Data Security Decoded

When Hacktivists Target Water Utilities: Inside a Russian-Aligned OT Attack


Listen Later

Russian-aligned hacktivist groups are increasingly targeting industrial control systems and OT environments—and sometimes it’s shockingly easy. In this episode, Daniel dos Santos, VP of Research at Forescout, walks through how his team used a honeypot to observe an attack against a simulated water treatment facility. We explore attacker motivations, common entry points, and what defenders must prioritize now.


What You’ll Learn

  • How honeypots can uncover real-world hacktivist tactics and behaviors

  • Why exposed HMIs remain one of the weakest entry points in OT environments

  • How Telegram has become a primary platform for hacktivist attack claims

  • The evolving motivations behind Russian-aligned hacktivist groups

  • Why visibility across all networked devices is critical to defense

  • How opportunistic attacks differ from targeted nation-state operations

  • Practical steps to avoid becoming “easy prey” for attackers


    Episode Highlights

    00:02:30 – How the Attack Was Discovered Spotting the honeypot activity through Telegram claims
    00:04:00 – The Entry Point Explained Default credentials and exposed HMIs
    00:06:45 – Hacktivist Motivation Shift From activism to geopolitics and profit
    00:10:50 – Why OT Attacks Are Hard to Eradicate Hidden devices and lateral movement

    00:14:20 – The Core Defensive Takeaway Don’t ignore opportunistic threats


    Episode Resources

    Forescout Research Reports
    Telegram (hacktivist communications platform)
    Canadian Government OT Security Alert

    Shodan (internet-exposed asset scanning tool)

    ...more
    View all episodesView all episodes
    Download on the App Store

    Data Security DecodedBy Rubrik

    • 5
    • 5
    • 5
    • 5
    • 5

    5

    14 ratings


    More shows like Data Security Decoded

    View all
    CyberWire Daily by N2K Networks

    CyberWire Daily

    1,034 Listeners

    Smashing Security by Graham Cluley

    Smashing Security

    322 Listeners

    Hacking Humans by N2K Networks

    Hacking Humans

    316 Listeners

    Threat Vector by Palo Alto Networks by Palo Alto Networks and N2K Networks

    Threat Vector by Palo Alto Networks

    40 Listeners