> series: anatomy_of_a_breach —— part: 146 —— target: oldsmar_water_treatment —— chemical: sodium_hydroxide —— increase: 100ppm_to_11,100ppm —— access: teamviewer<span class="cursor-blink">_</span>_
On 5 February 2021, an operator at the Oldsmar water treatment plant in Pinellas County, Florida, observed the mouse cursor on a SCADA control workstation moving independently. Someone had remotely connected to the system and was navigating to the chemical dosing controls. The operator watched as the intruder increased the sodium hydroxide (lye) setting from 100 parts per million to 11,100 parts per million — a 111-fold increase that, if left in place and undetected by downstream safety systems, could have produced dangerously caustic water.
The operator immediately reversed the change, and the plant's safety alarms and pH monitoring systems would have detected the alteration before contaminated water reached the public. But the attack — conducted through TeamViewer, a consumer-grade remote access tool, using a shared password, on a workstation running unsupported Windows 7 — demonstrated that critical infrastructure controlling public health and safety could be accessed through the most basic of attack vectors. The case was investigated by the FBI, the Secret Service, and Pinellas County Sheriff's Office.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Oldsmar attack is directly relevant to UK water companies, energy providers, and all critical infrastructure operators. The same combination of factors — internet-connected SCADA systems, remote access tools, shared credentials, unsupported operating systems — exists in critical infrastructure worldwide. For UK operators, the controls are clear: isolate OT networks from the internet, enforce MFA on all remote access, eliminate shared passwords, retire unsupported systems, and deploy continuous monitoring.
Cyber Essentials mandates MFA, prohibits shared passwords, and requires unsupported software removal. Our infrastructure testing assesses OT/SCADA security. SOC in a Box monitors for anomalous remote access to critical systems. And UK Cyber Defence provides incident response for critical infrastructure incidents.
<a href="/penetration-testing/infrastructure">Infrastructure testing</a> assesses SCADA/OT security. <a href="/cyber-essentials">Cyber Essentials</a> mandates MFA and bans shared passwords. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors critical systems.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call