Hacked hot chat

Fortunately, based on alert functionality, KWC was able to quickly identify and reverse the chemical and flow changes, largely minimising the impact on customers. Verizon's RISK Team uncovered evidence that the hacktivists had manipulated the valves controlling the flow of chemicals twice – though fortunately to no particular effect.

It seems the activists lacked either the knowledge of SCADA systems or the intent to do any harm.

The same hack also resulted in the exposure of personal information of the utility’s 2.5 million customers.

There’s no evidence that this has been monetised or used to commit fraud.

Disclaimer: All models were at least 18 years old when they were photographed.

We have a zero-tolerance policy against illegal pornography.

Our endpoint forensic analysis revealed a linkage with the recent pattern of unauthorised crossover.Hackers infiltrated a water utility’s control system and changed the levels of chemicals being used to treat tap water, we're told.The cyber-attack is documented in this month’s IT security breach report (available here, registration required) from Verizon Security Solutions.Organisations must leverage this information to collectively raise the bar in security to better detect, prevent and respond to advanced attacks.Working collectively is our best route to getting ahead of attackers,” he added.All links on this site lead to pages provided by 3rd parties.

You must have an account to comment. Please register or login here!