top of page

Dam Hack in Norway Puts Spotlight on Basic Cyber Gaps; U.S. Water Utilities Also Under Scrutiny

 

Aug. 16, 2025 — Norwegian authorities say pro-Russian hackers remotely opened a valve at a small dam in Bremanger for roughly four hours this spring. The hackers were able to briefly increase water flow which underscores how weak access controls can translate into real-world effects.

 

Investigators said the breach was not highly sophisticated and likely involved a weak password.

 

A video of the dam’s control panel later surfaced on Telegram with markings from a pro-Russian group. No injuries or major damage were reported. 

 

Police security chief Beate Gangås framed the incident as part of a broader campaign by pro-Russian actors to sow fear and disruption across Europe.

 

Local reports noted the dam isn’t tied to power generation, but officials called the episode a first-of-its-kind public attribution in Norway.

 

Estimates of the released volume reached about 1.9 million gallons before operators regained control. Russia’s embassy in Oslo denied involvement. 

 

U.S. context: routine advisories, lingering gaps

 

The Norway case lands as U.S. agencies continue to warn about cyber risk in the water sector.

 

An EPA enforcement alert last year urged drinking-water systems to shore up basic defenses. Their suggestions include locking down exposed interfaces, eliminating default passwords, enabling multifactor authentication (MFA), and segmenting operational technology (OT) from business networks.

 

The agency’s inspector general later reported that over 70% of inspected water systems fell short on statutory cybersecurity obligations tied to risk and resilience planning. 

 

Meanwhile, the Cybersecurity and Infrastructure Security Agency (CISA) has kept up a steady cadence of industrial-control advisories.

 

This week alone, CISA published 32 ICS advisories covering vulnerabilities and mitigations across a range of vendors. Operators say that this guidance is useful but resource-intensive to implement on legacy plants. 

 

 

 

 

 

 

 

 

 

 

Recent U.S. incident shows disruption without touching pumps

 

Sector attention has also been shaped by a 2024 cyber incident at American Water, the nation’s largest publicly traded water utility.

 

The company disclosed it had to disconnect and methodically reactivate customer-facing systems, including billing, after detecting unauthorized activity in early October.

 

The event did not translate into treatment or distribution outages, but it demonstrated how IT disruptions alone can affect operations and customers. 

 

Why it matters

  • Credential-to-consequence is getting shorter. The Norwegian case shows how a single gap can lead to a physical outcome—even if the target isn’t tied to the power grid. 

  • Compliance isn’t coverage. EPA’s findings indicate many U.S. systems still lack bedrock controls, leaving them exposed to the same low-sophistication tactics Norwegian officials described. 

  • The threat tempo is high. Dozens of ICS advisories in a single week reflect a vulnerability landscape that defenders must track amid staffing and budget constraints. 

 

The dam incident in Norway is a narrow event with outsized implications. It reinforces what U.S. regulators have been saying for more than a year: for critical infrastructure, the biggest gains still come from unglamorous controls. Credential hygiene, MFA, segmentation, and rehearsed manual procedures need to be implemented and maintained before a nuisance becomes a headline. 

 

(Sorces:AP News, EPA, Tech Target, POLITICO)

norwegian-dam-cyberattack.avif
Picture by Cybernews
Sponsor
Sponsor
XPDS424-Device-2-600x600 (1).jpg
Wireless-Pro-Touch-6-12-Remote-and-Receiver-1.jpg
XPD12-Device-600x600 (1).jpg
Hidow-XPDS-18.jpg

Cutting Edge Pain Technology

Relieve: 

Back Pain

Neck Tension

Joint Pain

And Much More

Use code PAIN FREE
and save 50% 
bottom of page