India's largest platform for AI & Analytics leaders & professionals

Sign in

India's largest platform for AI & Analytics leaders & professionals

3AI Digital Library

A hacker broke into a Florida Water Treatment Plant

3AI February 14, 2021

A hacker broke into a Florida water treatment plant and ordered it to increase the amount of lye to extremely dangerous levels, officials said.

.

A hacker broke into a Florida water treatment plant and ordered it to increase the amount of lye in the water to extremely dangerous levels, officials said Monday.

The plant operators noticed and remedied their systems before anyone was put in danger, but the event highlights the risks of internet-connected controls to civic infrastructure.

In a news conference Monday, Pinellas County Sheriff Bob Gualtieri said that on Friday morning an unknown hacker broke into a program designed to help water treatment operators in Oldsmar troubleshoot problems with the computerized parts of their treatment systems. The program is intended to give full, remote access to a plant computer, but only by authorized users.

Later that afternoon, the system was breached again. A hacker, who authorities believe to be the same one from the initial breach, took control of the computer and changed the acceptable level of sodium hydroxide — better known as lye, the main ingredient in many household drain cleaners — from 100 parts per million to 11,100 parts per million.

A water plant operator noticed immediately and corrected the change, Gualtieri said, adding that if the operator had missed it and the change didn’t trigger some of the plant’s alarms, the lye could have seeped into the water supply in 24 to 36 hours.

“Because the operator noticed the increase and lowered it right away, at no time was there a significant adverse effect on the water being treated,” Gualtieri said.

Gualtieri said that he had no idea where the hacker was operating from but that he is working with the FBI and the Secret Service to find out.

Al Braithwaite, Oldsmar’s city manager, said at the news conference that the system that enabled remote access to the plant’s computers had been disabled and that the city planned to find a replacement.

Picture from freepik.com

    3AI Trending Articles

  • Driving AI Adoption: An 8-Step Blueprint for Your Team’s Success

    Featured Article: Author: Ganes Kesari, Innovation Titan A Telecom major was grappling with high customer attrition. The firm was one of the largest Telecom companies in the world and a market leader in Asia. The marketing team’s heuristics-driven approach to customer retention was dated and ineffective. Reviewing the business performance in a weekly huddle, the […]

  • A peek into how AI will dominate functioning of Next Gen GBS

    Author: Saswata Kar, Head – Analytics & Data Sciences, Philips GBS | LinkedIn – https://www.linkedin.com/in/saswata-kar-95b9074/ Global Business Services or GBS is the collective name given to centralized hubs where big corporations have moved processes that can benefit from centralization, standardization, and automation. The location for these centers is largely governed by cost considerations and talent […]

  • AI Operations: Think Software Development, not Data Science

    Featured Article: Author: Kuntal Hansaria, Associate Partner – AI, Analytics & Digital, IBM AI Governance includes aspects of Explainability (explaining how a model is working) & AI/ML Operations (scaling model development, management & deployment). While Explainability gets lot of attention, aspects of AI/ML Operations are often ignored. However, without AI Operations, an organization can never […]

  • Using AI to Outwit Malicious AI

    Robust Intelligence is among a crop of companies that offer to protect clients from efforts at deception. IN SEPTEMBER 2019, the National Institute of Standards and Technology issued its first-ever warning for an attack on a commercial artificial intelligence algorithm. Security researchers had devised a way to attack a Proofpoint product that uses machine learning to identify spam emails. The system produced email headers […]