On April 4, 2026, several municipal water treatment facilities in Australia were subjected to a coordinated cyberattack targeting their industrial control systems (ICS). The attackers specifically focused on gaining access to the Programmable Logic Controllers (PLCs) that manage the chemical feed process, attempting to manipulate the amount of chlorine distributed into the water supply. The attack was ultimately unsuccessful in causing public harm due to the quick response of plant operators who engaged manual overrides. However, the incident serves as a stark warning about the vulnerability of critical infrastructure, particularly operational technology (OT) that is increasingly connected to the internet, and the potential for cyberattacks to have real-world physical consequences.
This attack targets the heart of the operational technology within a water utility.
Properly segment the OT network from the IT network and the internet to prevent unauthorized access to critical control systems.
Maintain and drill manual override procedures to ensure operators can safely control processes during a cyber incident.
Enforce secure remote access policies with multi-factor authentication for any connection to the OT network.
The foundational defense for water treatment facilities and other critical infrastructure is strict network isolation. The Operational Technology (OT) network, which contains the PLCs controlling chlorine distribution, must be completely segregated from the corporate IT network and the Internet. This can be achieved by creating a secure OT zone protected by a firewall configured in a default-deny mode. The only traffic allowed between the IT and OT zones should be through a DMZ, with all connections initiated from the OT side. Direct remote access from the internet to any device in the OT network must be strictly prohibited. This isolation ensures that even if an attacker compromises the corporate network, they have no direct path to the critical control systems, preventing them from attempting to manipulate the PLCs.
A coordinated cyberattack targets multiple Australian water treatment facilities.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph β relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.