Skip to content
Search

Latest Stories

The Honors Awards
cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

What are Adversaries Doing in the U.S. Water Supply?

What are Adversaries Doing in the U.S. Water Supply?

OAKLAND, CALIFORNIA - MARCH 20: In an aerial view, pools of water are visible at the East Bay Municipal Utility District Wastewater Treatment Plant on March 20, 2024 in Oakland, California. The Biden administration and the Environmental Protection Agency (EPA) are warning states of possible cyberattacks on water systems after recents attacks including one by the Cyber Av3ngers, a group linked to the Iran's Islamic Revolutionary Guard Corps, that targeted internet-facing programmable logic controllers at Pennsylvania’s Municipal Water Authority of Aliquippa. (Photo by Justin Sullivan/Getty Images)

BOTTOM LINE UP FRONT — It’s a serious threat to the nation’s critical infrastructure that not enough people are talking about. That’s the view of cybersecurity experts who worry about a spate of recent attacks on local water supply facilities in the U.S. While the number of attacks is small and the damage has been limited, experts say that individual cybercriminals and nation-state actors looking for holes in America’s critical infrastructure have found an open door, all too easily, in an area of enormous concern. 

The attacks on water utilities have come in small and remote communities – Alquippa, Pennsylvania and Muleshoe, Texas, to name two – a fact that may explain the limited public attention. But recent reports from cybersecurity experts and a warning from the White House have boosted the profile of the threat. Mandiant issued a report this month tying Russian hackers to a breach of water facilities in Texas; in December, the Cybersecurity and Infrastructure Security Agency (CISA) warned that CyberAv3ngers, a group linked to Iran, was “actively targeting and compromising” water facilities; and other attacks have been traced to China. 

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Related Articles

How China Built AI Dominance on Stolen American Silicon

How China Built AI Dominance on Stolen American Silicon

DEEP DIVE — Federal prosecutors in Texas, in December, unsealed charges and related details exposing a sprawling scheme that quietly siphoned some of [...] More

Building U.S. Drone Dominance Brick by Brick

OPINION — One of the things I loved about LEGO as a child was the ability to mix and match an endless amount of parts to create unique builds. [...] More

The World Leaders to Watch in 2026

OPINION — The recent release of President Trump’s new National Security Strategy (NSS), with its emphasis on “the Trump corollary to the Monroe [...] More

Modeling the Earth with AI is Now a Strategic Intelligence Imperative

EXPERT OPINION / PERSPECTIVE — We are currently witnessing a mobilization of technical ambition reminiscent of the Manhattan Project, a realization [...] More

2025: 10 Events That Changed the World

2025: 10 Events That Changed the World

SPECIAL REPORT — In a turbulent year, one of the biggest national security stories came in the form of a document.The administration’s National [...] More

Echoes of 1940: Learning from an Ally at War and Preparing the U.S. for the Next Fight

Echoes of 1940: Learning from an Ally at War and Preparing the U.S. for the Next Fight

EXPERT OPINION / PERSPECTIVE — Eighty-five years ago, as the United States cautiously explored an expanded alliance with Great Britain, our own [...] More

{{}}