Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 11 submissions in the queue.
posted by janrinok on Saturday July 05, @04:26PM   Printer-friendly
from the my-password-is-123456 dept.

Risevatnet Lake is a small dammed lake near the city of Svelgen in the South-West of Norway. It primarily serves as a fish farm.

On April 7 its dam control system was breached by a Russian hacktivist group, Z-PENTEST (guess what the Z stands for). The main valve was put on maximum opening, increasing the water flow to maximum volume for four hours before the incident was detected; on April 10 the dam's owner alerted authorities.

The hackers got in through a weak password -- the classical 123456, or risevatnet123, perhaps -- on the web interface used to control the dam. This web interface was directly connected to the Internet.
  Once logged in, the hackers could directly control a motorized valve which controlled the water flow. (Why local teenagers hadn't discovered this before remains a mystery.)

About 145,000 Industrial Control Devices (ICS) were found to be directly connected to the Internet in a 2024 Censys scan (pdf). Of these devices, 48,000, or 38%, were located in the US, with Europe accounting for a comparable number (35%). A sizeable portion (34%) of devices were water and wastewater related, while 23% were associated with agricultural processes. Many of these devices -- including HMIs, PLCs, and SCADA panels—were discoverable with simple scans, and often "protected" by default or easily guessed passwords.

If you read around a bit, the impression is that Z-PENTEST is something like a splinter group from another "hacktivist" group, the People's Cyber Army. Both groups have boosted on Telegram about similar actions before -- aiming for oil wells, dams and rural water systems. Their targets have been in the United States, Canada, Australia, France, South Korea, Taiwan, Italy, Romania, Germany, and Poland.

It has to be seen whether this latest action -- freeing fish from Western Propaganda and the Capitalists' Deadly Grip -- will give them much street cred in the hacker scene.


Original Submission

 
This discussion was created by janrinok (52) for logged-in users only. Log in and try again!
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Insightful) by Gaaark on Saturday July 05, @06:21PM (1 child)

    by Gaaark (41) on Saturday July 05, @06:21PM (#1409400) Journal

    ...stupid is as stupid does. Put it on the internet with a weak password. Dumb-da-dum-dumb.

    This is why we can't have nice things: people use insecure OS's; people use insecure passwords; people put systems on the internet when they don't need to be and people are people (with apologies to Depeche Mode).

    --
    --- Please remind me if I haven't been civil to you: I'm channeling MDC. I have always been here. ---Gaaark 2.0 --
    Starting Score:    1  point
    Moderation   +2  
       Insightful=1, Underrated=1, Total=2
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 4, Funny) by driverless on Sunday July 06, @09:36AM

    by driverless (4770) on Sunday July 06, @09:36AM (#1409438)

    The hackers got in through a weak password -- the classical 123456

    Note to self: Change combination on luggage, Russian hackers have guessed it.