system in Oldsmar, Florida, and attempted to increase the concentration of caustic soda in the public supply network.
This was a wake-up call for U.S. authorities who took methodical steps to upgrade the security of these critical facilities, which are targeted more often than the public realizes.
Mobile phishing attacks targeting energy sector surge by 161%
Don’t miss this pre-Black Friday deal on cybersecurity training
Researchers show that Apple’s CSAM scanning can be fooled easily
Tor Browser 11 removes V2 Onion URL support, adds new UI
US defense contractor Electronic Warfare hit by data breach
Not a member yet? Register Now
Costco discloses data breach after finding credit card skimmer
Microsoft: New security updates trigger Windows Server auth issues
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.


Article Categories:
Cybersecurity News

Comments are closed.