“The problem is not the fact that remote software existed. I think the problem is that an adversary got hold of the credentials such that the adversary was able to access it,” said Damon Small, Technical Director of Security Consulting at NCC Group North America.
“What it underscores, speaking as an information security professional, is the need for strong authentication when critical infrastructures are going to use these sorts of remote access systems.”
According to Pinellas County Sheriff Bob Gualtieri and a Massachusetts government advisory to public water suppliers, the hackers gained access to the water facility’s control systems through remote access software known as TeamViewer.
Martina Dier, a spokesperson for TeamViewer, said an investigation found no evidence of suspicious activity on its platform.
Why remote work can lead to hacks
Eric Cole, a former CIA cybersecurity expert and author of the upcoming book “Cyber Crisis,” said that many critical infrastructure systems like water treatment plants were built as closed-loop systems and intentionally kept off the wider Internet.
“You had to get past the guards with the guns, the fences, the video cameras, all the physical security measures in order to get access,” he explained.
But starting several years ago, many utility companies began putting their systems online to pave the way for remote work. The pandemic has only sped up that process — but the heightened security needed with putting these systems online has not always followed.
“These systems were never designed for that purpose, and proper security was never put in place,” he said.
Damon Small, who works with oil and gas companies with far-flung locations, said there are perfectly appropriate business reasons to set these systems up to work remotely.
It can be done securely, too. He offered three recommendations for shoring up these systems: 1) no shared accounts; 2) multi-factor authentication; and 3) Virtual Private Network (VPN) technology so that the systems are not directly exposed to the Internet.
Yet he acknowledged these tips were easier said than done and take time and money.
“The problem is you can’t upgrade something like a water treatment plant as easily as an email system in a business because a water treatment plant has to be functioning all the time,” he said.
“We have to help all these critical infrastructures as much as we can knowing we don’t have the benefit of closing down at 5 o’clock every day. How do you upgrade these things and make a system that might have been deployed two or three decades ago — how do you make it resilient against 21st century attacks?”
Until those upgrades are made, though, similar hacks can be expected going forward at critical infrastructure facilities, Cole warned.
“They are more vulnerable than the average person or the average citizen would believe or like to believe,” Cole said.
“I think what this shows us is it doesn’t matter who you are, whether you’re an individual, a small company or a large company, if you have vulnerabilities you’re going to be discovered, and you are a target, and cybersecurity is your responsibility.”
CNN’s Brian Fung and Alex Marquardt contributed to this report.