In a notable cybersecurity event, the pro-Russian hacktivist group TwoNet was publicly exposed for bragging about an attack on a target that was, in fact, a decoy. The group had claimed responsibility for disrupting a Dutch water utility's operational technology (OT) environment. However, research published by cybersecurity firm Forescout on October 10, 2025, revealed that the hacktivists were lured into a sophisticated honeypot designed to mimic an industrial control system (ICS). An attacker from the group, using the alias "Barlati," accessed the decoy's Human-Machine Interface (HMI) with default credentials, defaced the system, and performed actions that would be disruptive in a real-world scenario. This incident not only serves as a public humiliation for the hacktivist group but also provides valuable, real-world insight into the tactics, techniques, and procedures (TTPs) of actors targeting critical infrastructure.
The attacker's actions within the honeypot were straightforward but demonstrate a clear intent to cause disruption.
admin/admin. This highlights the persistent danger of using weak or default passwords on internet-facing ICS devices.These actions, while harmless in the honeypot, mimic the initial stages of a real ICS attack aimed at causing physical disruption.
T0885 - Default Credentials: The initial access vector used by the attacker.T0820 - HMI: The attacker directly manipulated the HMI to alter the process and deface the interface.T0845 - Inhibit Response Function: Disabling alarms is a classic tactic to prevent operators from noticing a dangerous state.T0831 - Manipulation of View: Defacing the HMI alters the operator's view of the system.The direct impact of this specific incident was zero, as the target was a decoy. However, the event is significant for several reasons:
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| command_line_pattern | admin/admin |
Login attempts using default credentials on any internet-facing system, especially HMI/ICS platforms. | Authentication logs, SIEM | high |
| other | HMI Page Defacement |
Any unauthorized modification to HMI display content is a clear indicator of compromise. | File Integrity Monitoring, Visual inspection | high |
| other | Unexpected Alarm Disablement |
Alarms being disabled outside of a scheduled maintenance window is a major red flag. | ICS/SCADA audit logs | high |
Enforce strong, unique passwords and, most importantly, change all default credentials before deploying any system.
Isolate OT networks from IT networks and the internet to prevent unauthorized access to critical control systems.
Implement comprehensive logging and auditing of all activities on HMIs and other ICS components to detect unauthorized changes.
Require individual user accounts for all operators instead of shared accounts, and implement MFA where possible.
The TwoNet attacker's success hinged entirely on the use of default credentials (admin/admin). The most fundamental defense for any Industrial Control System is to enforce a strong password policy. This goes beyond complexity and length requirements; it must include a mandatory procedure to change ALL default passwords on every device—HMIs, PLCs, switches, etc.—before they are connected to a network. This simple act of cyber hygiene would have completely prevented this specific intrusion. Asset management programs must include a field to track whether default credentials have been changed, and this should be audited regularly.
No HMI for a water utility should be directly accessible from the public internet. This incident underscores the critical need for network isolation in OT environments. Critical control systems should reside on a completely separate, air-gapped, or heavily firewalled network segment. All access from the IT network or the internet should be brokered through a secure DMZ with jump hosts that require multi-factor authentication. This architectural control ensures that even if an attacker identifies the public IP of a facility, they cannot reach the sensitive control systems directly, forcing them to navigate multiple layers of defense.
This entire event is a powerful advertisement for the use of deception technology. By deploying a high-interaction honeypot that accurately mimics their real ICS environment, Forescout was able to gather invaluable intelligence on an active threat actor's TTPs without any risk to actual infrastructure. Water utilities and other critical infrastructure operators should consider deploying similar decoy environments. These decoys act as an early warning system, detecting attackers during their reconnaissance or initial exploitation phases. The intelligence gathered can then be used to strengthen the defenses of the real production environment against the observed attack methods.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats