The rising tide of cyber attacks against the UK water sector
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是英国水务公司过去两年报告了网络攻击事件。根据 Drinking Water Inspectorate 的数据,在2023年1月到2024年10月期间,有15起网络安全事件,其中5起是确认的网络攻击。这些攻击影响的是非关键系统,没有直接影响供水安全。但文章提到水务公司使用行政IT和运营技术两个系统,担心黑客可能通过行政系统进入控制物理过程的OT系统。美国环保局和GAO也指出水行业存在严重的网络安全漏洞,比如账户管理和网络访问控制不足。美国最大的水务公司承认遭受攻击,虽然核心系统没受影响,但不得不关闭客户服务并启动应急响应。CISA警告说支持俄罗斯的黑客正在攻击水处理设施的工业控制系统。文章最后强调水务公司需要加强整体网络安全 posture,不仅仅是保护工业系统。 现在我要把这些信息浓缩到100字以内。重点包括:英国水务公司过去两年的网络攻击事件、影响非关键系统、行政和运营技术系统的风险、美国的情况以及建议加强整体网络安全。 总结的时候要注意逻辑连贯,用简洁的语言表达。 </think> 英国水务公司过去两年报告多起网络攻击事件,主要影响非关键业务系统。尽管未直接影响供水安全,但凸显行政与运营技术系统的潜在风险。美国水行业亦暴露严重漏洞,需加强整体网络安全防护以应对日益严峻的威胁。 2025-11-6 17:43:47 Author: www.fortra.com(查看原文) 阅读量:7 收藏

Critical infrastructure is once again in the spotlight, as it is revealed that several UK water suppliers have reported cybersecurity incidents over the last two years.

The disclosure that attackers are probing the systems relied on to manage the delivery of safe drinking water to millions of households comes in newly-released information from the Drinking Water Inspectorate (DWI), following a freedom of information request from The Record.

Between January 2023 and late October 2024, the DWI - which ensures the safety and acceptability of drinking water supplies in England and Wales - received 15 notifications of incidents involving water companies' digital systems. Five of these were confirmed to be cybersecurity-related.

Under the NIS regulations, which aim to enhance the security of essential services such as water, those five incidents were described as affecting "out-of-NIS-scope systems."

That suggests that none of the attacks actually impacted the safe supply or treatment of the public's drinking water, but rather that the organisations behind those supplies were affected in other areas of their business, such as administration.

And that clearly suggests that things could have been much worse.

However, it is worth bearing in mind that water suppliers operate two separate but increasingly connected environments. They utilise administrative IT systems for billing, scheduling, email, and other purposes. And they have operational technology (OT) systems that manage the flow and treatment of the water itself.

The fear is that hackers may compromise business networks initially to find pathways towards the systems that control physical processes.

In May 2024, the US Environmental Protection Agency (EPA) issued an alert warning that more than 70% of inspected water systems were not meeting basic cybersecurity requirements, including controls around account management and network access.

A later report, published by the Government Accountability Office (GAO) in August 2024, also highlighted the longstanding cybersecurity gaps in the water sector.

Then, in October 2024, American Water Works, the largest publicly traded water utility in the United States, admitted that attackers had gained unauthorised access to its corporate IT network.

The systems responsible for treating and delivering water at American Water were thankfully not affected, but the company still had to disable customer-facing services and launch incident response procedures.

All of this has happened against a backdrop of CISA warning that pro-Russian hacking groups are increasingly targeting industrial control systems within water utilities, exploiting unsecured remote access points and default passwords.

Although the headlines are more likely to be grabbed by hypothetical attacks on water supplies and treatment processes, the reality is that the most immediate risks are well-established threats such as ransomware.

However, water companies should understand that what is required is not just the defence of their specialised industrial systems, but also the overall cybersecurity posture of the firms that operate them.

As the UK's National Cyber Security Centre (NCSC) advises in its Cyber Assessment Framework, there is a clear need for robust network segmentation, monitoring for unusual activity between internal systems, and meticulous control of remote access.

The time for essential service providers to build resilient systems is not after operations are disrupted. Malicious hackers are already probing their perimeters, and business systems - which can often be overlooked in discussions of critical infrastructure - are increasingly the point of entry.


Editor’s Note: The opinions expressed in this and other guest author articles are solely those of the contributor and do not necessarily reflect those of Fortra.


文章来源: https://www.fortra.com/blog/rising-tide-cyber-attacks-against-uk-water-sector
如有侵权请联系:admin#unsafe.sh