Bowman Avenue Dam Infiltration (US, 2013)

Victim:

Bowman Avenue Dam

Attacker/Malware:

Iranian Islamic Revolutionary Guard Corps (IRGC)

Industry:

Energy

Estimated Cost:

None due to dam being offline for maintenance.

Primary Attack Vector:

Exploited Cellular Modem in SCADA system with credential stuffing

Prevention Failure:

Weak Credentials and Internet-exposed SCADA system

BlastWave Solution:

Network Cloaking and Passwordless Access

Kill Chain Analysis:

Simple Infiltration of Control Systems

Attributed to Iran, the 2013 infiltration of theBowman Avenue Dam control systems was oneof the first publicly reported events targeting UScritical infrastructure.

No destructive payload; relied on basic reconnaissance tools (e.g., network scanners, command-lineaccess via modem). Part of Operation Cleaver’stoolkit (retaliation against Stuxnet), including DDoSbots for financial DDoS, but here focused on ICSenumeration and probing for gate controls, sensors,and firmware versions.

The attack succeeded through simple networkinfiltration, highlighting a lack of basic perimeter controls and segmentation in the SCADA environment.

BlastWave Prevention Analysis:

Baseline Cloaking for Dam Controls

Given the simplicity of the infiltration, the failure wasprimarily due to basic perimeter security. BlastWave’s core value of network cloaking would haveprevented the infiltration immediately.

The control systems would not be visible or addressable from the corporate network or the publicinternet, requiring the attacker to first authenticateusing a valid, authorized identity, a step they clearlybypassed in the 2013 attack.

BlastWave’s core value of network cloaking would have prevented the infiltration immediately.

Download Hackopedia Volume 1 Now – It's Free

Our Privacy Policy applies.

Take the Next Step

Reading about past failures is only useful if it changes future outcomes. If attackers can see your OT network, they can target it. If they can target it, compliance, safety, and uptime are already at risk.

BlastWave eliminates reconnaissance, initial access, and lateral movement — without agents, without downtime, and without changing IPs, protocols, or PLCs.

Secure Your OT Network