Water utilities face rising cyber threats as Europe braces for ransomware attacks
Alarming trends in cyber threats targeting water utilities have been highlighted by Semperis, a leading identity-driven cybersecurity firm. The company's recent study, led by Yossi Rachman, revealed that compromised identity systems, particularly Microsoft Active Directory and Okta, are the primary entry points for the majority of these attacks. Meanwhile, Infosecurity Europe 2025 is set to address these concerns with an immersive ransomware simulation.
Semperis will host 'Operation 999' on June 4, 2025, from 16:00 to 18:00 BST at The Good Hotel in London, during Infosecurity Europe 2025. This event will simulate a cyber attack on water utilities, pitting a blue team of cyber defenders against a red team of attackers targeting SCADA systems and identities. Recent high-profile ransomware attacks against Southern Water and Thames Water in the UK underscore the sector's vulnerability.
The simulation aims to raise awareness about the growing geopolitical instability driving an unprecedented level of cyber threats against critical infrastructure organizations. According to Semperis, around 60% of utility operators were targeted by cyber-attacks within the past year, with 80% of those suffering multiple attacks. The study also found that 81% of these attacks originate from compromised identity systems, such as Microsoft Active Directory integration.
The 'Operation 999' simulation at Infosecurity Europe 2025 seeks to equip water utilities and other critical infrastructure organizations with insights to bolster their cybersecurity defenses. With water utilities being prime targets for cyber attacks that could disrupt essential services and impact public health, such initiatives are crucial in enhancing the sector's resilience against evolving cyber threats.