The Puerto Rico Aqueduct and Sewer Authority (PRASA), the public corporation responsible for water services in Puerto Rico, has confirmed it sustained a cyberattack resulting in a data breach. The incident exposed an unspecified amount of customer and employee information stored on its business network. In a crucial positive development, PRASA stated that its critical infrastructure for water distribution remained secure and operational throughout the incident. This was attributed to a robust network segmentation strategy that successfully isolated the operational technology (OT) network from the compromised information technology (IT) network. The incident highlights the persistent targeting of critical infrastructure by cyber threat actors, while also serving as a case study for the effectiveness of IT/OT segmentation as a key defensive measure.
Details about the cyberattack remain limited. The authority has not yet disclosed the specific timeline, the attack vector, the type of attack (e.g., ransomware), or the threat actor responsible.
This incident underscores a common pattern where attackers target the less-defended IT networks of critical infrastructure operators to steal data or for financial gain, while the more critical OT systems are often better protected.
While specifics are unknown, the successful containment of the attack points to a well-implemented defense-in-depth architecture, particularly concerning network segmentation.
Successful Mitigation - Network Segmentation (M1030): The separation of the IT and OT networks was the key factor in preventing a more catastrophic outcome. The attackers, after gaining access to the IT network (likely via common vectors like T1190 - Exploit Public-Facing Application or T1566 - Phishing), were unable to pivot to the OT environment. This indicates the presence of a properly configured firewall or data diode between the two environments, a best practice for Industrial Control Systems (ICS) security.
IT Network Compromise: The breach of the IT network would have followed a standard attack lifecycle: initial access, discovery of data, collection, and exfiltration (T1567 - Exfiltration Over Web Service).
PRASA's experience provides a clear roadmap for mitigating risk in critical infrastructure.
This was the key successful mitigation in this incident, preventing the attack from spreading from the IT network to the OT network.
Using a data historian in a DMZ is a standard architecture for safely moving data from OT to IT without allowing direct connections.
The PRASA incident is a textbook example of the success of network isolation as a primary defense for critical infrastructure. All organizations operating Industrial Control Systems (ICS) or Operational Technology (OT) must adopt this model. The IT network (business, email, web) and the OT network (physical process control) must be separated by a robust firewall or, for higher security, a data diode. Firewall rules must follow a 'deny by default' principle, with only a minimal, explicitly defined set of communication paths allowed between the two zones. There should be no direct path from the IT network to the most critical control systems. This architecture ensures that even if the IT network is fully compromised (as happened with PRASA), the attack is contained and cannot pivot to disrupt physical operations like water distribution. This is the single most important mitigation for preventing cyberattacks from causing physical consequences.
While PRASA successfully protected its OT network, the initial compromise of its IT network still led to a data breach. To strengthen the first line of defense, critical infrastructure operators must implement strong inbound traffic filtering on their IT network perimeter. This includes deploying next-generation firewalls (NGFW) and Web Application Firewalls (WAF) to protect internet-facing services. Geoblocking can be used to block traffic from countries where the organization has no business operations. Furthermore, all traffic attempting to cross the IT/OT boundary must be subject to deep packet inspection to look for malicious commands or protocols. By hardening the IT perimeter, organizations can reduce the likelihood of the initial breach that leads to data theft or attempts to pivot to the OT environment.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats