North Dakota Water Treatment Plant Hit by Ransomware, Reverts to Manual Operations

Ransomware Attack on North Dakota Water Treatment Plant Forces 16-Hour Manual Operation

HIGH
April 2, 2026
6m read
RansomwareIndustrial Control SystemsCyberattack

Impact Scope

People Affected

80,000 residents

Industries Affected

Critical Infrastructure

Geographic Impact

United States (local)

Related Entities

Products & Tech

SCADA

Other

Minot Water Treatment Plant

Full Report

Executive Summary

A ransomware attack has targeted a water treatment plant in Minot, North Dakota, disrupting operations and forcing a reversion to manual processes. The attack, which occurred on March 14, 2026, compromised the facility's Supervisory Control and Data Acquisition (SCADA) system, a critical component for monitoring and managing plant operations. Operators were forced to shut down the affected system and run the plant manually for approximately 16 hours. While city officials have assured the public that water safety was never compromised, the incident is a stark reminder of the vulnerability of U.S. critical infrastructure, particularly the water and wastewater sector, to cyberattacks. No ransom was paid, and the identity of the attacking group is unknown.


Threat Overview

The attack directly impacted the operational technology (OT) environment of the Minot water treatment plant, which serves around 80,000 residents. The primary target was the plant's SCADA system, which provides operators with a centralized view and control over industrial processes, including gauges, valves, and pumps.

On March 14, a ransomware note was discovered on the SCADA server. In response to the infection, the city's IT team made the decision to take the SCADA system offline to prevent the ransomware from spreading further or causing physical disruption to water treatment processes. This forced plant staff to switch to manual operations, which involved performing more frequent physical checks of gauges and equipment to ensure the facility was operating within safe parameters. The plant operated in this manual mode for about 16 hours before a backup server could be brought online to restore digital monitoring capabilities. The city did not engage with the attackers and did not pay a ransom.

Technical Analysis

While the specific ransomware variant and initial access vector were not disclosed, attacks on OT environments often follow a common pattern:

  • Initial Access: Attackers typically gain access to the IT network first, often through phishing (T1566) or by exploiting a vulnerability in an internet-facing system like a VPN (T1190).
  • Lateral Movement: From the IT network, attackers pivot to the OT network. This is often possible due to flat network architectures or weak segmentation between IT and OT environments.
  • Discovery (ICS): Attackers perform discovery to identify critical OT assets like SCADA servers, Human-Machine Interfaces (HMIs), and engineering workstations (T0846 - Remote System Discovery).
  • Impact (T1486 - Data Encrypted for Impact): The ransomware is deployed on the target systems, in this case, the SCADA server, encrypting files and disrupting operations.
  • Inhibit Response Function (T0829 - Inhibit Response Function): By encrypting the SCADA system, the attackers directly inhibited the operators' ability to monitor and respond to plant conditions digitally.

Impact Assessment

This incident highlights the significant risks posed by cyberattacks on critical infrastructure:

  • Operational Disruption: The primary impact was the 16-hour disruption of normal operations and the increased workload and risk associated with running a water treatment plant manually.
  • Potential for Physical Consequences: While it did not happen in this case, a successful attack that allows an adversary to manipulate OT controls could lead to unsafe water conditions or damage to equipment.
  • Financial Costs: The incident incurs costs for response, recovery, and the implementation of a new, more secure server, in addition to the operational overhead of the disruption.
  • Erosion of Public Confidence: Attacks on essential services like water supply can cause public alarm and erode confidence in the security of critical infrastructure.

Detection & Response

Detection in OT Environments:

  • Network Segmentation Monitoring: Monitor traffic crossing the IT/OT boundary. Any unexpected or unauthorized communication from the IT network to the OT network is a major red flag. This aligns with D3-NTA: Network Traffic Analysis.
  • Baseline Deviations: OT networks typically have very predictable traffic patterns. Use network security monitoring tools to establish a baseline and alert on any deviations, such as the use of new protocols or connections to new devices.
  • Endpoint Security on HMIs/Servers: Deploy and monitor application whitelisting or EDR solutions on SCADA servers and HMIs to detect the execution of unauthorized software like ransomware.

Response:

  • The city's response to take the system offline was the correct one to prevent further spread or physical damage.
  • The ability to revert to manual operations demonstrates a level of resilience, which is a critical component of OT security planning.
  • The use of a backup server for recovery underscores the importance of maintaining secure, isolated backups.

Mitigation

Mitigating cyber risk in OT environments requires a defense-in-depth approach:

  • Network Segmentation (M0930 - Network Segmentation): Implement and enforce strict network segmentation between IT and OT networks. All traffic between the two should be mediated by a DMZ and inspected by a firewall.
  • Data Backup (M0951 - Data Backup): Maintain regular, tested, and isolated backups of critical OT systems, including SCADA server configurations and historical data. Ensure backups are stored offline or on a separate network segment to protect them from ransomware.
  • Remote Access Security (M0925 - Remote Access Security): Secure all remote access to the OT network with multi-factor authentication and ensure it is only enabled when necessary.
  • Vulnerability Management: Implement a risk-based vulnerability management program for OT systems, applying patches where feasible without impacting operations, and implementing compensating controls where patching is not possible.

Timeline of Events

1
March 14, 2026
Ransomware is detected on the SCADA system of the Minot water treatment plant.
2
April 2, 2026
This article was published

MITRE ATT&CK Mitigations

Strictly segment the OT network from the IT network to prevent attackers from pivoting from a less secure environment to the critical control systems.

Maintain and test isolated, offline backups of critical OT systems to enable rapid recovery without paying a ransom.

Secure all remote access to the OT network with strong authentication and ensure it is disabled by default.

D3FEND Defensive Countermeasures

The most critical defense for a water treatment plant or any OT environment is robust network segmentation based on the Purdue Model. The SCADA and control system network (OT) must be physically or logically isolated from the corporate business network (IT). All communication between IT and OT must pass through a demilitarized zone (DMZ) where traffic is strictly controlled and inspected by a firewall. Deny all traffic by default and only permit essential, well-defined communication paths. This isolation prevents ransomware that may infect the IT network from moving laterally to compromise critical control systems like the SCADA server, directly countering the likely path of this attack.

To ensure operational resilience against ransomware, water facilities must maintain a robust and tested backup and recovery plan. This includes creating regular, full backups of SCADA servers, HMIs, and engineering workstations. Crucially, these backups must be stored in an isolated manner—either offline (air-gapped) or on a logically segmented network using immutable storage. The ability of the Minot plant to recover using a backup server was key to their response. This strategy must be formalized: test the restoration process regularly to ensure its viability and to minimize recovery time. A successful backup strategy is the ultimate safety net, making the ransomware's encryption impact temporary and removing the incentive to pay a ransom.

Sources & References

Water treatment plant in North Dakota suffered ransomware attack
StateScoop (statescoop.com) April 1, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ransomwareICSOTSCADAcritical infrastructurewater sector

📢 Share This Article

Help others stay informed about cybersecurity threats