Hackers undetected on Queensland water supplier server for 9 months

Hackers stayed hidden for nine months on a server holding customer information for a Queensland water supplier, illustrating the need of better cyberdefenses for critical infrastructure.

SunWater is Australian government-owned water supplier responsible for operating 19 major dams, 80 pumping stations, and 1,600 miles long pipelines.

According to the annual financial audit report that was published by the Queensland Audit Office yesterday, SunWater was breached for nine months, with the actors remaining undetected the entire time.

While the report doesn’t name the entity directly, ABC Australia questioned the authority and confirmed it was SunWater.

The breach occurred between August 2020 and May 2021, and the actors managed to access a webserver used to store cutomer information by the water supplier.

It appears that the hackers weren’t interested in the exfiltration of sensitive data, as they instead just planted a custom malware to increase visitor traffic to an online video platform.

The audit report mentions that there is no evidence that the threat actors stole any customer or financial information, and the vulnerability the actors used has now been fixed.

The report underlines that the actors compromised the older and more vulnerable version of the system, leaving the modern and far more secure web servers untouched.

In summary, the auditors found that public entities have taken positive steps based on last year’s recommendations but still need to:

  • Implement security threat detection and reporting systems
  • Enable multi-factor authentication on all external systems available to the public
  • Set a minimum password length of eight characters
  • Organize security awareness training
  • Implement critical security vulnerabilities identification processes

“We continue to identify several control deficiencies relating to information systems. Cyber-attacks continue to be a significant risk, with ongoing changes in entities’ working environments due to COVID-19.” – reads the auditors’ report.

Finally, the report raises the issue of the lack of proper account security practices, such as giving users minimum access required to perform their jobs.

This was a wake-up call for U.S. authorities who took methodical steps to upgrade the security of these critical facilities, which are targeted more often than the public realizes.

[Bleeping Computer]

Facebook
Twitter
LinkedIn
Pinterest

Other posts