Just a few years ago, cyber threats to the water and sewage sector seemed distant and theoretical. Today, they are a brutal reality. Reports of another attack on a water treatment plant in Poland show that the infrastructure responsible for providing basic services to citizens has become the focus of cybercriminals.
Some of the cyber attacks have been confirmed by the CERT Polska team, which operates within the structures of NASK – the National Research Institute. Details can be found in the article on the website:
Recommendations for strengthening the protection of OT systems | CERT Polska
The growing wave of cyberattacks on critical infrastructure
Just a few years ago, cyber threats to the water and sewage sector seemed distant and theoretical. Today, they are a brutal reality. Reports of another attack on a water treatment plant in Poland show that the infrastructure responsible for providing basic services to citizens has become the focus of cybercriminals.
The problem is not limited to Poland. In the United States, there was widespread coverage of an alleged attack on the water supply control system in Florida, where, according to reports, hackers attempted to raise the level of harmful substances in the water. Although the information on this case remains unclear, it is worth paying attention to the problem itself and drawing conclusions from it. There have also been cases of attempted interference with energy and water management systems in Europe. The trend is clear – attacks are increasingly targeting critical infrastructure, as striking it has the greatest destabilising effect.
Water supply systems are inherently distributed and rely on numerous telemetry devices. They often connect multiple stations , pumping stations, sensors and control systems. Each of these elements becomes a potential entry point for an attacker. If cybercriminals gain access to such a system, they can not only interrupt the water supply, but also attempt to manipulate its quality – and this poses a direct threat to human health and life.

The European Union has responded to the growing threats by adopting the NIS2 Directive, which came into force in October 2024. The new regulations significantly expand the list of sectors and entities required to ensure a high level of cybersecurity.
They include, among others:
What does this mean in practice? The Directive imposes an obligation on entities to implement a number of mechanisms:

NIS2 also changes the responsibilities of managers. The management of companies and institutions should be aware of their responsibility to implement security measures. This enforces a new culture of IT and OT management.
IT (Information Technology) – all computer systems and networks used for data processing: computers, servers, office software, e-mails, databases, ERP systems. In short, the world of digital information in a company.
OT (Operational Technology) – operational technology, systems and devices that control physical processes: PLC controllers, SCADA, sensors, production lines, industrial equipment, water treatment plants and power grids. In short, the world of machines and industrial automation.
Water supply systems are largely based on equipment and software developed many years ago, which were not designed with today’s cyber threats in mind. Many installations still use unsecured communication protocols, and updates are rarely implemented, mainly due to concerns about service interruptions. As a result, security issues often take a back seat to the daily responsibilities of technical teams.
In practice, this means that a potential attacker does not need to have advanced skills – all they need to do is exploit weak passwords, lack of transmission encryption or vulnerable software. For this reason, the water and sewage sector today requires special attention and support in terms of modernising OT systems and improving cybersecurity.
Water supply systems are largely based on equipment and software developed many years ago, which were not designed with today’s cyber threats in mind. Many installations still use unsecured communication protocols, and updates are rarely implemented, mainly due to concerns about service interruptions. As a result, security issues often take a back seat to the daily responsibilities of technical teams.
In practice, this means that a potential attacker does not need to have advanced skills – all they need to do is exploit weak passwords, lack of transmission encryption or vulnerable software. For this reason, the water and sewage sector today requires special attention and support in terms of modernising OT systems and improving cybersecurity.
Key features of OT systems:
Examples of OT applications:

Attacks on critical infrastructure are not a thing of the future – they are happening now. Due to its social importance, the water and sewage sector has become a natural target for cybercriminals. The NIS2 Directive requires entities to take real action in the area of cybersecurity. For many entities, this means investing in modern solutions and changing their approach to IT and OT infrastructure management.
The challenge is enormous, but what is at stake is the safety of citizens and the economy (continuity of water supply). Responsible implementation of new standards and the use of proven technologies is the only way to effectively meet the demands of the digital reality.



