Jump to content
Wolfenstein

Hacker Tried To POISON California Water Supply By Stealing Employee's Login At Bay Area Facility And Deleting Treatment Programs

By Wolfenstein, 06/22/2021


 

wtp.png

 

 

By Matt Mcnulty
Published: 17:11 EDT, 21 June 2021

 

  • A hacker tried to poison the San Francisco Bay Area water supply on January 15, and a review of the interference revealed just how easy it was to do so 
  • The cyberattacker had somehow obtained a former employee's TeamViewer login credentials, which allows users to remotely access their computers
  • While the breach was quickly caught, authorities are seeing a troubling trend in cyberattacks on US water infrastructure
  • Just weeks after the Bay Area breach, a nearly identical case emerged in Florida, where a hacker raised lye levels in the drinking water supply
  • Officials have not identified the hackers or the motive in either case
  • The US water infrastructure is particularly vulnerable to such cyberattacks, with no federal governing body to oversee each of the US's 54,000 water plants

 

A hacker attempted to poison the water supply in California by stealing an employee's login information at a facility in the Bay Area and attempting to delete treatment programs, a new report has revealed.  

The suspect - who has not been identified or apprehended - launched his attack on the unspecified facility on January 15, but it was quickly detected the next day.

A subsequent report from the Northern California Regional Intelligence Center later exposed just how easily the hacker was able to break into the system.

 

Read more below:

 

Hacker Tried To POISON California Water Supply

 

 

 

a1badge.thumb.png.76941ec6445e3bd3e121016bc8580a21sm.png

NOT A MEMBER? REGISTER HERE TO COMMENT

  • Like 1
  • 83 Views
IP.Board News by DevFuse

×
×
  • Create New...

Important Information

Use of this site is confirmation and acceptance of your understanding of our Terms of Use , Privacy Policy and site Guidelines . We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.