US Warns of Rising ICS SCADA Cyberattacks on Energy

US Warns of Rising ICS SCADA Cyberattacks on Energy US Warns of Rising ICS SCADA Cyberattacks on Energy
IMAGE CREDITS: THE CANTON GROUP

The U.S. government has issued a new cybersecurity warning after detecting increased attempts by hackers to breach industrial control systems (ICS) and SCADA infrastructure used by oil and gas companies. According to federal agencies, these threats—though relatively unsophisticated—could cause serious operational disruptions or even physical damage due to weak cyber hygiene practices across critical infrastructure sectors.

The joint advisory, released by CISA in collaboration with the FBI, Department of Energy (DoE), and Environmental Protection Agency (EPA), urges immediate action from energy and transportation organizations. The alert points to a troubling rise in cyber intrusions that exploit simple but effective tactics like exploiting default credentials and misconfigured remote access systems.

These attackers aren’t necessarily high-tech nation-state operatives. Instead, many appear to be hacktivist groups or actors posing as such—motivated more by disruption than data theft. Still, experts warn that even basic attacks on exposed ICS and SCADA systems can have real-world consequences if defenses remain lax.

In recent years, multiple incidents have shown how internet-connected operational technology (OT) systems—especially those left unprotected or secured with default passwords—can be a soft target. Once compromised, these systems can be manipulated in ways that lead to safety risks, service outages, or environmental harm.

To reduce the risk, CISA and its partners recommend several critical steps:

  • Disconnect OT systems from the public internet whenever possible
  • Harden remote access with VPNs, strong passwords, and phishing-resistant multi-factor authentication (MFA)
  • Immediately identify and rotate any default credentials still in use
  • Implement network segmentation to isolate critical operations
  • Ensure manual operation capabilities in the event of system compromise

Beyond basic security measures, organizations are urged to regularly review their setup with third-party vendors, system integrators, and managed service providers. These partners often introduce default settings or network misconfigurations during deployment or maintenance that can leave systems vulnerable.

Agencies also advise companies to take full advantage of CISA’s extensive library of free cybersecurity resources. These include guidance on minimizing exposed attack surfaces, enforcing secure-by-design principles, and implementing phishing-resistant MFA.

As cyber threats to operational systems grow, the message from U.S. authorities is clear: don’t wait for an attack to expose your weaknesses. Take proactive steps now to strengthen defenses across all internet-connected infrastructure.

Share with others

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Service

Follow us