BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    Use Cases and Industries
    See All Products
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Cyber Attack on Water Treatment Plant a Wake-Up Call to Harden Remote Access Security

February 10, 2021

  • Blog
  • Archive

Last Friday, a cyber threat actor audaciously cracked into the systems of a Florida water treatment plant leveraging the TeamViewer remote access tool, and ordered the system to increase the amount of lye in the water to extremely dangerous levels. This should serve as a blunt reminder and wake-up call that using consumer-grade remote access tools in both Operational Technology (OT) and Information Technology (IT) environments can introduce risk.

Fortunately, an employee monitoring the system noticed the threat actor’s activity in real-time and took the initiative to alert others and escalate a defensive response to prevent significant damage. But had the attacker been a bit savvier, the attack could easily have slipped further under the radar. In fact, one of the scariest things about this attack is how unsophisticated the attacker seemed to be, yet was still able to compromise critical infrastructure by leveraging an unsecured remote access tool.

With OT systems, such as systems control and data acquisition (SCADA) systems and industrial control systems (ICS), increasingly exposed to the Internet and often easily discoverable by tools like Shodan, it’s imperative that the pathways into the environment be properly locked down. Time and time again, exploits such as this one demonstrate that basic or unsecured remote access tools absolutely do not cut it in any environment where security is an important consideration.

BeyondTrust provides the only Secure Remote Access solutions that meet the rigorous requirements of Federal Information Processing Standards Publication (FIPS) 140-2 Level 1. Our Privileged Remote Access and Remote Support products are designed with security at the forefront, with a unique architecture and features that make them secure and easy-to-use in any environment.

BeyondTrust secures remote access for customers across the world’s most complex and demanding environments. Our Secure Remote Access solutions provide:

  • Remote connection security: Every remote connection is outbound through Port 443, requiring no firewall changes. You can define permissions for every session, whether for attended or unattended access. Our solution also provides the ability to proxy access to RDP, SSH, cloud instances, and Windows/Unix/Linux applications.
  • Simple authentication: Centrally manages users with existing account directories, such as LDAPS, Kerberos, Smart Card, RADIUS, for simple and secure user management. Password management and two-factor authentication are built-in, and credentials are injected into sessions without ever exposing them to the end user or system.
  • Secure architecture. Our architecture provides each customer with a unique configuration and military-grade security. Your data is never co-mingled with data from any other customer.
  • Robust session management, auditing, & reporting. Everything that happens during remote sessions is logged and recorded. And reports are stored in a tamper-proof way.
  • Seamlessly integrates with other solutions: Seamlessly integrates with ITSM, SIEM, MFA, IAM, and other solutions to help you unlock synergies across your entire IT/security ecosystem.

Next Steps: Hardening Remote Access for Your Critical Infrastructure & Sensitive Assets

Government agencies and enterprises throughout the world have an immense responsibility to keep citizens and customers safe, and their data secure—at all times. Unfortunately, the use of consumer-grade remote access tools is rampant, and frequently inadequate, inappropriate, and out of compliance, for the use cases to which it is applied.

As federal and state agencies continue to be the target for threat actors, it’s incumbent upon IT and security teams to harden remote access to protect critical infrastructure and sensitive data to the level it demands and the public expects.


Whitepapers

The True Cost of Free Remote Support Software

Whitepapers

The Top 5 Remote Access Problems

Photograph of Julissa Caraballo

Julissa Caraballo, Product Marketing Manager

Julissa Caraballo is a Product Marketing Manager at BeyondTrust. She has over 10 years of experience in software product marketing and lead generation. Previously, Julissa worked as a Marketing Director for a medical management software company. She holds a BA in Business Administration/Marketing and a MBA in Healthcare Management. Her certifications include, Certified Digital Marketing Manager, Pragmatic Marketing Certified and Certified Medical Practice Executive. She can be found on LinkedIn and all social media platforms.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Up next

From February 9, 2021:
Privilege Management for Windows & Mac 21.1 Introduces Web Policy Editor, Azure AD Support, macOS M1 and Yubikey Support
From February 12, 2021:
Aligning Credential & Identity-Based Risk Management with Government Mandates

You May Also Be Interested In:

Whitepapers

The Operational Technology (OT) Remote Access Challenge

Whitepapers

A Zero Trust Approach to Secure Access

Webcasts

Tech Talk Tuesday: Managing Vendor Access

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.