WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Group Responsible for TRISIS/TRITON Expands Target Set to Include US Electric Utilities
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Group Responsible for TRISIS/TRITON Expands Target Set to Include US Electric Utilities

Author: Jennifer Walker

Created: Tuesday, June 18, 2019 - 17:26

Categories: Cybersecurity, General Security and Resilience

The threat group Dragos tracks as XENOTIME has expanded its target set to include US electric utilities. XENOTIME is the group responsible for the TRISIS/TRITON malware, and the only group known to target safety instrumented systems (SIS). In February 2019, Dragos identified a persistent pattern of activity attempting to gather information and enumerate network resources associated with US and Asia-Pacific electric utilities. This activity suggests the group’s interest and preparation for further cyberattacks and due to this adversary’s willingness to subvert process safety in ICS environments, gives cause for concern. While water and wastewater infrastructure differs from current targets, there are commonalities in process safety that could still be targeted. Likewise, cross-sector dependencies with other critical infrastructure, such as electric, could be used to halt water and wastewater processing. Members are encouraged to focus on detecting and investigating events consistent with reconnaissance and initial access operations, including observed incidents of attempted authentication with credentials and possible credential “stuffing,” or using stolen usernames and passwords to try and force entry into target accounts. Read the article at Dragos

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar