Bremanger Dam Seizure (Norway, 2025)

Victim:

Bremanger Dam

Attacker/Malware:

Russian Hacktivists’ hands-on keyboards

Industry:

Energy

Estimated Cost:

Hackers remotely opened a floodgate, releasing water uncontrollably for four hours before detection.

Primary Attack Vector:

Weak Passwords on web-accessible control panel (likely default password)

Prevention Failure:

Weak Credentials

BlastWave Solution:

Network Cloaking

Kill Chain Analysis:

Seizure of Control to Sow Chaos

In April 2025, an attack attributed to Russia briefly seized control of the Bremanger Dam in Norway.

Hackers remotely access the dam’s web-accessible control system, exploiting a weak password to open a floodgate. Water discharged at 500 liters/second(~132 gallons/second) for ~4 hours, equivalent to ~3 Olympic-sized swimming pools (~7.2 million liters total).

While authorities noted no damage occurred, the intent was to sow fear and cha-os by demonstrating unauthorized access to critical dam control systems. This attack vector relies on gaining control of supervisory systems through compromised credentials or exposed remote access points to OT systems.

BlastWave Prevention Analysis:

Network Cloaking

The key failure was unauthorized individuals discovering and gaining command of the web-accessible control plane. BlastWave’s Network Cloaking would ensure that this interface was not discoverable from the public internet.

If Passwordless remote access were added, even stolen credentials would not grant access to the HMI used by the hackers.

If Passwordless remote access were added, even stolen credentials would not grant access to the HMI used by the hackers.

Download Hackopedia Volume 1 Now – It's Free

Our Privacy Policy applies.

Take the Next Step

Reading about past failures is only useful if it changes future outcomes. If attackers can see your OT network, they can target it. If they can target it, compliance, safety, and uptime are already at risk.

BlastWave eliminates reconnaissance, initial access, and lateral movement — without agents, without downtime, and without changing IPs, protocols, or PLCs.

Secure Your OT Network