Intentionally desktop-first — best experienced on a workstation
Portfolio
Critical Infrastructure Analysis · Water Security · Nation-State Threats

The Open Tap —
When Water Becomes a Weapon

Author
Yana Ivanov
Published
March 17, 2026
Classification
Public — Educational
Threat Type
ICS / SCADA / Water Supply
Confirmed Cases
Ukraine 2015 · Florida 2021
Severity
Critical — Structural Gap
EPA has no authority to mandate water cybersecurity  ·  70% of utilities failed basic standards  ·  9 million people served by a single unfiltered system
Section 01

Executive Summary

On December 23, 2015, a Russian intelligence unit logged into a Ukrainian power company's control system and switched off 30 substations. 225,000 people lost electricity in the middle of winter. The lights came back on in six hours — but Russian hackers had already learned something important: critical infrastructure runs on the same software as any other organization, is often connected to the internet, and is operated by humans who can be deceived.

On February 5, 2021, a hacker accessed the water treatment system of Oldsmar, Florida — a city of 15,000 people — and raised the level of sodium hydroxide from 100 parts per million to 11,100 parts per million. The attack was caught by an alert operator who was watching his screen. An attacker targeting a system with no one watching would have had 24 to 36 hours before anyone noticed the water had been poisoned. For Oldsmar, the number of people at risk was 15,000. For New York City, using the same type of attack against the same type of system, the number is 9 million.

Defining Assessment: This is not a hypothetical. The attack method has been demonstrated. The infrastructure is documented and publicly described. The regulatory gap is real and confirmed. What has not happened yet is a sophisticated nation-state actor targeting a major US water system with the intent to cause mass casualties. What is unclear is whether that is because the capability does not exist, or because no one has decided to use it yet.

water_drop
NYC Daily Volume
1.1B
Gallons per day — the largest unfiltered water supply in the United States
people
Population Served
9M+
People — nearly half the population of all of New York State
filter_alt_off
Unfiltered Supply
90%
Of NYC water is disinfected but not filtered — the largest such exemption in the US
gavel
Mandatory Cyber Rules
0
EPA has no statutory authority to mandate cybersecurity for water utilities
Section 02

Confirmed — What Russia Did in Ukraine

Ukraine is the most documented case study in critical infrastructure attack. Beginning in 2015, Russian intelligence services used it as a live testing environment. The attacks were real, the effects were documented by US government investigators, and the techniques were published — because what works in Ukraine almost always translates elsewhere.

The 2015 Power Grid Attack — First Confirmed Cyberattack on a Power Grid in History

In the months before the attack, Russian hackers gained access to Ukrainian power company networks through spear-phishing emails containing malicious Microsoft Word attachments — the same technique used in countless corporate intrusions. They moved quietly through corporate networks until they reached the Industrial Control Systems. Then, on December 23, 2015, they acted.

Figure 1 — The 2015 Ukraine Grid Attack: How It Unfolded
email
Stage 1 — Spear-Phish Entry
Malicious Word documents delivered to corporate network. BlackEnergy 3 malware installed silently. Attackers establish initial foothold in the corporate IT environment — months before the attack.
manage_search
Stage 2 — Months of Reconnaissance
Lateral movement through the corporate network. Operators watched and mapped. Credentials harvested. Industrial Control Systems identified and studied. Attackers learn the system before touching it.
toggle_off
Stage 3 — 30 Substations Off
SCADA systems seized simultaneously across three power companies. Breakers opened remotely. 225,000 people lose power in the middle of winter — December 23, 2015.
phone_disabled
Stage 4 — Cover and Chaos
KillDisk malware wipes control servers, preventing digital restoration. Call centers simultaneously flooded with denial-of-service attacks to block emergency alerts. Manual restoration only — takes 1–6 hours.
dark_mode
Stage 5 — 225,000 Without Power
Mid-winter. Digital controls destroyed. Restoration required manual intervention at every substation. Ukraine recovered within hours only because analog backup controls still existed. The 2016 follow-on attack was designed to prevent that.
This was the first publicly confirmed successful cyberattack on a power grid in history. It has since been replicated and improved upon.

The 2016 Escalation — Designed for Permanent Damage

A year later, Russian hackers returned with Industroyer — a new malware built specifically for industrial control systems. The 2016 Kyiv attack cut one-fifth of the capital's power consumption. But investigators noted something more alarming than the outage itself: the attack was designed not just to turn the power off, but to physically destroy the equipment used to turn it back on. When operators attempted to restore power, the malware was configured to trigger conditions that would damage the station hardware — making the attack potentially weeks-long rather than hours-long. An operator caught the error in time.

The escalation pattern matters: 2015 was disruption — turn off the lights, restore them, send a message. 2016 was designed for permanent damage — destroy the hardware, make restoration impossible. A nation-state actor targeting US water infrastructure would not necessarily be interested in a short disruption. The intent could be to make restoration take weeks.

check_circle What Ukraine Had Working For It

Manual backup controls were still installed — operators could restore power physically when digital controls were destroyed.

Infrastructure was old Soviet equipment that Russian hackers knew intimately — but the age also meant analog fallbacks existed.

Western cybersecurity firms (ESET, Microsoft) helped Ukraine respond to the 2022 follow-on attacks before they succeeded.

Power came back within hours to days. No confirmed casualties directly attributed to the outages.

cancel What the US Does Not Have

Many US utilities have replaced analog backup controls with digital systems — in some cases, manual restoration is no longer possible without the control software.

Water contamination cannot be "switched back on" — once chemical levels are altered and the water reaches distribution, reversal requires flushing the entire network.

No mandatory cybersecurity standards for water utilities. Compliance is voluntary. The EPA cannot compel improvements.

An attack on NYC water at Oldsmar scale would not resolve in 6 hours. It would affect 9 million people over days.

Section 03

The Florida Proof of Concept — Oldsmar 2021

In February 2021, an unknown attacker accessed the water treatment control system of Oldsmar, Florida using remote desktop software that was already installed and authorized on the system. The access did not trigger any alerts because the tool was a legitimate one. The operator whose computer was accessed noticed the intrusion because he was watching his screen at the moment a cursor began moving on its own.

Over three to five minutes, the attacker navigated the control interface — learned it in real time — and located the sodium hydroxide dosing controls. They changed the setting from 100 parts per million to 11,100 parts per million: 111 times the normal level. Sodium hydroxide is the primary ingredient in drain cleaner. At those concentrations, the water would cause chemical burns to the mouth, throat, esophagus, and stomach of anyone who drank it. The operator reversed the change immediately. But if he had not been watching — if this had happened at 3am, or if the operator had stepped away — the window before anyone noticed would have been 24 to 36 hours. By then, the water would already be in the distribution network.

Note on the Oldsmar investigation: Subsequent reporting raised questions about whether the intrusion was an external attack or an internal error. The FBI investigation was inconclusive, and a former city manager later described it as a possible employee mistake. What is not disputed: the control system was remotely accessible, the chemical change happened, and the only thing that caught it was an operator watching at the right moment. The vulnerability demonstrated is real regardless of the source.

What the Chemistry Means in Plain Terms

science
Normal Level
Sodium hydroxide at 100 ppm is used to control water acidity and prevent pipe corrosion. At this level, it is safe and tasteless — necessary for water quality.
warning
Attacked Level: 11,100 ppm
At 111× normal concentration, water becomes strongly alkaline. pH rises dangerously. The substance is functionally drain cleaner delivered through every tap in the service area.
local_hospital
Human Effects
Symptoms of sodium hydroxide poisoning: chemical burns to mouth and throat, severe abdominal pain, vomiting, breathing difficulty, lung inflammation, and potential vision loss.
water
Tasteless Until Too Late
At moderately elevated pH, water is not obviously different in taste or appearance. A person drinking from the tap would have no immediate indication something was wrong.
timer
Detection Window
24–36 hours for water to reach the distribution network. Once distributed, contaminated water is in pipes, storage tanks, and buildings — flushing the entire system takes days.
people
Oldsmar vs NYC Scale
Oldsmar serves 15,000 people. NYC's Catskill/Delaware system serves 9 million people with 90% unfiltered water. Same attack method — 600× the impact.
Section 04

New York City — Why This System, Why These Numbers

New York City's water supply delivers 1.1 billion gallons of drinking water per day to 8.5 million city residents and approximately 1 million people in surrounding counties — a total of over 9 million people. This represents nearly half the population of all of New York State.

The source is the Catskill and Delaware watershed system — 19 reservoirs and three controlled lakes spanning 2,000 square miles of upstate New York, connected to the city by gravity-fed aqueducts running up to 125 miles. The Catskill/Delaware system alone provides 88–90% of the city's daily water. And here is the detail that matters for a threat scenario: 90% of that water is not filtered. It is treated only with chlorine and ultraviolet disinfection. The system received a federal waiver from filtration requirements based on the quality of its protected watershed. That waiver has been in place since 1997.

location_city
OLDSMAR, FLORIDA — 2021
Confirmed attack target
15,000
Population served
~1M gal
Estimated daily volume

Attacker gained access via TeamViewer remote desktop. Caught by an operator watching his screen. Investigation inconclusive on whether external or internal. Chemical change reversed in under 5 minutes.
location_city
NEW YORK CITY — CATSKILL / DELAWARE
Largest unfiltered supply in the US
9,000,000+
Population served
1.1 billion gal
Daily volume — 90% unfiltered

90% of daily supply passes through disinfection only — no filtration. Water is tested at 50 monitoring stations daily. A chemical manipulation at the treatment stage would need to register before the water is distributed — within the same 24–36 hour window.

The Unfiltered Supply — Understanding the Exemption

Most cities filter their drinking water through physical filtration systems that remove pathogens, chemicals, and contaminants that survive disinfection. New York City received a federal waiver allowing it to skip this step because its watershed is unusually well-protected — largely forested, with strict development restrictions and extensive monitoring. The city invested approximately $1 billion in watershed protection programs to maintain this exemption.

What this means for a threat scenario: the Catskill/Delaware water passes through ultraviolet disinfection and chlorination, then travels directly into the distribution network. A chemical intervention at the treatment stage — increasing a dosing chemical to dangerous levels, as demonstrated in Florida — would not be caught by a filtration barrier because no filtration barrier exists for 90% of the supply. Detection depends on water quality sensors and human monitoring.

The monitoring reality: NYC DEP tests water at 50 monitoring stations daily. But daily testing means the interval between checks can be up to 24 hours — precisely the same window an attacker would have to work in. Real-time chemical sensors exist at treatment facilities, but a sophisticated attacker with SCADA access could potentially manipulate sensor readings alongside dosing controls — as Russia demonstrated was possible in Ukraine's power systems.

Section 05

The Scenario — Hour by Hour

This is not speculation. Every step of the following scenario is drawn from documented events: the Oldsmar attack method, the Sandworm reconnaissance model from Ukraine, and the confirmed characteristics of the NYC water system. What follows is what a plausible attack looks like if a sophisticated nation-state actor decided to execute it.

Figure 2 — Scenario Timeline: A Nation-State Attack on NYC Water
Months Before — Reconnaissance Phase
Initial Access — Corporate Network
Spear-phishing email targets an IT administrator at the NYC Department of Environmental Protection. Malware is installed on a corporate workstation. Attackers spend weeks or months mapping the network — identical to the Ukraine power grid playbook. They identify the OT (Operational Technology) network segments that control treatment systems.
Weeks Before — Staging Phase
SCADA Credentials Harvested
Operators' credentials are captured through keyloggers or credential-harvesting tools. Attackers study the Human-Machine Interface — learn the layout, the controls, the dosing systems — without triggering any alerts. Remote access tools are staged. They know exactly where the sodium hydroxide or chlorine controls are before they act.
Day 0 — 3:00 AM
Attack Initiated at Night Shift Minimum
Skeleton crew on shift. Attack begins during the lowest-attention window. Chemical dosing controls are accessed. Concentrations are raised to dangerous levels across multiple treatment points simultaneously — not just one facility. Sensor data is optionally manipulated to show normal readings.
Day 0 — 3:00 AM to 6:00 AM
Contaminated Water Enters Distribution
The altered water begins moving through the aqueduct and distribution network. At this stage, the contamination is already in transit. Even if the attack is discovered now, water already in the pipeline cannot be recalled — it must be flushed through. The 1.1 billion gallon daily volume means hundreds of millions of gallons are already compromised.
Day 0 — 6:00 AM to Noon
Morning Demand Spike — Maximum Distribution
Morning peak demand. Millions of people brush their teeth, make coffee, fill glasses of water. Symptoms of mild sodium hydroxide exposure — throat irritation, stomach discomfort — may initially be attributed to illness. There is no visible indicator in the water. Emergency services begin receiving calls, but the pattern is not yet recognized as an attack.
Day 0 — Noon Onwards
Discovery and Cascade Begins
A monitor or physical inspection detects the chemical anomaly. Emergency orders are issued to stop using tap water. But the water is already in millions of building storage tanks, restaurant kitchens, hospital systems, and dialysis centers — which require ultra-pure water continuously. Boil-water notices are useless for a chemical contaminant — boiling concentrates alkaline chemicals, it does not remove them.
Each stage is documented in real-world precedents. Nothing in this scenario requires a capability that has not already been demonstrated.

The 24–36 Hour Window Is the Threat

In Oldsmar, the attack was caught because an operator was watching his screen at the exact moment it happened. That is the only control that worked. In a sophisticated attack with credential access, sensor manipulation, and nighttime execution, that control does not exist. The 24–36 hour window before water reaches taps is not a safety margin — it is the attack window. By the time the contamination is confirmed and traceable, the distribution is already complete.

Contamination Initiated
bedtime
T+0
3:00 AM. Night shift. No alert. Chemical levels altered at treatment stage.
Water in Distribution
water
T+6h
Water enters distribution network. Hundreds of millions of gallons in transit. No recall possible.
Peak Exposure
people
T+9h
Morning demand spike. Maximum population exposure. Symptoms begin — attributed to stomach illness.
System Flush
refresh
T+72h+
System flush requires days. 1.1 billion gallons daily. Safe water confirmed only after full distribution purge.
Section 06

The Cascade — What Else Stops Working

A water supply disruption is not just a water problem. Modern cities run on safe water in ways that are invisible until it is gone. A multi-day water security incident in New York City would not stay in the water system — it would cascade into every dependent system simultaneously.

local_hospital
Hospitals and Dialysis
Dialysis patients require ultra-pure water — even elevated pH is lethal for dialysis. NYC has dozens of dialysis centers. Hospitals need continuous safe water for surgery, sterilization, medication preparation, and patient care. A water emergency immediately creates a medical emergency for the most vulnerable patients.
local_fire_department
Fire Suppression
Fire suppression systems in buildings and hydrants depend on water pressure and availability. In a city of high-rise buildings, fire response relies entirely on the municipal water supply. A system-wide shutdown degrades fire response across all of New York City simultaneously.
restaurant
Food Service and Industry
Restaurants, food processing, beverage production — all halted immediately. NYC's food supply chain for 9 million people depends on tap water for washing, cooking, and sanitation. A boil-water advisory is useless for chemical contamination; a full do-not-use order shuts down the food economy.
school
Schools and Public Buildings
Thousands of schools, government buildings, and public facilities close immediately on a do-not-use water order. The cascading social and economic disruption ripples across the region — with knock-on effects on working parents, emergency services, and public health infrastructure.
local_grocery_store
Bottled Water Collapse
A do-not-use order for 9 million people would exhaust available bottled water supplies within hours. Supply chains for emergency water distribution — tanker trucks, National Guard resources — are not scaled for a multi-day event affecting half the population of New York State.
psychology
Public Confidence
After a confirmed deliberate attack on municipal water, public confidence in tap water takes years to rebuild — regardless of remediation. The psychological and economic costs of a population that no longer trusts its water supply are incalculable and persistent.

The Ukraine lesson applied: When Russia cut power to Kyiv for one hour in 2016, the attack was contained and the city recovered quickly. But Dragos Security confirmed the malware was designed to cause permanent physical damage — it was only an operator error in the attack code that prevented it. A water attack with the same intent — not disruption, but permanent damage — would not be over when the water is flushed. It would mean destroying the treatment infrastructure itself, making restoration take weeks, not hours.

Section 07

The Regulatory Gap — Why Nobody Is Required to Do Anything

In 2024, the EPA inspected water utilities across the United States and found that 70% failed to meet basic cybersecurity standards — including facilities using default passwords on internet-connected systems. This is not a secret finding. It has been reported publicly. Congress has heard testimony about it. And the EPA still cannot legally require water utilities to fix it.

The fundamental problem is statutory authority. Unlike power grids, aviation, financial systems, and now healthcare — which have mandatory federal cybersecurity requirements — water utilities operate under frameworks where cybersecurity guidance is voluntary. The EPA can publish best practices. It can offer grants. It cannot compel compliance.

Infrastructure Sector Cybersecurity Mandate Status
Power Grid — NERC CIP standards
Mandatory federal cybersecurity requirements enforced by FERC. Utilities face fines for non-compliance.
Mandatory
Aviation — TSA cybersecurity requirements
Mandatory security directives issued post-Colonial Pipeline. Critical systems must meet defined standards.
Mandatory
Pipelines — TSA Pipeline Security Directives
Mandatory directives after Colonial Pipeline ransomware — incident reporting, access controls, patching required.
Mandatory
Healthcare — HIPAA and HHS cyber rules
Mandatory security standards under HIPAA. New HHS rules (2024) expanding cybersecurity requirements.
Partial
Water Utilities — EPA jurisdiction
EPA has no statutory authority to mandate cybersecurity requirements. All guidance is voluntary. 70% of inspected utilities failed basic standards in 2024.
None
Wastewater Systems — EPA jurisdiction
Same gap as water utilities. No mandatory federal cybersecurity standards. Compliance entirely voluntary.
None

What NIST and CISA Provide — and What They Cannot Do

NIST published the Cybersecurity Framework. CISA maintains sector-specific guidance for water and wastewater systems. Both are excellent resources. Both are completely voluntary. A water utility that reads every document, attends every webinar, and implements zero recommendations faces no legal consequence. There is no audit, no penalty, no enforcement mechanism.

The 70% figure in context: The EPA found that 70% of inspected water utilities had cybersecurity deficiencies serious enough to merit concern — including default passwords on internet-facing control systems. Default passwords. On systems controlling the chemical treatment of water for millions of people. This is not a sophisticated advanced persistent threat problem. This is a patch-your-router problem that was never addressed because nobody was required to address it.

Section 08

What Good Security Looks Like — The CISO Checklist

The controls that would prevent or limit a water infrastructure attack are not exotic. They are the same foundational security practices required everywhere else. The gap is not capability — it is mandate and funding. For utilities that want to get ahead of eventual requirements, or for security professionals advising them, this is where the effort should be concentrated.

Internet-exposed ICS / SCADA systems with default or weak credentials
Require strong unique credentials, MFA where supported, and remove all default passwords before internet connection
NIST CSF 2.0: PR.AA-01 / CISA WaterISAC Baseline
Critical Gap
No network segmentation between corporate IT and OT / ICS environments
Air-gap or strictly zone-segment OT networks from corporate IT — no lateral movement path from phishing target to SCADA system
NIST SP 800-82 Rev.3: OT/ICS Network Architecture
Critical Gap
Remote access to control systems via consumer tools (TeamViewer, AnyDesk, VNC)
Replace consumer remote access with VPN + MFA enforced access to a hardened jump server; log and alert on all remote sessions
CISA ICS-CERT Advisory / NIST CSF 2.0: PR.AA-05
Critical Gap
No independent physical safety systems on chemical dosing controls
Deploy hardware-enforced limits on chemical dosing — physical interlocks that cannot be overridden by software alone, regardless of SCADA compromise
CISA Advisory AA21-042A / ICS Independent Safety Layer
High Gap
No continuous monitoring or anomaly detection on OT network traffic
Deploy OT-specific monitoring (Dragos, Claroty, or equivalent) to baseline normal ICS behavior and alert on anomalous commands
NIST CSF 2.0: DE.CM-01 / CISA WaterISAC
High Gap
No incident response plan specific to water treatment compromise
Maintain and exercise a water-specific IR plan: who calls who, what systems get isolated, how public notification happens, and when EPA/CISA are notified
America's Water Infrastructure Act (AWIA) — Risk and Resilience Assessment
High Gap
No offline backups of ICS configurations and no tested manual override capability
Maintain offline, air-gapped backups of all SCADA configurations; preserve and test manual control capability so restoration does not depend on compromised software
CISA Critical Infrastructure Resilience / Ukraine Lessons Applied
High Gap

The One Control That Stopped Oldsmar

A trained operator watching his screen at the exact right moment. That was the entire defense. Water utility security cannot depend on that. The controls above — network segmentation, hardware interlocks, continuous monitoring, credential hygiene — are what makes a sophisticated nation-state attack difficult rather than trivial. None of them require exotic technology. Most of them are already mandatory for power utilities, pipelines, and aviation. For water, they remain voluntary suggestions.

Section 09

Conclusion — The Tap Is Open

Russia demonstrated in Ukraine that critical infrastructure control systems can be accessed, studied, and manipulated by nation-state actors who are patient, skilled, and have years to prepare. They demonstrated it with power grids in 2015 and 2016. An unknown attacker demonstrated it with a water treatment plant in Florida in 2021. The only reason the Florida attack did not cause harm was an operator watching his screen. The only reason a Ukraine-scale attack has not happened to US water infrastructure is — as far as anyone can publicly confirm — that no nation-state actor has decided to execute one yet.

The Catskill/Delaware system serves 9 million people with 1.1 billion gallons per day of water that is disinfected but not filtered. It is the largest unfiltered water supply in the United States. The EPA cannot legally require the utilities in this system — or any water utility — to implement mandatory cybersecurity controls. 70% of utilities inspected in 2024 had basic deficiencies. Some were still using default passwords on internet-connected systems controlling the water that nearly half of New York State drinks every morning.

This is not a failure of technology. The tools that would harden these systems exist and are deployed in other sectors. It is a failure of regulatory priority. Water has been left off the mandatory compliance list while power, pipelines, and aviation were addressed. The argument for continuing to leave it off that list is difficult to make when the precedent — a working proof of concept against a US water treatment plant in 2021 — is already documented and publicly acknowledged by federal law enforcement.

The number that should end the policy debate: 9 million people. Nearly half the population of New York State. Served by a single gravity-fed system that reaches their taps with no filtration barrier. The only thing standing between a sophisticated attacker and mass chemical exposure to 9 million people is a set of voluntary guidelines that 70% of water utilities are not following — and no law that requires them to.

All findings in this report are based on publicly available information including CISA ICS-CERT advisories, Congressional Research Service reports, the National Academies Review of the NYC Watershed Protection Program (2020), Wikipedia documentation of the 2015 and 2016 Ukraine power grid attacks attributed to GRU/Sandworm, CNN, NPR, and CyberScoop reporting on the Oldsmar Florida incident, and EPA inspection reporting. Ukraine power grid casualty figures reflect the known disruption scope; no confirmed direct deaths from the grid attacks were established in public reporting. This represents the author's independent analysis and does not reflect the views of any employer or client organization.

YI
Yana Ivanov
Security Analyst  ·  CMMC Compliance Analyst  ·  SiteWave Studio

Yana Ivanov is a security analyst and CMMC compliance consultant based in Connecticut, specializing in cybersecurity risk assessment for defense contractors in the Connecticut defense industrial base. With 15 years of enterprise technology experience and an MS in Information Systems, she brings a practitioner perspective to threat intelligence analysis. She is currently pursuing CompTIA Security+ and CMMC Registered Practitioner certification, with a focus on helping defense supply chain companies achieve genuine — not checkbox — security compliance. This analysis was produced independently as a contribution to the security community's understanding of active threats against US defense infrastructure.

Portfolio