Water sector expands partnership with volunteer hackers

Water sector expands partnership with volunteer hackers

This audio is auto-generated. Please let us know if you have feedback.

Water utilities are some of the most vulnerable U.S. critical infrastructure organizations, but some of them could get a cybersecurity boost from an army of volunteer white-hat hackers.

Several cyber experts have already been assisting small water treatment facilities with security improvements as part of a public-service project called DEF CON Franklin, which launched at the DEF CON cybersecurity conference in Las Vegas in 2024. But at this year’s DEF CON conference, the project’s organizers announced plans to scale up that initiative in partnership with the National Rural Water Association (NRWA) and help secure thousands of water systems across the U.S.

“We’ve seen both the urgency of the threat and the potential of a community-driven solution,” Jake Braun, the co-founder of DEF CON Franklin, said in a statement.

There are more than 55,000 community water systems nationwide, supplying big cities, small towns and rural communities. Water is considered a lifeline sector, and some utilities are considered national security resources because they supply U.S. military bases. But many small water systems operate with meager budgets, outdated technology and no dedicated cybersecurity personnel, making them tempting targets for hackers intent on causing chaos.

In late 2023, Iranian hackers breached several water utilities while targeting organizations using Israeli-made programmable logic controllers. In the fall of 2024, American Water, the country’s largest water utility, experienced a cyberattack that forced it to shut down some systems. Fears about hackers manipulating industrial control systems to poisoning water supplies have been so acute that a report of one such attempt in a Florida city in 2021 sparked a frenzied news cycle, even though the incident appears to have been overblown.

NRWA is hoping to counter escalating threats to the water sector through its expanded partnership with DEF CON Franklin. Volunteer hackers have spent the past nine months helping secure utilities in Indiana, Oregon, Utah and Vermont, and now NRWA is designing a pilot program that will test a more sophisticated and far-reaching system for delivering cyber aid.

The program will function like a managed security service provider (MSSP), but instead of delivering one company’s defensive services to participating utilities, it will provide a platform for multiple tech and security companies to offer their help.

“This was the next step of, What else can we do to help shore up our small systems?” John DeGour, a regulatory affairs specialist at NRWA, told Cybersecurity Dive during a recent interview at DEF CON. “Franklin has these great volunteer cybersecurity professionals, and we have this great relationship with water utilities.”

Freebie services

NRWA and Franklin are currently designing the program and talking with companies about what services they could offer for free or at a reduced cost. Franklin’s volunteer cybersecurity experts have shared advice about “what a [tech] stack might look like,” DeGour said, and NRWA has been combining those ideas with its insights about small utilities’ security needs.

One interested company, the industrial cybersecurity firm Dragos, is talking to organizers about which of its free tools “would have the most impact” for water systems, Braun told Cybersecurity Dive. “We’re looking for other partners who can bring similarly high-value, free, NOT freemium, resources into the program.”

NRWA would administer the MSSP program, relying on its existing relationships with utilities, but Franklin experts would deploy across the country to help utilities adopt participating companies’ services. Braun said the goal is for each utility to have a dedicated cyber adviser from Franklin, which has approximately 350 registered volunteers.

Depending on which companies participate, the available services could include vulnerability scanning, penetration testing, identity management, asset inventorying, patch management, intrusion detection, threat intelligence and incident response. Participating security vendors may also provide tools such as firewalls or virtual private networks. Even basic support like setting up strong authentication could make a big difference: The water utilities that Iran hacked, for example, were using passwords set to “1111.”

If a water utility experiences a cyber intrusion, Franklin hackers could help operators contain the damage and restore operations, DeGour said.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.