Anatomy of a Breach

Anatomy of a Breach: Oldsmar — A Hacker Tried to Poison a City's Water Supply Through TeamViewer

> series: anatomy_of_a_breach —— part: 146 —— target: oldsmar_water_treatment —— chemical: sodium_hydroxide —— increase: 100ppm_to_11,100ppm —— access: teamviewer<span class="cursor-blink">_</span>_

Hedgehog Security 28 February 2021 14 min read

Sodium hydroxide increased 111 times. Through TeamViewer. On a Windows 7 workstation. With a shared password.

On 5 February 2021, an operator at the Oldsmar water treatment plant in Pinellas County, Florida, observed the mouse cursor on a SCADA control workstation moving independently. Someone had remotely connected to the system and was navigating to the chemical dosing controls. The operator watched as the intruder increased the sodium hydroxide (lye) setting from 100 parts per million to 11,100 parts per million — a 111-fold increase that, if left in place and undetected by downstream safety systems, could have produced dangerously caustic water.

The operator immediately reversed the change, and the plant's safety alarms and pH monitoring systems would have detected the alteration before contaminated water reached the public. But the attack — conducted through TeamViewer, a consumer-grade remote access tool, using a shared password, on a workstation running unsupported Windows 7 — demonstrated that critical infrastructure controlling public health and safety could be accessed through the most basic of attack vectors. The case was investigated by the FBI, the Secret Service, and Pinellas County Sheriff's Office.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

SCADA. Internet-connected. TeamViewer. Shared password. Windows 7.

Public Safety at Risk
The Oldsmar attack targeted the chemical composition of drinking water — a direct threat to public health. While safety systems would likely have caught the change, the attack demonstrated intent and capability to harm through cyber means. For UK water companies and critical infrastructure operators, SCADA security is a public safety obligation. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> includes SCADA and OT assessment.
TeamViewer on SCADA Systems
A consumer-grade remote access tool (TeamViewer) was installed on a SCADA workstation connected to the internet — with a shared password. This combination of factors violates every OT security principle. <a href="/cyber-essentials">Cyber Essentials Danzell</a> mandates MFA on all remote access and prohibits shared passwords.
Windows 7 — Unsupported Since January 2020
The SCADA workstation ran Windows 7, which had been end-of-life since January 2020 — over a year before the attack. <a href="/cyber-essentials">Cyber Essentials</a> requires that unsupported software is removed from scope. The same unsupported OS vulnerability that powered <a href="/blog/anatomy-of-a-breach-wannacry">WannaCry's</a> NHS devastation was present in water treatment infrastructure.
Human Operator Saved the Day
The attack was stopped because a human operator was watching the screen and noticed the cursor moving. Without that alertness, the chemical change would have relied on automated safety systems for detection. <a href="https://www.socinabox.co.uk">SOC in a Box</a> provides the continuous monitoring that supplements human observation — detecting remote access anomalies and SCADA configuration changes 24/7.

If Oldsmar can happen in Florida, it can happen in the UK.

The Oldsmar attack is directly relevant to UK water companies, energy providers, and all critical infrastructure operators. The same combination of factors — internet-connected SCADA systems, remote access tools, shared credentials, unsupported operating systems — exists in critical infrastructure worldwide. For UK operators, the controls are clear: isolate OT networks from the internet, enforce MFA on all remote access, eliminate shared passwords, retire unsupported systems, and deploy continuous monitoring.

Cyber Essentials mandates MFA, prohibits shared passwords, and requires unsupported software removal. Our infrastructure testing assesses OT/SCADA security. SOC in a Box monitors for anomalous remote access to critical systems. And UK Cyber Defence provides incident response for critical infrastructure incidents.


A hacker tried to poison a city's water through TeamViewer. Is your critical infrastructure protected?

<a href="/penetration-testing/infrastructure">Infrastructure testing</a> assesses SCADA/OT security. <a href="/cyber-essentials">Cyber Essentials</a> mandates MFA and bans shared passwords. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors critical systems.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles