Ransomware Attacks Target Water Utilities in U.S. and U.K., Exposing Sensitive Data
Veolia North America’s Municipal Water division recently suffered a ransomware attack, disrupting internal back-end systems and causing temporary delays in online bill payment services. The company swiftly isolated affected servers, restoring functionality while confirming that water and wastewater treatment operations remained unaffected. A limited number of individuals may have had personal data exposed, and Veolia is notifying impacted parties while working with law enforcement and third-party forensic experts to investigate the incident and strengthen defenses.
Meanwhile, Southern Water in the U.K. disclosed that cybercriminals claimed to have stolen data from its IT systems, though customer services and financial systems remain operational. The company, which detected suspicious activity earlier, is collaborating with cybersecurity specialists and regulators, including the National Cyber Security Centre (NCSC). If customer or employee data is confirmed compromised, Southern Water will notify affected individuals.
The Black Basta ransomware group has taken credit for the attacks, leaking samples of stolen data including passport scans, HR documents with personal details, and corporate records. These incidents follow a broader trend of cyber threats targeting critical infrastructure, particularly in the water sector, where resource constraints and interconnected supply chains create vulnerabilities.
Experts note that while neither Veolia nor Southern Water reported disruptions to industrial control systems (ICS) or operational technology (OT), the attacks underscore the need for robust corporate cybersecurity. The U.S. Cybersecurity and Infrastructure Security Agency (CISA), FBI, and EPA have issued guidance for water utilities to bolster defenses, emphasizing that even non-critical systems can serve as entry points for broader intrusions. The incidents reflect a growing focus on high-risk sectors, where sensitive data and essential services make them prime targets for ransomware groups.
Veolia | North America cybersecurity rating report: https://www.rankiteo.com/company/veolianorthamerica
"id": "VEO1770325156",
"linkid": "veolianorthamerica",
"type": "Ransomware",
"date": "1/2024",
"severity": "100",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Limited number of individuals',
'industry': 'Water and wastewater treatment',
'location': 'U.S.',
'name': 'Veolia North America’s Municipal Water '
'division',
'type': 'Water utility'},
{'industry': 'Water and wastewater treatment',
'location': 'U.K.',
'name': 'Southern Water',
'type': 'Water utility'}],
'customer_advisories': 'Notifying impacted parties (Veolia), will notify if '
'customer/employee data is confirmed compromised '
'(Southern Water)',
'data_breach': {'data_exfiltration': 'Yes',
'personally_identifiable_information': 'Yes',
'sensitivity_of_data': 'High (personally identifiable '
'information, passport scans)',
'type_of_data_compromised': 'Personal data, passport scans, '
'HR documents, corporate records'},
'description': 'Veolia North America’s Municipal Water division recently '
'suffered a ransomware attack, disrupting internal back-end '
'systems and causing temporary delays in online bill payment '
'services. Meanwhile, Southern Water in the U.K. disclosed '
'that cybercriminals claimed to have stolen data from its IT '
'systems. The Black Basta ransomware group has taken credit '
'for the attacks, leaking samples of stolen data including '
'passport scans, HR documents with personal details, and '
'corporate records.',
'impact': {'data_compromised': 'Personal data, passport scans, HR documents '
'with personal details, corporate records',
'downtime': 'Temporary delays',
'identity_theft_risk': 'Limited number of individuals may have had '
'personal data exposed',
'operational_impact': 'Disruption to internal systems; water and '
'wastewater treatment operations unaffected',
'systems_affected': 'Internal back-end systems, online bill '
'payment services'},
'investigation_status': 'Ongoing',
'lessons_learned': 'Need for robust corporate cybersecurity in critical '
'infrastructure, even non-critical systems can serve as '
'entry points for broader intrusions',
'post_incident_analysis': {'corrective_actions': 'Strengthening defenses, '
'enhanced monitoring, '
'collaboration with '
'cybersecurity experts',
'root_causes': 'Resource constraints, '
'interconnected supply chains, '
'vulnerabilities in non-critical '
'systems'},
'ransomware': {'data_exfiltration': 'Yes', 'ransomware_strain': 'Black Basta'},
'recommendations': 'Bolster defenses, follow guidance from CISA, FBI, and EPA '
'for water utilities',
'references': [{'source': 'CISA, FBI, EPA guidance for water utilities'}],
'regulatory_compliance': {'regulatory_notifications': 'Collaborating with '
'regulators including '
'NCSC (U.K.)'},
'response': {'communication_strategy': 'Notifying impacted parties, '
'collaborating with regulators',
'containment_measures': 'Isolated affected servers',
'incident_response_plan_activated': 'Yes',
'law_enforcement_notified': 'Yes',
'remediation_measures': 'Restored functionality, strengthened '
'defenses',
'third_party_assistance': 'Forensic experts, cybersecurity '
'specialists'},
'threat_actor': 'Black Basta ransomware group',
'title': 'Ransomware Attacks Target Water Utilities in U.S. and U.K., '
'Exposing Sensitive Data',
'type': 'Ransomware'}