


But had the attacker been a bit savvier, the attack could easily have slipped further under the radar. This should serve as a blunt reminder and wake-up call that using consumer-grade remote access tools in both Operational Technology (OT) and Information Technology (IT) environments can introduce risk.įortunately, an employee monitoring the system noticed the threat actor’s activity in real-time and took the initiative to alert others and escalate a defensive response to prevent significant damage. Last Friday, a cyber threat actor audaciously cracked into the systems of a Florida water treatment plant leveraging the TeamViewer remote access tool, and ordered the system to increase the amount of lye in the water to extremely dangerous levels.
