Hacktivist Group TwoNet Targets Water Utility Honeypot

Cyber Security News by CyberSum.net
5 sources
In September, the pro-Russian hacktivist group TwoNet staged an intrusion against a water treatment utility honeypot. By exploiting default credentials and SQL-based schema extraction, the adversary created backdoor accounts and defaced the human-machine interface (HMI). This incident highlights the need for critical infrastructure organizations to deploy deception technologies and monitor hacktivist channels for accurate threat intelligence. The attack, originating from an IP registered to a hosting provider, involved manual SQL commands and a Linux-based Firefox workflow. The attacker defaced the HMI login page, deleted PLC data sources, adjusted setpoints, and disabled logs and alarms. TwoNet's pivot from DDoS to OT/ICS targeting coincides with the launch of a new Telegram channel, underscoring a broader hacktivist trend of using alliances to accelerate capability growth.