The Oldsmar Water System Attack: What It Can Teach Us

The Oldsmar Water System Attack: What It Can Teach Us


Last week’s attack on the Oldsmar, Florida, water system demonstrated that critical infrastructure operations are under constant threat of cyber attacks, and that a successful attack can have life-threatening consequences.

Fortunately, the Oldsmar breach was detected and addressed before any harm was done. And while it may be months before we have all the details of this particular attack, it serves as a reminder of realities that every critical infrastructure organization must confront.

It can happen anywhere

There’s nothing about a water treatment facility in Oldsmar, Florida that would make it an obvious target for an attack, but that’s the point. Threat actors don’t limit their attacks to large, high-profile targets. Smaller organizations—with less money to spend on cybersecurity—are ideal for testing out or demonstrating new attack techniques.

And as a reminder, attackers don’t need to single out their victims in advance—they let automated tools run in the background, searching for user credentials (or other vulnerabilities) at thousands of organizations at once. Once they find a vulnerable network, they can choose their moment to exploit it, or sell access to other threat actors.

Connectivity creates risk

Remote access and internet connectivity have become facts of life for many critical infrastructure organizations, especially during the pandemic. But new network connections create new possibilities for a security breach.

Government cybersecurity experts and standards bodies have been proposing for years strategies and techniques to limit exposure and prevent breaches at facilities like Oldsmar. These are outlined in the Department of Homeland Security’s publication Seven Steps to Effectively Defend Industrial Control Systems, and in the IEC 62443 standards for security in industrial communication networks. These publications recommend a defense-in-depth strategy, based on network segmentation and use of tightly controlled data flows into and out of plants, for managing the growing risks to critical infrastructure.

Owl Cyber Defense has helped water systems adopt these strategies and gain greater control over their data flows using data diode technology. To learn more about the DHS Seven Steps to Effectively Defend Industrial Control Systems and how Owl can help implement them, read our whitepaper Owl Supports DHS 7 Strategies.

Insights to your Inbox

Stay informed with the latest cybersecurity news and resources.

  • This field is for validation purposes and should be left unchanged.
Daniel Bartucci Cyber Security Strategist - Critical Infrastructure

Applying Zero Trust in Industrial Control Systems: Where It Works and Where It Breaks

Zero Trust is now the dominant paradigm in enterprise cybersecurity, but its practical application in Industrial Control Systems (ICS) presents unique challenges and opportunities. In cri...
October 21, 2025

Firewalls vs. Data Diodes: Why Hardware-Enforced Security Is Mission Critical for the Department of War

The persistent and evolving threat landscape demands an unwavering commitment to network security. For the Department of War and other high-assurance organizations, mission resilience is ...
October 6, 2025

Billington Cybersecurity Summit 2025: Building Federal Resilience on the Cyber and AI Frontiers

The 16th Annual Billington Cybersecurity Summit once again affirmed its status as one of the most significant cybersecurity gatherings for government, industry, and defense leaders. Held ...
September 17, 2025