Puerto Rico Water Authority Hit by Cyberattack, Exposing Customer and Employee Data

Puerto Rico's Water Authority (PRASA) Confirms Cyberattack and Data Breach

MEDIUM
March 23, 2026
4m read
CyberattackData BreachIndustrial Control Systems

Related Entities

Organizations

Puerto Rico Aqueduct and Sewer Authority (PRASA)

Full Report

Executive Summary

The Puerto Rico Aqueduct and Sewer Authority (PRASA), the public corporation responsible for water services in Puerto Rico, has confirmed it sustained a cyberattack resulting in a data breach. The incident exposed an unspecified amount of customer and employee information stored on its business network. In a crucial positive development, PRASA stated that its critical infrastructure for water distribution remained secure and operational throughout the incident. This was attributed to a robust network segmentation strategy that successfully isolated the operational technology (OT) network from the compromised information technology (IT) network. The incident highlights the persistent targeting of critical infrastructure by cyber threat actors, while also serving as a case study for the effectiveness of IT/OT segmentation as a key defensive measure.


Threat Overview

Details about the cyberattack remain limited. The authority has not yet disclosed the specific timeline, the attack vector, the type of attack (e.g., ransomware), or the threat actor responsible.

  • Victim: Puerto Rico Aqueduct and Sewer Authority (PRASA), a critical infrastructure entity.
  • Impact: Data breach of customer and employee information from the IT network.
  • Contained Impact: The OT network, which controls the physical processes of water treatment and distribution, was not affected.

This incident underscores a common pattern where attackers target the less-defended IT networks of critical infrastructure operators to steal data or for financial gain, while the more critical OT systems are often better protected.

Technical Analysis

While specifics are unknown, the successful containment of the attack points to a well-implemented defense-in-depth architecture, particularly concerning network segmentation.

  • Successful Mitigation - Network Segmentation (M1030): The separation of the IT and OT networks was the key factor in preventing a more catastrophic outcome. The attackers, after gaining access to the IT network (likely via common vectors like T1190 - Exploit Public-Facing Application or T1566 - Phishing), were unable to pivot to the OT environment. This indicates the presence of a properly configured firewall or data diode between the two environments, a best practice for Industrial Control Systems (ICS) security.

  • IT Network Compromise: The breach of the IT network would have followed a standard attack lifecycle: initial access, discovery of data, collection, and exfiltration (T1567 - Exfiltration Over Web Service).

Impact Assessment

  • Data Breach: Customers and employees whose data was on the IT network are now at risk of identity theft, fraud, and targeted phishing attacks.
  • No Disruption to Critical Services: The most significant potential impact—disruption of the water supply—was successfully averted. This is a major success for PRASA's security team and highlights the value of investing in ICS security controls.
  • Reputational and Regulatory Impact: Despite preventing an operational shutdown, PRASA still suffered a data breach and will face reputational damage and potential regulatory scrutiny.

Detection & Response (For Similar Utilities)

  1. IT/OT Monitoring: Utilities must have visibility into both their IT and OT networks. This includes monitoring for unauthorized connections or traffic attempting to cross the IT/OT boundary.
  2. Data Exfiltration Alerts: The IT network should be monitored for signs of data exfiltration, such as large, unexpected outbound data transfers.
  3. Incident Response Plan: Have a specific incident response plan that addresses scenarios for both IT-only and IT/OT crossover incidents.

Mitigation

PRASA's experience provides a clear roadmap for mitigating risk in critical infrastructure.

  1. Enforce IT/OT Segmentation (D3-NI): The top priority for any organization with an ICS or OT environment is to implement and enforce strict network segmentation. The IT and OT networks should be physically or logically separated by a firewall with a 'deny-by-default' rule set. All traffic between the zones must be explicitly permitted and inspected. This is the most critical application of D3FEND Network Isolation (D3-NI) for ICS environments.
  2. Secure the DMZ: Any systems that must bridge the IT and OT networks, such as data historians or jump hosts, should be placed in a tightly controlled Demilitarized Zone (DMZ) between the two environments.
  3. Harden the IT Network: While segmentation is key, it is not an excuse to neglect the security of the IT network. Standard best practices like patch management (D3FEND Software Update (D3-SU)), multi-factor authentication, and endpoint security are essential to prevent the initial compromise.
  4. Assume IT is Compromised: Design OT security with the assumption that the IT network will eventually be breached. There should be no inherent trust for traffic originating from the IT network.

Timeline of Events

1
March 23, 2026
This article was published

MITRE ATT&CK Mitigations

This was the key successful mitigation in this incident, preventing the attack from spreading from the IT network to the OT network.

Using a data historian in a DMZ is a standard architecture for safely moving data from OT to IT without allowing direct connections.

Audit

M1047enterprise

Auditing and logging traffic between IT and OT zones is critical for detecting attempted pivot attacks.

D3FEND Defensive Countermeasures

The PRASA incident is a textbook example of the success of network isolation as a primary defense for critical infrastructure. All organizations operating Industrial Control Systems (ICS) or Operational Technology (OT) must adopt this model. The IT network (business, email, web) and the OT network (physical process control) must be separated by a robust firewall or, for higher security, a data diode. Firewall rules must follow a 'deny by default' principle, with only a minimal, explicitly defined set of communication paths allowed between the two zones. There should be no direct path from the IT network to the most critical control systems. This architecture ensures that even if the IT network is fully compromised (as happened with PRASA), the attack is contained and cannot pivot to disrupt physical operations like water distribution. This is the single most important mitigation for preventing cyberattacks from causing physical consequences.

While PRASA successfully protected its OT network, the initial compromise of its IT network still led to a data breach. To strengthen the first line of defense, critical infrastructure operators must implement strong inbound traffic filtering on their IT network perimeter. This includes deploying next-generation firewalls (NGFW) and Web Application Firewalls (WAF) to protect internet-facing services. Geoblocking can be used to block traffic from countries where the organization has no business operations. Furthermore, all traffic attempting to cross the IT/OT boundary must be subject to deep packet inspection to look for malicious commands or protocols. By hardening the IT perimeter, organizations can reduce the likelihood of the initial breach that leads to data theft or attempts to pivot to the OT environment.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

critical infrastructureICSOTdata breachnetwork segmentationutilitiesPuerto Rico

📢 Share This Article

Help others stay informed about cybersecurity threats