WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships OT/ICS Threat Awareness – (TLP:GREEN) Pro-Russian Hacktivists Continue to Target OT Networks
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

OT/ICS Threat Awareness – (TLP:GREEN) Pro-Russian Hacktivists Continue to Target OT Networks

Author: Chase Snow

Created: Monday, December 2, 2024 - 16:07

Categories: Cybersecurity, Federal & State Resources, OT-ICS Security

The FBI Los Angeles Field Intelligence Group, the California Cybersecurity Integration Center, and the Joint Regional Intelligence Center have released a TLP:GREEN Joint Cyber Spotlight titled “Pro-Russian Hacktivist Group Compromises JRIC AOR Entity,” which indicates that a pro-Russian hacktivist group has claimed to have compromised multiple critical infrastructure entities in California. The document contains valuable tactics, techniques, and procedures (TTPs) used by these hacktivists and are mapped to the MITRE attack framework.

The product notes that improperly secured OT systems of American organizations continue to remain attractive targets for unsophisticated Russia-aligned hacktivists due to the outsized attention such attacks receive. Pro-Russian hacktivists, such as the Cyber Army of Russia Reborn, have previously claimed responsibility for attacking water and wastewater facilities. On November 1, 2024, the same Russian group also “gained control of a pump at a California-based oil production platform, increased the pump rate, and disrupted oil production systems,” creating another attention-grabbing attack with minimal investment.

Members are encouraged to review the report to better understand the tactics that such groups use and how they map to the MITRE ATT&CK framework. Access the report below.

Attached Files:

(TLP GREEN) Joint Cyber Spotlight - Pro-Russian Hacktivist Group Compromises JRIC AOR Entity - 11.27.2024

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar