Los Angeles Times

Cracks and hacks: Water supply at risk

Old systems, other factors expose state to physical and cyber threats

- By Hayley Smith

On a February morning in 2021, a water treatment plant operator in Oldsmar, Fla., noticed something unusual: An unidentifi­ed user had remotely accessed the plant’s computer system and was moving the mouse around the screen.

The operator watched as the intruder clicked into various software programs before landing on a function that controls the amount of sodium hydroxide, or lye, in the plant’s water system. The hacker then increased the amount of lye — a potentiall­y dangerous substance used to control acidity — from 100 parts per million to 11,100 parts per million.

The plant operator reversed the change almost immediatel­y, and officials said there was never any threat to public safety. But the incident has highlighte­d the threats facing major drinking water systems across the country.

“Water systems, like other public utility systems, are part of the nation’s critical infrastruc­ture and can be vulnerable targets when someone desires to adversely affect public safety,” Sheriff Bob Gualtieri of Pinellas County, Fla., said at the time.

In California, where epic Sierra Nevada snowpack and “the big melt” have substantia­lly increased the stakes for reservoir managers, officials say they’re taking steps to protect the state’s water systems from hackers, terrorist attacks and natural disasters, such as the flooding that temporaril­y severed the Los Angeles Aqueduct — the city’s water lifeline that connects to the Owens Valley.

But experts say the challenges are numerous. Many of the systems in California and nationwide are still operating with outdated software, poor passwords, aging infrastruc­ture and other weaknesses that could leave them at risk.

“We’ve seen a steady rise in both the prevalence and the impact of cyberintru­sions, as well as an extraordin­ary increase in ransomware attacks, which have become more destructiv­e and more expensive,” said Joe Oregon, chief of cybersecur­ity for Region 9 of the federal Cybersecur­ity & Infrastruc­ture Security Agency, or CISA.

Andrew Reddie, an assistant professor of practice in cybersecur­ity at UC Berkeley’s School of Informatio­n, said much of the problem is “driven by the fact that the infrastruc­ture is really, really old, and ultimately predates the era that we find ourselves in now, where we actually bake cybersecur­ity into these ... systems by design.”

“You can point to any number of critical infrastruc­ture, including things like dams and water treatment plants, that are not terribly well-protected in terms of passwords,” he said.

A lot of older infrastruc­ture is not “air gapped” from the internet, he said, referring to a separation between operationa­l technology and internet technology. That could enable a bad actor to do things such as change chemical levels or open sluices to manipulate flows in water channels or dams.

Compoundin­g the problem is a lack of central regulation or uniform protocols. Multiple agencies — including the Environmen­tal Protection Agency, the National Institute of Standards and Technology, the American Water Works Assn. and the Department of Homeland Security and CISA — provide some degree of risk management oversight, or offer frameworks and recommenda­tions. But many of the day-to-day decisions are left up to individual operators.

“A lot of the responsibi­lity does certainly fall on the stakeholde­rs’ shoulders to manage their own informatio­n systems effectivel­y to prevent any type of cyber compromise or cyber incidents,” said Oregon, of CISA.

The agency estimates that about 63% of the nation’s 91,000 dams are privately owned. Federal, state and local government­s and utilities own 35%, and the remaining 2% have “undetermin­ed ownership.”

Despite the risks, experts said it’s important for water systems to be networked in order to expedite maintenanc­e and monitoring. In California, reservoirs are often intentiona­lly spread far apart to maximize rainwater capture and other benefits, so sending physical crews to respond to every potential problem would be time-consuming and expensive, said Ethan Schmertzle­r, chief executive of Dispel, a cyberdefen­se firm.

“It all depends upon how water systems are connected, and most water systems in the United States are not — it’s not one national water system,” he said. “The good news is each community is divided into their own command and control systems. The downside is, they’re all divided into their own command and control systems.”

Though most standards are not mandatory, cybersecur­ity recommenda­tions — and spending — have vastly improved in recent years, he said. Recent legislatio­n through the National Defense Authorizat­ion Act will soon compel utilities to report cybersecur­ity threats to CISA, which will help the federal agency better spot trends, share informatio­n and render a response.

John Rizzardo, security coordinato­r with the State Water Project at the California Department of Water Resources, said the agency operates with an ethos of “layers upon layers of security,” for both physical and cyber threats. Because the agency is also an energy provider in the state, “we probably employ more security features than a lot of just the water industry,” he said.

That doesn’t mean it is immune, however. CISA pointed to the Oroville dam crisis of 2017 as an example of the nation’s need for “comprehens­ive oversight and guidance over dam resilience.” During that incident, hillside erosion on the dam’s emergency spillway threatened a major f lood event and prompted the evacuation of about 200,000 people, though disaster was ultimately averted.

Rizzardo said the agency has since shored up the spillway and made significan­t security upgrades, and is working to implement the same standards across all State Water Project facilities. The Department of Homeland Security runs national security drills for the dam sector every two years, he said, which the agency also participat­es in.

But even with the best protocols in place, “there’s still going to be a risk of a cyber or physical attack,” Rizzardo said. “It could happen — we’re doing our best to prevent it — but if it does happen, we do practice our emergency action plans regularly so that we’re prepared if there is some kind of attack that we can try to mitigate, to reduce the consequenc­es.”

Indeed, the Oldsmar incident was not a one-off. A few months later, a ransomware attack on the Colonial Pipeline — a vital U.S. oil conduit between the Gulf of Mexico and the East Coast — spurred fuel shortages, flight cancellati­ons and a state of emergency declaratio­n from President Biden.

Earlier this year, Biden unveiled a national strategy for cybersecur­ity that calls for a “more intentiona­l, more coordinate­d and more well-resourced approach to cyberdefen­se.”

Similar attacks have threatened other water systems, including an Iranian attack on a New York dam in 2016, in which hackers tried but failed to take control of a sluice gate.

In January 2021, an unnamed water treatment plant in the San Francisco Bay Area also suffered a cyberattac­k, NBC News first reported. Hackers accessed the plant’s system through a remote access TeamViewer account and deleted programs used to treat drinking water. The programs were reinstalle­d the next day and no failures were reported. (The Northern California Regional Intelligen­ce Center, which compiled a report on the incident, said it could not provide more details as an investigat­ion is ongoing.)

One of the largest water providers in the country is the Metropolit­an Water District of Southern California, a massive regional wholesaler that supplies 26 agencies serving 19 million people, including the Los Angeles Department of Water and Power.

General manager Adel Hagekhalil said in an email that America’s Water Infrastruc­ture Act of 2018 served as a “catalyst for utilities to evaluate their resilience to risk and create emergency plans for responding to all hazards.”

“We are constantly taking steps to ensure the security of our water supplies against physical and cybersecur­ity threats,” Hagekhalil said. He noted that community water systems serving more than 3,300 people are required to actively update their risk and resilience assessment and emergency response plans every five years.

Additional­ly, the MWD employs cybersecur­ity experts and constantly monitors network and computer activity to “detect unusual events quickly so they can be addressed,” he said. Computer and network access is tightly controlled, and employees are also required to take annual cybersecur­ity training.

The agency also conducts periodic emergency management exercises at different facilities to simulate responses to physical threats such as earthquake­s, floods, fires and terrorist attacks, which include first responders and law enforcemen­t agencies, he said.

But the U.S. is home to more than 55,000 public water systems and 16,000 wastewater systems, said Jennifer Lyn Walker, director of infrastruc­ture cyberdefen­se at the Water Informatio­n Sharing and Analysis Center. One of her primary concerns was that there is often a “lack of awareness” about the potential for cyberthrea­ts and other such vulnerabil­ities.

“Physical threats are so much more top of mind, or more easily identified or more easily understood, than the cyberthrea­t,” she said. “The concern is a lack of preparedne­ss.”

However, most large systems in California “are doing what needs to be done” when it comes to cybersecur­ity, she said. Small and medium-size systems, which often have fewer resources than major providers, may need assistance, however, and could benefit from the guidance of larger operators.

“A smaller system that just barely services 5,000 people — that’s still 5,000 people’s lives that could be at risk if something should happen, and that’s from physical or cyber [threats],” she said.

Reddie, of Berkeley, said more auditing would provide a better understand­ing of which systems are networked, as well as which systems follow best practices. He also recommende­d educating workforces about proper cyberhygie­ne.

Even with such steps in place, however, vulnerabil­ities remain. Ongoing investigat­ions into the Oldsmar incident indicate that it may not have been the work of an outside hacker at all, but might have been caused by an internal employee. Should that prove to be the case, it would highlight that insider threats can also be cause for concern, Reddie said.

“These individual firms need to be thinking about what’s their model for the type of threat actor that they’re likely to see,” he said. “Like, is this going to be a state actor? Is it going to be a disgruntle­d employee? Is it going to be, you know, a script kiddie in a basement?”

‘Physical threats are so much more top of mind ... or more easily understood than the cyberthrea­t. The concern is a lack of preparedne­ss.’ — Jennifer Lyn Walker, a cyberdefen­se expert

 ?? Robert Gauthier Los Angeles Times ?? WATER RUSHES out of Pine Flat Dam on the Kings River in Fresno County. California officials say they’re taking steps to protect the state’s water systems from hackers, terrorist attacks and natural disasters.
Robert Gauthier Los Angeles Times WATER RUSHES out of Pine Flat Dam on the Kings River in Fresno County. California officials say they’re taking steps to protect the state’s water systems from hackers, terrorist attacks and natural disasters.
 ?? Irfan Khan Los Angeles Times ?? CREWS INSTALL earthquake-resistant iron pipe in San Jacinto. Cyberattac­ks, old infrastruc­ture and outdated software are among the challenges facing drinking water systems in California and across the country.
Irfan Khan Los Angeles Times CREWS INSTALL earthquake-resistant iron pipe in San Jacinto. Cyberattac­ks, old infrastruc­ture and outdated software are among the challenges facing drinking water systems in California and across the country.

Newspapers in English

Newspapers from United States