Close this search box.

Water treatment facility hack caused by poor password security


The details are a cautionary tale for utilities and governance agencies, which are often impacted by a lack of current IT infrastructure and cyber protection.

New details have emerged about the remote computer hack attempt at a Florida water treatment facility last Friday, which we covered in a previous update.

The details highlight a lack of adequate security measures needed to bulletproof critical infrastructure environments. They also highlight that for what may seem to be an otherwise banal part of our lives which we take for granted, the incident hits home just how ubiquitous cyber threats are today and how they can hit anywhere, any time and almost any target.

The breach involved an unsuccessful attempt on the part of a threat actor to increase sodium hydroxide dosage in the water supply to dangerous levels by remotely accessing the SCADA system at the water treatment plant. The system’s plant operator spotted the intrusion, and quickly took steps to reverse the command, leading to minimal impact.

According to an advisory published on Wednesday by the state of Massachusetts, unidentified cyber actors accessed the supervisory control and data acquisition (SCADA) system via TeamViewer software installed on one of the plant’s several computers that were connected to the control system.

Not only were these computers running 32-bit versions of the Windows 7 operating system, but the machines also shared the same password for remote access and are said to have been exposed directly to the Internet without any firewall protection installed.

It is worth noting that Microsoft Windows 7 reached end-of-life as of last year, on January 14, 2020 – a full year ago!

The Oldsmar facility at the heart of the recent hack attempt

While this incident may seem surprising to some, the reality is that many small public utilities suffer from aging infrastructure, with IT departments tending to be under-resourced, lacking budget and expertise to upgrade security postures and address vulnerabilities in a timely fashion.

Ahmed Khanji

Ahmed Khanji

Ahmed Khanji is the CEO of Gridware, a leading cybersecurity consultancy based in Sydney, Australia. An emerging thought leader in cybersecurity, Ahmed is an Adjunct Professor at Western Sydney University and regularly contributes to cybersecurity conversations in Australia. As well as his extensive background as a security advisor to large Australian Enterprises, he is a regular keynote speaker and guest lecturer on offensive cybersecurity topics and blockchain.


Sydney Offices
Level 12, Suite 6
189 Kent Street
Sydney NSW 2000
1300 211 235

Melbourne Offices
Level 13, 114 William Street
Melbourne, VIC 3000
1300 211 235

Perth Offices
Level 32, 152 St Georges Terrace
Perth WA 6000
1300 211 235


Learn more about the team at the forefront of the Australian Cyber Security scene.

About Us →

Meet the Team →

Partnerships →

Learn more about the team at the forefront of the Australian Cyber Security scene.

Career Opportunities →

Internships →

Media appearances and contributions by Gridware and our staff.

See More →



Whether you need us to take care of security for you, respond to incidents, or provide consulting advice, we help you stay protected.

View all services →

Web App Pen. Test Calculator →

Network Pen. Test Calculator →

Governance & Audit

Legal and regulatory protection

Penetration Testing

Uncover system vulnerabilities

Remote Working & Phishing

Fortify your defenses

Cyber Security Strategy

Adaptation to evolving threats

Cloud & Infrastructure

Secure cloud computing solutions

Gridware 360

End-to-end security suite

Gridware Managed Services

Comprehensive & proactive security

Gridware CloudControl

Harness the benefits of cloud technology

Gridware Incident Response 24/7

Swift, expert-led incident resolution



A collection of our published insights, whitepapers, customer success stories and more.

Customer success stories from real Gridware customers. Find out how we have helped others stay on top of their Cyber Security.

Read More →