Unprotected Infrastructure, compromised Dam
- Javier Conejo del Cerro
- hace 55 minutos
- 4 Min. de lectura

In April 2025, a cyberattack on the Risevatnet dam in Norway exposed just how vulnerable critical infrastructure remains in the absence of fundamental security controls. Unidentified threat actors successfully breached the dam’s web-accessible control interface by exploiting a weak password, gaining unauthorized access to its operational technology (OT) environment. Once inside, the attackers issued remote commands to fully open a water valve, which remained unmonitored and unattended for nearly four hours.
Although no immediate structural damage occurred—the excess flow totaled 497 liters per second, well below the dam’s threshold of 20,000—the breach led to the release of hundreds of thousands of liters of water into the surrounding ecosystem. More troubling, however, was the fact that this incident remained undetected for hours and was only disclosed to the public in June, following a protracted internal and governmental investigation.
The breach drew the attention of several national agencies. The dam’s operator, Breivika Eiendom, alerted the National Security Authority (NSM), the Water Resources and Energy Directorate (NVE), and Kripos, the Norwegian Police Service’s cybercrime division. The findings were stark: the dam’s digital perimeter lacked even the most basic safeguards. No multi-factor authentication. No intrusion detection. No real-time monitoring. The attackers had walked through a digital front door left wide open.
Local fish farms and residents affected, global facilities at risk
The Risevatnet dam, situated near the city of Svelgen in western Norway, is a modest facility servicing a fishery and nearby residential zones. It is not connected to the national energy grid and plays no role in power generation. Yet its compromise presents a global lesson: scale does not equate to significance when it comes to cyber-physical threats. Whether a megadam supplying electricity to millions or a small installation managing water flow to a single town, any network-connected OT system with weak defenses can be weaponized.
The incident demonstrates the ripple effects such intrusions can generate. Had the breach occurred during a seasonal flood, or had the dam supported hydroelectric production, the consequences could have escalated from inconvenience to catastrophe. Even localized releases of water can affect ecosystems, damage nearby infrastructure, interrupt commercial operations (such as fish farming), and trigger costly emergency responses.
Moreover, smaller infrastructure is often the most neglected from a cybersecurity perspective. Unlike major power plants or federal water authorities, these systems are typically managed by small operators with limited budgets and minimal cyber expertise. Their web interfaces, left exposed for maintenance or remote monitoring, become low-hanging fruit for threat actors seeking access to OT environments.
Weak passwords, strong consequences
The method of compromise was almost insultingly simple. The attackers accessed the dam’s control panel via a publicly available IP address secured only by a weak, easily guessed password. No additional authentication steps stood in their way. Once in, they bypassed software restrictions and executed high-level commands directly within the OT layer—namely, opening a physical valve that controls water flow from the reservoir.
What’s most disturbing is that this method is neither novel nor rare. It recalls the 2021 breach of the Oldsmar water treatment plant in Florida, where an attacker also used remote access credentials to manipulate chemical levels in drinking water. In both cases, threat actors exploited poor password hygiene and remote desktop access to move directly into high-impact, real-world systems. And just as in Oldsmar, the Risevatnet attackers needed no advanced malware, no zero-day exploit, and no insider help—only poor cyber hygiene and unmonitored access.
The breach raises urgent questions: How many more installations around the world operate under the same weak credentials? How many have no intrusion detection or real-time alerting? How many have internet-facing control systems with no layered defense? Until these basic issues are addressed, every small town dam, irrigation controller, or wastewater system remains a potential point of failure in the broader infrastructure chain.
Critical infrastructure, secured
As threats escalate and digitization spreads across critical infrastructure, old paradigms of protection are proving inadequate. Goldilock’s Secure FireBreak™ offers a new way forward. Rather than relying solely on software-based defenses like firewalls or access policies—which can be bypassed or misconfigured—FireBreak™ introduces hardware-level isolation via non-IP, out-of-band control.
With FireBreak™, operators can physically disconnect or reconnect devices like SCADA units and PLCs from any network in seconds, remotely and securely. Even if a device is compromised or misconfigured, attackers cannot reach it when it’s offline in a true state of isolation. And unlike other solutions, FireBreak™ doesn’t require complex deployment, retraining, or system overhauls. It simply plugs into existing networks and removes the digital pathways that attackers depend on.
In the context of Risevatnet, FireBreak™ could have ensured that the dam’s valve control was offline unless deliberately and securely activated. No weak password could open a floodgate. No remote panel could be hijacked in the middle of the night. Only authorized, multi-factor-verified personnel would have access, and even then, only when explicitly permitted.
In a world where software can be tricked, spoofed, or brute-forced, Goldilock restores the one thing cybercriminals fear most: physical disconnection. For power grids, dams, ports, pipelines, and even private networks, the message is clear—true security doesn’t come from code alone. It comes from cutting the cord until connection is needed. And when it is, Goldilock makes that connection instant, secure, and on your terms.
Comments