Veolia North America, a subsidiary of transnational conglomerate Veolia, disclosed a ransomware attack that impacted systems part of its Municipal Water division and disrupted its bill payment systems.
After detecting the attack, Veolia has implemented defensive measures, temporarily taking some systems offline to contain the breach.
Veolia is now working with law enforcement and third-party forensics experts to assess the extent of the attack's impact on its operations and systems.
According to Veolia, back-end systems and servers taken offline right after the attack for restoration are now back online and customers' payments will not be affected.
The attack hasn't disrupted Veolia's water treatment operations or wastewater services.
The company has discovered a limited number of individuals whose personal information may have been impacted during the breach and is working with a third-party forensics firm to assess the extent of the attack's impact on its operations and systems.
Veolia North America provides water and wastewater services to roughly 550 communities and industrial water solutions at around 100 industrial facilities, treating over 2.2 billion gallons of water and wastewater daily at 416 facilities across the United States and Canada.
The transnational Veolia group has almost 213,000 employees globally and generated €42.9 billion in revenue in 2022, providing drinking water to around 111 million people and wastewater services to roughly 97 million.
The same year, Veolia produced nearly 44 terawatt-hours of energy and treated 61 million metric tons of waste.
A water treatment company serving millions across the United Kingdom, was also the victim of a ransomware attack claimed by the Black Basta ransomware gang.
In November, CISA warned that threat actors breached a U.S. water facility in Pennsylvania by hacking Unitronics programmable logic controllers exposed online without compromising potable water safety for served communities.
Two months earlier, in September, the U.S. cybersecurity agency released a free security scan program for critical infrastructure facilities like water utilities to help them detect security gaps and secure their systems from such attacks.
U.S. Water and Wastewater Systems Sector facilities have also been breached multiple times by several threat groups deploying Ghost, ZuCaNo, and Makop ransomware in recent years,.
Other breaches of water facilities have happened over the past two decades, including a South Houston wastewater treatment plant in 2011, a water company with outdated software and hardware equipment in 2016, the Southern California Camrosa Water District in August 2020, and a Pennsylvania water system in May 2021.
In response to the WSW sector increasingly targeted by cyberattacks, CISA, the FBI, and the Environmental Protection Agency issued an incident response guide last week to help defenders secure water utilities from attacks.
Hospitals ask courts to force cloud storage firm to return stolen data.
New Black Basta decryptor exploits ransomware flaw to recover files.
FBI: Play ransomware breached 300 victims, including critical orgs.
Norton Healthcare discloses data breach after May ransomware attack.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Tue, 23 Jan 2024 21:55:11 +0000