{"id":83785,"date":"2023-11-28T11:05:53","date_gmt":"2023-11-28T19:05:53","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=83785"},"modified":"2024-04-05T15:29:47","modified_gmt":"2024-04-05T22:29:47","slug":"cyber-aveng3rs-attack-water-treatment-plant","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/","title":{"rendered":"Hacktivists attack U.S. water treatment plant \u2013 analysis and implications"},"content":{"rendered":"<p>Almost a year ago to the day, on December 1 2022, Forescout Vedere Labs <a href=\"\/resources\/threat-report-the-increasing-threat-posed-by-hacktivist-attacks\/\">published a report<\/a> detailing several hacktivist operations that targeted critical infrastructure in response to the Russian invasion of Ukraine and other geopolitical developments.<\/p>\n<p>Since the most recent chapter in the Hamas-Israel conflict started on October 7, there have been multiple similar claims of attacks from hacktivists <a href=\"https:\/\/www.darkreading.com\/dr-global\/worldwide-hacktivists-take-sides-over-gaza-with-little-show\" target=\"_blank\" rel=\"noopener\">taking opposing sides in the conflict<\/a>. However, most of these claims have gone <a href=\"https:\/\/thecyberexpress.com\/complex-web-of-lies-in-hamas-israel-cyber-war\/\" target=\"_blank\" rel=\"noopener\">unconfirmed or entirely debunked<\/a>\u2026 Until now.<\/p>\n<p>In this blog post, we examine a recent, confirmed attack by the anti-Israeli hacktivist group Cyber Aveng3rs. The attack targeted the municipal water authority of Aliquippa, Pennsylvania.<\/p>\n<h2>The attack<\/h2>\n<p>On November 25, the municipal water authority of Aliquippa confirmed that one of its <a href=\"https:\/\/htt.io\/resources\/an-overview-of-water-booster-pump-stations\/\" target=\"_blank\" rel=\"noopener\">booster stations<\/a> \u2013 used to maintain water pressure and flow \u2013 was hacked, and fortunately, that there was no risk to the water supply. According to <a href=\"https:\/\/beavercountian.com\/content\/special-coverage\/iranian-linked-cyber-army-had-partial-control-of-aliquippa-water-system\" target=\"_blank\" rel=\"noopener\">news outlets<\/a>, the \u201ccompromised network also serviced several security cameras.\u201d Spokespeople for the water authority stress that the attack triggered an alarm that subsequently disabled the system, which has since been manually operated. The water authority also shared an image of their compromised\/defaced Human Machine Interface (HMI) \u2013 which is manufactured by the Israeli company <a href=\"https:\/\/www.unitronics.com\/\" target=\"_blank\" rel=\"noopener\">Unitronics<\/a>:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83791\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked.jpg\" alt=\"\" width=\"773\" height=\"496\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked.jpg 773w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-300x192.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-768x493.jpg 768w\" sizes=\"auto, (max-width: 773px) 100vw, 773px\" \/><\/p>\n<p><small><em>Figure 1 \u2013 Compromised HMI November 2023, from <a href=\"https:\/\/www.cbsnews.com\/pittsburgh\/news\/municipal-water-authority-of-aliquippa-hacked-iranian-backed-cyber-group\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cbsnews.com\/pittsburgh\/news\/municipal-water-authority-of-aliquippa-hacked-iranian-backed-cyber-group\/<\/a><\/em><\/small><\/p>\n<p>The image posted on the HMI screen appears quite similar to those of other defacement attacks against <a href=\"https:\/\/twitter.com\/netalishemtov\/status\/1644956664674566144?s=20\" target=\"_blank\" rel=\"noopener\">irrigation systems<\/a> from the same manufacturer in Israel in April 2023:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83790\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-2.jpg\" alt=\"\" width=\"773\" height=\"630\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-2.jpg 773w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-2-300x245.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-2-768x626.jpg 768w\" sizes=\"auto, (max-width: 773px) 100vw, 773px\" \/><\/p>\n<p><small><em>Figure 2 \u2013 Compromised HMI April<\/em><em>, from <a href=\"https:\/\/www.jns.org\/cyberattack-shutters-galilee-farm-water-controllers\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.jns.org\/cyberattack-shutters-galilee-farm-water-controllers\/<\/a><\/em><\/small><\/p>\n<p>The two main differences between the attack images are the newer attack\u2019s message about Israeli-made equipment and its addition of the logo of the Cyber Aveng3rs hacktivist group.<\/p>\n<p>Taking full credit for the attack on November 26, the Cyber Aveng3rs posted on their <a href=\"https:\/\/twitter.com\/CyberAveng3rs\/status\/1728743948246569469\" target=\"_blank\" rel=\"noopener\">X<\/a> account and <a href=\"https:\/\/t.me\/CyberAveng3rs\/\" target=\"_blank\" rel=\"noopener\">Telegram<\/a> channel the following messages, Clearly stating that their attack scope has expanded (\u201cEVERY EQUIPMENT MADE IN ISRAEL\u2026\u201d) and that more attacks can be expected (\u201cthe worst has just begun\u2026\u201d):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83789\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-3.jpg\" alt=\"\" width=\"773\" height=\"630\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-3.jpg 773w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-3-300x245.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-3-768x626.jpg 768w\" sizes=\"auto, (max-width: 773px) 100vw, 773px\" \/><\/p>\n<p><small><em>Figure 3 \u2013 Message of expanded attack scope posted to Telegram on November 26, 2023<\/em><\/small><\/p>\n<h2>Technical analysis<\/h2>\n<p>Currently, full details about the most recent attack are not publicly available. One of the main questions is, \u201cHow did the hacktivists managed to gain initial access to the HMI?\u201d As with other water systems compromised in the past, this one was likely exposed directly to the Internet, although initial access could have also occurred via the \u201cseveral security cameras\u201d in the water authority\u2019s network. On October 30, 2023, the same hacktivist group <a href=\"https:\/\/nitter.net\/Tara_Writer\/status\/1718973925449711913#m\" target=\"_blank\" rel=\"noopener\">claimed attacks on several Israeli water treatment plants<\/a> and released videos from their cameras, indicating some level of access to this type of equipment.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83788\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-4.jpg\" alt=\"\" width=\"773\" height=\"630\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-4.jpg 773w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-4-300x245.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-4-768x626.jpg 768w\" sizes=\"auto, (max-width: 773px) 100vw, 773px\" \/><\/p>\n<p><small><em>Figure 4 \u2013 October 30, 2023 Retweet of Cyber Av3ngers claim<\/em><\/small><\/p>\n<p>The Unitronics V570 device shown in the image released by the water authority is a PLC+HMI combination. After gaining initial access to this system, it remains unclear how the attackers interacted with it to deface the HMI. Also unclear is what else they may have done, such as changing PLC settings or process variables.<\/p>\n<p>The attackers could have defaced the HMI by downloading a new HMI graphic using the engineering software (<a href=\"https:\/\/www.unitronicsplc.com\/software-visilogic-for-programmable-controllers\/\" target=\"_blank\" rel=\"noopener\">VisiLogic<\/a>, which is freely available). These devices also support an engineering protocol called <a href=\"https:\/\/www.unitronicsplc.com\/Download\/SoftwareUtilities\/Unitronics%20PCOM%20Protocol.pdf\" target=\"_blank\" rel=\"noopener\">PCOM<\/a>, which allows users to change network settings of a device, set system registers or take many other actions. There have been Metasploit modules available for PCOM <a href=\"https:\/\/github.com\/rapid7\/metasploit-framework\/blob\/master\/modules\/auxiliary\/scanner\/scada\/pcomclient.rb\" target=\"_blank\" rel=\"noopener\">scanning<\/a> and <a href=\"https:\/\/github.com\/rapid7\/metasploit-framework\/blob\/master\/modules\/auxiliary\/admin\/scada\/pcom_command.rb\" target=\"_blank\" rel=\"noopener\">interaction<\/a> since 2019 as well as an <a href=\"https:\/\/github.com\/cldrn\/external-nse-script-library\/blob\/master\/pcom-discover.nse\" target=\"_blank\" rel=\"noopener\">nmap script<\/a> for fingerprinting Unitronics devices. This type of Metasploit module is a favorite tool within hacktivist arsenals, as it eliminates the need to develop custom malware, such as the malware used by state-sponsored actors. However, we cannot yet confirm which tool was used to interact with the compromised device.<\/p>\n<h2>Conclusion \u2013 other asset owners may be in danger<\/h2>\n<p>There are currently more than 1,800 <a href=\"https:\/\/www.shodan.io\/search?query=unitronics\" target=\"_blank\" rel=\"noopener\">Internet-exposed Unitronics PLCs<\/a> in the world. Many of them are located in the US, some in major cities such as Chicago (52) and Dallas (14). Other regions with significant numbers of Unitronics PLCs include Australia, Europe and Singapore.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83787\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-5.jpg\" alt=\"\" width=\"771\" height=\"437\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-5.jpg 771w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-5-300x170.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-5-768x435.jpg 768w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\" \/><\/p>\n<p>Not all of the Internet-exposed Unitronics PLCs run water treatment or even critical infrastructure. For instance, we see controllers for swimming pools and other private facilities. However, many of the devices are potentially connected to critical infrastructure, such as the three PLCs located in Australia and labelled \u201cWater supply\u201d (see below):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83786\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-6.jpg\" alt=\"\" width=\"771\" height=\"355\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-6.jpg 771w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-6-300x138.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/cyber-hacked-6-768x354.jpg 768w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\" \/><\/p>\n<p>This attack represents a significant development in hacktivist tactics, and one that we expect to see replicated more widely.<\/p>\n<p>Most hacktivists have previously restricted themselves to targets directly involved with, or located within, their target area. However, the statement published by the hacktivists that all equipment made in Israel is a Cyber Av3ngers legal target expands their target group significantly, and to an extent, poses a threat to inflict economic, as well as cyber damage on Israel.<\/p>\n<p>We recommend that organizations that view themselves at risk of this attack conduct a through audit and risk assessment to enable them to take the appropriate steps to secure their infrastructure, regardless of where it has been manufactured.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost a year ago to the day, on December 1 2022, Forescout Vedere Labs published a report detailing several hacktivist operations that targeted critical infrastructure in response to the Russian invasion of Ukraine and other geopolitical developments. Since the most recent chapter in the Hamas-Israel conflict started on October 7, there have been multiple similar [&hellip;]<\/p>\n","protected":false},"author":124,"featured_media":83795,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562,540],"tags":[],"coauthors":[542],"class_list":["post-83785","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-views","category-research-and-cyber-alerts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers Hit Aliquippa Water Treatment Plant\u202f - Forescout<\/title>\n<meta name=\"description\" content=\"Forescout Research - Vedere Labs technical insight of confirmed attack by the anti-Israeli hacktivist group Cyber Aveng3rs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Hit Aliquippa Water Treatment Plant\u202f - Forescout\" \/>\n<meta property=\"og:description\" content=\"Forescout Research - Vedere Labs technical insight of confirmed attack by the anti-Israeli hacktivist group Cyber Aveng3rs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-28T19:05:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-05T22:29:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/Hacktivists-attack-water.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Forescout Research - Vedere Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/\"},\"author\":{\"name\":\"Forescout Research - Vedere Labs\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\"},\"headline\":\"Hacktivists attack U.S. water treatment plant \u2013 analysis and implications\",\"datePublished\":\"2023-11-28T19:05:53+00:00\",\"dateModified\":\"2024-04-05T22:29:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/\"},\"wordCount\":842,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/Hacktivists-attack-water.png\",\"articleSection\":[\"News &amp; Views\",\"Research &amp; Cyber Alerts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/\",\"name\":\"Hackers Hit Aliquippa Water Treatment Plant\u202f - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/Hacktivists-attack-water.png\",\"datePublished\":\"2023-11-28T19:05:53+00:00\",\"dateModified\":\"2024-04-05T22:29:47+00:00\",\"description\":\"Forescout Research - Vedere Labs technical insight of confirmed attack by the anti-Israeli hacktivist group Cyber Aveng3rs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/Hacktivists-attack-water.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/Hacktivists-attack-water.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacktivists attack U.S. water treatment plant \u2013 analysis and implications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\",\"name\":\"Forescout Research - Vedere Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"caption\":\"Forescout Research - Vedere Labs\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Hit Aliquippa Water Treatment Plant\u202f - Forescout","description":"Forescout Research - Vedere Labs technical insight of confirmed attack by the anti-Israeli hacktivist group Cyber Aveng3rs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Hit Aliquippa Water Treatment Plant\u202f - Forescout","og_description":"Forescout Research - Vedere Labs technical insight of confirmed attack by the anti-Israeli hacktivist group Cyber Aveng3rs.","og_url":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2023-11-28T19:05:53+00:00","article_modified_time":"2024-04-05T22:29:47+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/Hacktivists-attack-water.png","type":"image\/png"}],"author":"Forescout Research - Vedere Labs","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/"},"author":{"name":"Forescout Research - Vedere Labs","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984"},"headline":"Hacktivists attack U.S. water treatment plant \u2013 analysis and implications","datePublished":"2023-11-28T19:05:53+00:00","dateModified":"2024-04-05T22:29:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/"},"wordCount":842,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/Hacktivists-attack-water.png","articleSection":["News &amp; Views","Research &amp; Cyber Alerts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/","url":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/","name":"Hackers Hit Aliquippa Water Treatment Plant\u202f - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/Hacktivists-attack-water.png","datePublished":"2023-11-28T19:05:53+00:00","dateModified":"2024-04-05T22:29:47+00:00","description":"Forescout Research - Vedere Labs technical insight of confirmed attack by the anti-Israeli hacktivist group Cyber Aveng3rs.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/Hacktivists-attack-water.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/Hacktivists-attack-water.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Hacktivists attack U.S. water treatment plant \u2013 analysis and implications"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984","name":"Forescout Research - Vedere Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781","url":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","caption":"Forescout Research - Vedere Labs"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/11\/Hacktivists-attack-water.png","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/83785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/124"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=83785"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/83785\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/83795"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=83785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=83785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=83785"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=83785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}