WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Irish Utility Experiences Water Disruption after Politically Motivated Threat Actor Compromises Israeli Pumping System
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Irish Utility Experiences Water Disruption after Politically Motivated Threat Actor Compromises Israeli Pumping System

Author: ian_41208

Created: Thursday, December 7, 2023 - 19:54

Categories: Cybersecurity

Last week, a group of unknown threat actors compromised a water pumping system for a “private group water scheme” in the Erris area of Ireland, resulting in the loss of water for 180 homeowners for two days. The perpetrators said the equipment – a “Eurotronics Israeli-made water pumping system” – was targeted due to the fact it originated in Israel, in an incident reminiscent of the recent exploitation of Unitronics PLCs.

While the information in this article has not been verified, including the delineation between “Eurotronics” and “Unitronics,” the details are relatively consistent with known current activity by IRGC affiliated actors and is being provided for your situational awareness. From what is known or suspected, the threat actors managed to breach the organization’s firewall, likely due to misconfigurations or security vulnerabilities. Subsequently, they posted a “You have been hacked” message to the computer screen at the pumphouse. According to an employee, the message also said “down with Israel” and the name of the company that hacked the utility. Despite the challenges, the utility manually restored water services on Friday night. This activity highlights victims aren’t necessarily targeted based on who or where they are, but rather for what they possess (data or components) and how accessible (vulnerable/exploitable) it is—regardless of an organization’s size or the number of people they serve. Additionally, such attacks are often orchestrated by nation state groups with high levels of sophistication and capability, aiming to gain access to critical infrastructure. These actors are frequently motivated by geopolitical tensions. Read more at Western People.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 30, 2026)

Apr 30, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar