H2-Oh No: Cyber Breach Hits American Water

American Water faced a cyber breach, prompting precautionary measures. Operations remain unaffected as the investigation continues.

Written By: Allison Francis
Oct 15, 2024
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

American Water is up a creek, so to speak. The largest regulated water and wastewater utility company in the United States has fallen victim to a digital security breach.

On October 3, the New Jersey-headquartered corporation discovered suspicious activities within its computer networks and systems. American Water, which serves over 14 million individuals across 14 states and 18 military bases with water and wastewater services, has officially acknowledged the incident.

Incident and response

“This activity has since been determined to be the result of a cybersecurity incident,” the company stated. “In an effort to protect our customers’ data and to prevent any further harm to our environment, we disconnected or deactivated certain systems. We proactively took MyWater offline, which means we are pausing billing until further notice. We are working diligently to bring these systems back online safely and securely.”

According to American Water, they currently have no evidence to suggest that the cyber incident has adversely affected their water or wastewater facilities or operations, stating “At this time, we currently believe that none of our water or wastewater facilities or operations have been negatively impacted by this incident. There will be no late charges or services shut off while MyWater remains unavailable.”

This is reassuring news for their millions of customers who rely on these essential services. However, the company has candidly admitted that the full scope and consequences of the cyberattack remain unclear at this time.

“American Water activated third-party cybersecurity professionals to assist with our investigation into the nature of the incident,” the company said. “This investigation is ongoing and will take time to complete. We take the cybersecurity of our systems with utmost seriousness and are taking additional steps to strengthen the cybersecurity of American Water’s systems. Our customers and the data we maintain remain our highest priorities.”

Cybersecurity concerns and mitigation

The cyber attack is little surprise to most in the industry, considering the heightened focus on cybersecurity in the water sector. This incident follows recent EPA guidance to water and wastewater operators on facility security, and a March memo from the Biden administration alerting governors to the rising threat of cyberattacks on water infrastructure.

The attack’s context is part of a broader trend in cybersecurity vulnerabilities. As Sean Deuby, principal technologist at Semperis, notes, “Today, there is no silver bullet that will solve the cybersecurity challenges facing public and private sector organizations. Today, the most commonly used identity system, Active Directory, is compromised in 90 percent of cyberattacks.”

The gravity of the situation is highlighted by recent international security efforts.

“Attacks have increased at such a rapid pace that the Five Eyes Alliance of the US, Canada, Australia, the UK, and New Zealand recently issued a comprehensive report, specifically focused on Active Directory, providing guidance on defense against 17 common attacks against this identity system,” adds Deuby.

Regarding the American Water Works incident specifically, Deuby observes, “While we don’t yet know which threat actor targeted this important critical infrastructure utility company, American Water appears to have responded quickly and effectively to isolate the damage caused by the cyberattack – a commendable response executed under duress.”

Cybersecurity professionals must stress the importance of a holistic defense strategy to their end users. Businesses must focus on safeguarding essential systems that are frequent targets for both state-sponsored hackers and criminal groups. Key measures include continuous monitoring for threats, more frequent security assessments, implementing staff cybersecurity education programs, and securing Active Directory to prevent unauthorized access and lateral movement within networks.

Learn how to implement a strong incident response plan to detect, contain, eradicate, and recover from security breaches to minimize damage and restore operations.

thumbnail Allison Francis

Allison is a contributing writer for Channel Insider, specializing in news for IT service providers. She has crafted diverse marketing, public relations, and online content for top B2B and B2C organizations through various roles. Allison has extensive experience with small to midsized B2B and channel companies, focusing on brand-building, content and education strategy, and community engagement. With over a decade in the industry, she brings deep insights and expertise to her work. In her personal life, Allison enjoys hiking, photography, and traveling to the far-flung places of the world.

Recommended for you...

Infosys’ $153M Versent Deal to Drive AI in Australia

Infosys to acquire 75% of Telstra’s Versent for $153M, boosting AI-first cloud transformation in Australia and New Zealand.

Allison Francis
Aug 18, 2025
MinIO Debuts Academy With AI Partner Enablement

MinIO launches MinIO Academy to train IT pros and partners on AIStor, delivering expert-led courses for AI-driven object storage mastery.

Jordan Smith
Aug 18, 2025
Concentric AI Adds Integrations to Data Governance Platform

Concentric AI adds Wiz, Salesforce, and GitHub integrations to boost Semantic Intelligence platform’s AI-driven data governance and security capabilities.

Jordan Smith
Aug 15, 2025
Brivo Launching New Solution to Boost Security Suite

Brivo and Envoy partner to unify access control & visitor management, delivering scalable, compliant, and secure workplace experiences.

Jordan Smith
Aug 13, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.