• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Mobile

Poland water treatment plants breached by hackers using default passwords as US faces same critical infrastructure threat

May 8, 2026
Share on FacebookShare on Twitter

TL;DR

Hackers breached five Polish water treatment plants using default passwords and internet-exposed control systems. Poland is spending a billion euros on cybersecurity; 70 per cent of American water utilities fail the same basic standards.

Hackers breached five Polish water treatment plants in 2025, gaining access to the industrial control systems that regulate pumps, filters, and chemical dosing. In some facilities, the attackers could have altered the operational parameters of equipment that determines what comes out of the tap. The attack vector, in every case, was unremarkable: weak passwords and control systems connected directly to the internet.

Poland’s Internal Security Agency, the ABW, disclosed the breaches this week in its first public activity summary since 2014, before Russia annexed Crimea. The report names the facilities: JabÅ‚onna Lacka, Szczytno, MaÅ‚dyty, Tolkmicko, and Sierakowo, five small towns whose water treatment stations were found to have been penetrated by attackers the agency attributes, with careful phrasing, to “hacktivist groups” that are “often personas used by foreign governments, particularly Russian intelligence services.”

The breaches

The incidents were not theoretical. In Szczytno, in May 2025, someone accessed the supervisory control system and changed flushing cycles while the facility was being monitored on a live feed. In JabÅ‚onna Lacka, in September, a video captured an intruder logging in through an admin account and manipulating pump and filter thresholds. The ABW said the attackers had the ability to alter technical parameters of devices, creating “a direct risk” to the continuity of water supply operations.

The agency identified two primary attack vectors: passwords that had not been changed from factory defaults and industrial control systems exposed directly to the public internet. Neither vulnerability requires sophisticated tooling to exploit. Both have been documented in cybersecurity advisories for more than a decade.

TNW City Coworking space – Where your best work happens

A workspace designed for growth, collaboration, and endless networking opportunities in the heart of tech.

The ABW report names Russian APT groups including APT28 and APT29, and the Belarusian-linked group UNC1151, as operating against Polish targets. The agency stopped short of attributing specific water treatment breaches to specific groups, but the pattern is consistent with a broader escalation that Poland’s government says has made the country the target of between 20 and 50 cyberattacks per day.

The escalation

Cyberattacks on Poland surged after the election of its pro-Ukraine government, and the tempo has not slowed. In December 2025, a coordinated attack hit a combined heat and power plant supplying heat to almost 500,000 customers, along with multiple wind and solar farms. The cybersecurity firm ESET attributed the attack to Sandworm, a group the United States government has linked to Russia’s military intelligence directorate, the GRU.

Poland’s cybersecurity budget for 2026 is a record one billion euros, up from 600 million in 2024. Of that, 80 million euros has been allocated specifically to the cyber defences of water management systems. Germany has absorbed 90 per cent of Europe’s record defence tech funding, but Poland’s per-capita spending on cybersecurity now exceeds that of most NATO members.

The spending reflects a recognition that the threat has moved beyond espionage. Helsing, the European military AI startup, raised 450 million euros explicitly to defend NATO from Russia, and Ukraine’s emergence as a defence tech powerhouse has demonstrated that the countries closest to Russia’s borders are now building the capabilities to respond. But the water treatment plants in JabÅ‚onna Lacka and Szczytno were not breached by advanced persistent threats deploying novel exploits. They were breached because someone left the default password on a system connected to the internet.

The American parallel

The United States faces the same vulnerability at a larger scale. In 2024, the Environmental Protection Agency found that nearly 70 per cent of water utilities inspected by federal officials were in violation of basic cybersecurity standards, including the failure to change default passwords. The largest regulated water and wastewater utility in the country, American Water, was forced to shut down its billing systems in October 2024 after a cyberattack disrupted services for millions of customers.

The threats are not hypothetical. The Chinese state-sponsored group Volt Typhoon has compromised the information technology environments of multiple US critical infrastructure organisations, including water and wastewater systems, in what CISA, the NSA, and the FBI assess is an effort to pre-position for disruptive or destructive cyberattacks in the event of a major crisis or conflict. The Iranian-affiliated group CyberAv3ngers has targeted programmable logic controllers at US water treatment plants, including facilities in Pennsylvania.

The EPA, CISA, and the FBI have issued repeated advisories. Congress temporarily reinstated cybersecurity information-sharing authorities in November 2025, then let them lapse again in January 2026. The federal government has published cybersecurity planning tools, incident response templates, and procurement checklists. The water utilities that need them most are the ones least likely to use them: small municipal systems with limited budgets, ageing infrastructure, and no dedicated cybersecurity staff.

The gap

Defence stocks are surging across Europe as governments pour money into military technology. Poland is spending a billion euros on cybersecurity. NATO is funding innovation accelerators and defence AI alliances. The investment reflects an accurate assessment of the threat.

But the water treatment plants that were breached in Poland were not protected by any of it. The facilities in Jabłonna Lacka and Szczytno were running control systems with factory-default credentials exposed to the internet. The American utilities that the EPA found in violation of basic standards are running the same configuration. The sophistication of the attacker is irrelevant when the front door is unlocked.

Poland’s ABW published its first activity summary in a decade because the scale of the threat has made silence untenable. The United States has published advisory after advisory. The pattern is consistent across both countries: the governments that understand the threat best are the ones whose critical infrastructure remains most exposed, because the systems that treat drinking water are operated by municipalities that lack the resources, the expertise, or the regulatory compulsion to secure them. The hackers who breached five Polish water plants did not need a zero-day exploit. They needed a password.

Next Post

Whoop will give users on-demand video access to clinicians

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • Amazon Web Services outage enters second day. Here’s what we know.
  • Why pay for 20 different AI subscriptions when this has all of them for $75?
  • Gmail’s ‘Help me write’ can now mimic how you speak to create emails for you
  • Whoop will give users on-demand video access to clinicians
  • Poland water treatment plants breached by hackers using default passwords as US faces same critical infrastructure threat

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously