WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships House Committee Releases Cyber Threat Snapshot - Cites Water Sector Incidents and Rising Nation-State Threats
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

House Committee Releases Cyber Threat Snapshot – Cites Water Sector Incidents and Rising Nation-State Threats

Author: Chase Snow

Created: Thursday, November 14, 2024 - 15:20

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

The House Committee on Homeland Security released a “Cyber Threat Snapshot” examining the growing threats posed by malign nation-states and criminal networks to U.S. critical infrastructure. The snapshot particularly focuses on the threats posed by the Chinese-affiliated threat groups Volt Typhoon and Salt Typhoon, as well as the Iranian Islamic Revolutionary Guard Corps, both of which have been known to target the water sector. It cites incidents going back to 2021, including water sector incidents (see the Key Developments section) such as the recent attack at American Water and the past string of sector-related incidents in December 2023. According to the report, cyber attacks on critical infrastructure rose 30% globally in 2023.

Key Developments: (A few selections from the report)

OCTOBER 2024: Salt Typhoon––A threat actor associated with the PRC, Salt Typhoon, reportedly infiltrated backdoors in major internet service providers such as Verizon and AT&T to conduct espionage on law enforcement’s wiretapping requests and potentially exfiltrate data. This intrusion included accessing the phones of presidential candidates for surveillance purposes. The intrusion is still being investigated by authorities, but reports indicate phone call data and the locations of certain customers were potentially accessed, as well as call audio. There is no information available yet on how many calls were accessed, if so.

OCTOBER 2024: American Water Works––The networks of one of the country’s major water utilities were breached by an unidentified cyber threat actor, forcing the company to shut down the online customer portal and billing services for days in an attempt to protect customer data. The operational technology involved in water treatment operations was reportedly unaffected in the attack. The company provides services to more than 14 million Americans, including 18 military installations. Actor attribution has not been made, although nation-state actors such as China, Iran, and Russia have been known to target the sector

DECEMBER 2024: Water Facilities––An Iranian-linked hacking group, Cyber Av3ngers, infiltrated Israeli software used in U.S. water and wastewater facilities in the wake of the October 7 Hamas terrorist attacks. For example, the group accessed a component that regulates water pressure at a water authority in Pennsylvania, forcing the facility to utilize manual controls. In February 2024, the Treasury Department sanctioned IRGC-affiliated cyber actors involved in these operations.

Access the full Cyber Threat Snapshot at the Committee on Homeland Security.

Additional Resources:

  • NEW: House Homeland Releases “Cyber Threat Snapshot” Highlighting Rising Threats to US Networks, Critical Infrastructure  | Committee on Homeland Security
  • Homeland Security Committee reveals Cyber Threat Snapshot on rising cyber threats from nation-states, hacker networks | Industrial Cyber

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar