Thales Article

Utility Control, Rewired: When Critical Infrastructure Goes Digital, So Do the Threats

By Thiago Branquinho (TI Safe) & Sergio Muniz (Thales)
 

In October 2024, Sabesp, Brazil’s water and sanitation utility, fell victim to a cyberattack that disrupted its customer service systems. The company confirmed the breach but offered few specifics about the nature or scope of the intrusion, leaving some questions unanswered. What is clear, however, is that this incident is not an isolated one. A year earlier, a municipal water authority in Pennsylvania had its systems breached as well. Attacks like these are no longer rare — and they fit into an unsettling global pattern: a rise in cyberattacks on critical infrastructure.

Critical Infrastructure Is Taking Digital Form

We usually don’t think of infrastructure as digital. Power lines are physical. So are water mains. But today, much of what keeps cities running is managed not by workers in boots, but by remote-access systems and software. The traditional form of infrastructure—concrete, steel, switches—is now exposed to a new kind of vulnerability, not rooted in rust or wear, but in access and unseen connections.

Utility Control, Rewired: When Critical Infrastructure Goes

Just a generation ago, if your neighborhood lost power, a technician would drive out and climb a pole to restore the line. Today, power grids can be manipulated remotely—sometimes even automatically. What once required physical presence now demands only digital access. This shift brings convenience, efficiency, and even resilience, until that access is granted to someone who really shouldn't have it.

Because while the controls governing our critical infrastructure are increasingly digital, their consequences remain physical. Imagine the fallout: a network gets breached and water doesn’t flow, lights don’t switch on, traffic signals stall, gas pressure spikes or vanishes. Protecting critical infrastructure systems from cyber threats has never been more urgent.

Every Security Layer Slows the Attacker Down

So how do we defend against attacks that can travel halfway around the world in milliseconds?

In response to recent incidents, experts have been rethinking how to best secure critical infrastructure. One approach consistently rises to the top: layered cybersecurity. Or, as one in-house training put it, “Layer your defenses like a good lasagna.”

This kind of strategy includes constant monitoring, multi-factor authentication, and dividing networks into secure zones. Firewalls, sure. But also intrusion detection, segmentation, and—believe it or not—training people not to click links that promise free smartphones.

Urgent Preventive Measures

Protecting critical infrastructure from cyberattacks isn’t just a technical challenge—it’s a human one. It starts with people and training: building awareness, adopting smart security policies, and fostering a culture where cybersecurity is everyone’s job, not just the IT department’s. From the factory floor to the boardroom, organizations need a shared understanding of the risks—and a common language for addressing them.

On the technical side, cybersecurity works best in layers. Each layer is a new hurdle for would-be intruders. Firewalls help control how data flows between networks. Malware detection tools watch for suspicious behavior. And with the rise of machine learning and AI, smarter tools are now spotting anomalies before they escalate.

Authentication is another weak point that often gets overlooked. Knowing exactly who—or what—is accessing a system at any given time is fundamental. Strong identity controls for both users and machines are essential to prevent unauthorized movement within a network.

But none of this matters without maintenance. Systems must be monitored, policies updated, and teams ready to respond quickly when something feels off.

Finally, collaboration is key. Companies in critical sectors must work together—and with governments—to build fast, effective response systems. In the electricity sector, for example, regulations already push utilities toward stronger cyber maturity.

In a real crisis, the right collaboration between actors can mean the difference between shutting down a threat and shutting down a city. Let that sink in.

Cyberattacks on infrastructure aren’t isolated incidents

They’re part of a much larger game, often linked to organized crime or international conflict. And as our essential systems become more digital, they become more attractive targets.

Recent attacks are a loud warning: no company is immune. What’s at stake isn’t just data or money—it’s water in the taps, power in the grid, food staying cold. It’s the everyday rhythm of modern life.

TL;DR – How to Defend Critical Infrastructure

1. Train people.
Cybersecurity starts with awareness—from the boardroom to the control room.

2. Layer your defenses.
Think firewalls, network segmentation, anomaly detection. No single fix works alone.

3. Authenticate everything.
Know who—and what—is inside your system at all times.

4. Monitor constantly.
Security isn’t a one-time setup. It should be a routine.

5. Work together.
Collaboration between companies and governments can stop a breach from becoming a blackout.

Related Articles

No Result Found