80,000 residents
A ransomware attack has targeted a water treatment plant in Minot, North Dakota, disrupting operations and forcing a reversion to manual processes. The attack, which occurred on March 14, 2026, compromised the facility's Supervisory Control and Data Acquisition (SCADA) system, a critical component for monitoring and managing plant operations. Operators were forced to shut down the affected system and run the plant manually for approximately 16 hours. While city officials have assured the public that water safety was never compromised, the incident is a stark reminder of the vulnerability of U.S. critical infrastructure, particularly the water and wastewater sector, to cyberattacks. No ransom was paid, and the identity of the attacking group is unknown.
The attack directly impacted the operational technology (OT) environment of the Minot water treatment plant, which serves around 80,000 residents. The primary target was the plant's SCADA system, which provides operators with a centralized view and control over industrial processes, including gauges, valves, and pumps.
On March 14, a ransomware note was discovered on the SCADA server. In response to the infection, the city's IT team made the decision to take the SCADA system offline to prevent the ransomware from spreading further or causing physical disruption to water treatment processes. This forced plant staff to switch to manual operations, which involved performing more frequent physical checks of gauges and equipment to ensure the facility was operating within safe parameters. The plant operated in this manual mode for about 16 hours before a backup server could be brought online to restore digital monitoring capabilities. The city did not engage with the attackers and did not pay a ransom.
While the specific ransomware variant and initial access vector were not disclosed, attacks on OT environments often follow a common pattern:
T1566) or by exploiting a vulnerability in an internet-facing system like a VPN (T1190).T0846 - Remote System Discovery).T1486 - Data Encrypted for Impact): The ransomware is deployed on the target systems, in this case, the SCADA server, encrypting files and disrupting operations.T0829 - Inhibit Response Function): By encrypting the SCADA system, the attackers directly inhibited the operators' ability to monitor and respond to plant conditions digitally.This incident highlights the significant risks posed by cyberattacks on critical infrastructure:
Detection in OT Environments:
Response:
Mitigating cyber risk in OT environments requires a defense-in-depth approach:
M0930 - Network Segmentation): Implement and enforce strict network segmentation between IT and OT networks. All traffic between the two should be mediated by a DMZ and inspected by a firewall.M0951 - Data Backup): Maintain regular, tested, and isolated backups of critical OT systems, including SCADA server configurations and historical data. Ensure backups are stored offline or on a separate network segment to protect them from ransomware.M0925 - Remote Access Security): Secure all remote access to the OT network with multi-factor authentication and ensure it is only enabled when necessary.Strictly segment the OT network from the IT network to prevent attackers from pivoting from a less secure environment to the critical control systems.
Maintain and test isolated, offline backups of critical OT systems to enable rapid recovery without paying a ransom.
Secure all remote access to the OT network with strong authentication and ensure it is disabled by default.
The most critical defense for a water treatment plant or any OT environment is robust network segmentation based on the Purdue Model. The SCADA and control system network (OT) must be physically or logically isolated from the corporate business network (IT). All communication between IT and OT must pass through a demilitarized zone (DMZ) where traffic is strictly controlled and inspected by a firewall. Deny all traffic by default and only permit essential, well-defined communication paths. This isolation prevents ransomware that may infect the IT network from moving laterally to compromise critical control systems like the SCADA server, directly countering the likely path of this attack.
To ensure operational resilience against ransomware, water facilities must maintain a robust and tested backup and recovery plan. This includes creating regular, full backups of SCADA servers, HMIs, and engineering workstations. Crucially, these backups must be stored in an isolated manner—either offline (air-gapped) or on a logically segmented network using immutable storage. The ability of the Minot plant to recover using a backup server was key to their response. This strategy must be formalized: test the restoration process regularly to ensure its viability and to minimize recovery time. A successful backup strategy is the ultimate safety net, making the ransomware's encryption impact temporary and removing the incentive to pay a ransom.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats