A single water plant hack reveals a nationwide vulnerability
In late November 2023, a cyberattack on a small municipal water authority in Aliquippa, Pennsylvania, sent a clear signal across the U.S. critical infrastructure landscape. A group calling itself "Cyber Av3ngers," believed to be a front for Iranian state-sponsored actors, breached the facility's systems, defacing a control screen with an anti-Israel message. The attack vector was alarmingly simple: an internet-exposed, Israeli-made Unitronics programmable logic controller (PLC) that was reportedly still using a default password. While the immediate impact was minimal, the incident prompted a deeper investigation by federal agencies and cybersecurity firms, uncovering a far more significant and systemic risk.
Research following the attack has revealed that the vulnerability exploited in Pennsylvania is not an isolated case. According to security firm Censys, nearly 4,000 industrial devices in the United States, specifically PLCs manufactured by the American company Rockwell Automation, are similarly exposed to the public internet. This discovery transforms a localized incident into a national security concern, highlighting a vast attack surface that opportunistic threat actors can exploit to disrupt essential services across the country.
Technical details: A problem of exposure, not exploitation
At the heart of this issue are Programmable Logic Controllers (PLCs). These are ruggedized industrial computers that act as the brains for automated processes in everything from water treatment plants and manufacturing lines to power grids and building management systems. They are the digital hands that turn valves, start motors, and mix chemicals. When these devices are compromised, attackers can directly manipulate the physical world.
The primary vulnerability is not a sophisticated zero-day exploit, but a fundamental failure in security architecture: direct internet exposure. Industrial control systems (ICS) and their operational technology (OT) networks are designed to be isolated from the outside world. Connecting them directly to the internet is a cardinal sin of OT security. Yet, researchers from Censys and Tenable found thousands of such devices readily discoverable through public scanning tools like Shodan.
These exposed Rockwell Automation devices, including popular models like the Allen-Bradley MicroLogix 1100, often communicate over unencrypted industrial protocols such as EtherNet/IP (TCP port 44818) and Modbus/TCP (TCP port 502). As the joint advisory from CISA and the FBI noted following the Aliquippa attack, threat actors actively scan for devices using these protocols. Once found, an attacker's job is simplified. They can attempt to log in using default credentials—which are often unchanged from the factory settings—or exploit known vulnerabilities.
While the "Cyber Av3ngers" attack on the Unitronics PLC relied on weak credentials, the exposed Rockwell devices are also susceptible to a range of documented flaws. For example, CVE-2023-3595 is a denial-of-service vulnerability in MicroLogix controllers that could allow an attacker to crash the device, halting industrial processes. This means that even if default passwords have been changed, the mere exposure of these devices presents a severe risk.
Impact assessment: A threat to public health and safety
The nearly 4,000 exposed Rockwell Automation PLCs are not concentrated in a single sector; they are spread across the fabric of American critical infrastructure. The potential targets include:
- Water and Wastewater Systems: As seen in Aliquippa, attackers could manipulate water treatment processes, alter pressure levels to damage pipes, or shut down water distribution entirely.
- Manufacturing: A compromised PLC could halt a factory production line, damage expensive equipment, or alter formulas, leading to significant economic losses and product safety issues.
- Energy: While larger energy facilities typically have stronger security, smaller operations or distribution substations could be vulnerable, potentially leading to localized power disruptions.
- Transportation and Logistics: Systems controlling traffic signals, rail switches, or port machinery could be targeted, causing chaos and supply chain disruptions.
The consequences of a successful, widespread campaign targeting these devices range from operational disruption and economic damage to direct threats to public health and safety. The Aliquippa incident was largely performative, designed to send a political message. However, the access gained by the attackers could have easily been used for more destructive purposes. A more capable adversary could leverage this same access to cause physical damage or endanger lives.
The CISA advisory confirmed that Iranian government-sponsored APT actors are actively targeting U.S. critical infrastructure. This is not a theoretical threat. It is an active campaign by a nation-state adversary that is capitalizing on the low-hanging fruit of insecurely configured industrial systems.
How to protect your organization
Securing industrial control systems from these threats requires a return to security fundamentals. Asset owners and operators must take immediate, concrete steps to reduce their exposure. The following actions are not optional suggestions; they are necessary requirements for operating critical systems safely.
- Eliminate Direct Internet Exposure: The first and most important step is to identify and disconnect any PLC or industrial controller that is directly accessible from the internet. Conduct a thorough audit of your network to find any device with a public IP address and remove it from the public-facing internet immediately.
- Implement Robust Network Segmentation: Your operational technology (OT) network should be strictly segregated from your corporate IT network and the internet. Use firewalls and a demilitarized zone (DMZ) to create a buffer, ensuring that no direct communication path exists between the internet and your critical control systems. This practice of encryption and isolation is foundational to OT security.
- Enforce Secure Remote Access: If remote access to the OT network is necessary for maintenance or monitoring, it must be done through a secure, audited channel. Implement a properly configured VPN with multi-factor authentication (MFA) to ensure that only authorized personnel can connect after verifying their identity.
- Change All Default Credentials: Immediately change the default passwords on all PLCs, routers, and other network devices. Enforce a policy of using strong, unique passwords for every component in the control system environment.
- Establish a Patch Management Program: While patching in OT environments can be challenging, it is essential. Develop a process to test and deploy firmware updates and security patches for PLCs and related software to mitigate known vulnerabilities.
- Develop and Test an Incident Response Plan: Your organization must have a specific, tested incident response plan for OT-related cyberattacks. This plan should outline procedures for isolating affected systems, preserving evidence, and restoring operations safely.
The attack in Pennsylvania was a warning. The discovery of thousands of similarly exposed devices is a call to action. The threat from Iranian-linked actors is persistent and opportunistic. They are not deploying sophisticated, novel techniques but are simply walking through unlocked digital doors. It is the responsibility of every critical infrastructure operator to ensure those doors are locked, bolted, and monitored.




