Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

 Hackers undetected on Queensland, water supplier server for 9 months

views
     
TSdaisiesdontdoit92
post Nov 16 2021, 04:57 AM, updated 3y ago

On my way
****
Junior Member
574 posts

Joined: Jan 2020


Can you believe this, the hackers were not noticed for 9 month?!

"Hackers stayed hidden for nine months on a server holding customer information for a Queensland water supplier, illustrating the need of better cyberdefenses for critical infrastructure.

SunWater is Australian government-owned water supplier responsible for operating 19 major dams, 80 pumping stations, and 1,600 miles long pipelines.

According to the annual financial audit report that was published by the Queensland Audit Office yesterday, SunWater was breached for nine months, with the actors remaining undetected the entire time.

While the report doesn't name the entity directly, ABC Australia questioned the authority and confirmed it was SunWater.

The breach occurred between August 2020 and May 2021, and the actors managed to access a webserver used to store cutomer information by the water supplier.

It appears that the hackers weren't interested in the exfiltration of sensitive data, as they instead just planted a custom malware to increase visitor traffic to an online video platform.

The audit report mentions that there is no evidence that the threat actors stole any customer or financial information, and the vulnerability the actors used has now been fixed.

The report underlines that the actors compromised the older and more vulnerable version of the system, leaving the modern and far more secure web servers untouched.

Finally, the report raises the issue of the lack of proper account security practices, such as giving users minimum access required to perform their jobs.

Instead, SunWater had several user accounts with access to multiple systems, increasing the risk in the case of a single point of compromise.
A widespread problem

The auditors examined the internal controls of six water authorities in Australia and found deficiencies in three without naming them specifically.

From the absence of anti-fraud safeguards that would secure financial transactions from BEC actors to the presence of numerous vulnerabilities in IT systems, the report highlighted several key issues.

In summary, the auditors found that public entities have taken positive steps based on last year's recommendations but still need to:

Implement security threat detection and reporting systems
Enable multi-factor authentication on all external systems available to the public
Set a minimum password length of eight characters
Organize security awareness training
Implement critical security vulnerabilities identification processes

"We continue to identify several control deficiencies relating to information systems. Cyber-attacks continue to be a significant risk, with ongoing changes in entities' working environments due to COVID-19." - reads the auditors' report.

While a financial loss is always a dire scenario, as we saw back in a 2017 attack against a UK-based water supplier who lost $645,000, it's not nearly as severe as threatening public safety.

In February 2021, a hacker gained access to a water treatment system in Oldsmar, Florida, and attempted to increase the concentration of caustic soda in the public supply network. "

https://www.bleepingcomputer.com/news/secur...r-for-9-months/


This post has been edited by daisiesdontdoit92: Nov 16 2021, 05:01 AM
JonathanHanYT
post Nov 16 2021, 08:14 AM

Getting Started
**
Junior Member
114 posts

Joined: Nov 2021
From: Penang, Malaysia


Usually, if those hackers didn't do any hanky pranky things or didn't blackmail them you won't know.

 

Change to:
| Lo-Fi Version
0.0126sec    0.23    5 queries    GZIP Disabled
Time is now: 29th March 2024 - 05:22 AM