Oldsmar Water Treatment Plant Attack (2021)

The Unsecured RDP Risk

Victim:

Oldsmar Water Treatment Plant

Attacker/Malware:

Unknown

Industry:

Water

Estimated Cost:

Stopped before impact

Primary Attack Vector:

Inactive TeamViewer account accessed

Prevention Failure:

Unsecured Remote Access

BlastWave Solution:

Passwordless Secure Access

Kill Chain Analysis:

Leveraging Generic Remote Access Tools

The 2021 Oldsmar Water Treatment Plant incident in Florida provided a starkwarning about the dangers of unsecured remote access to essential services.

An unidentified cyber actor gained unauthorized access to the SupervisoryControl and Data Acquisition (SCADA) system by exploiting a combinationof poor cybersecurity weaknesses, including an outdated operating system(Windows 7) and weak password security. Initial analysis indicated that theattacker used an inactive account on an exposed desktop-sharing software(TeamViewer) to gain remote access to the HMI.

This granted complete remote control, allowing the attacker to increase theconcentration of sodium hydroxide (lye) in the drinking water, a caustic chemicalthat could have posed a public health threat. Although water treatment personnelimmediately noticed and corrected the change, the incident highlighted howeasily generic, publicly exposed remote access tools can provide a path tophysical manipulation.

BlastWave Prevention Analysis:

Replacing Generic Remote Tools with Secure Tunnels

The primary vulnerability was the exposure of a commercial desktop-sharingapplication that, when compromised, provided complete administrative control.BlastWave eliminates this exposure.

Instead of relying on vulnerable RDP or commercial sharing software exposed tothe internet, remote support access is achieved through a secure, identity-validated tunnel that runs the BlastAccess remote desktop application. This tunnelis dynamically created only for the specific, authorized identity, for a definedduration, and strictly to the specific HMI application needed.

This approach ensures the access is temporary, audited, and strictly limited, preventing an attacker from gaining full control over the underlying network or OS.

The physical port and application remain cloaked and invisible to the public internet, eliminating the initial attack vector.

Download Hackopedia Volume 1 Now – It's Free

Our Privacy Policy applies.

Take the Next Step

Reading about past failures is only useful if it changes future outcomes. If attackers can see your OT network, they can target it. If they can target it, compliance, safety, and uptime are already at risk.

BlastWave eliminates reconnaissance, initial access, and lateral movement — without agents, without downtime, and without changing IPs, protocols, or PLCs.

Secure Your OT Network