IT Security Lead at Clear Creek County Water District.
11 years on the job. Small team. Tight budget.
FBI InfraGard member — probably sat in this exact room a year ago.
IT Security Lead at Clear Creek County Water District.
11 years on the job. Small team. Tight budget.
FBI InfraGard member — probably sat in this exact room a year ago.
SCADA systems. Treatment plant controls. Chlorine dosing. The billing portal where residents pay their water bills.
340 employees. 27 contractors. An aging VPN from 2017.
And honestly — he mostly is. This list isn't negligent. It's what most shops run.
If you're nodding right now, good. Bob is you. Stay with me.
Password reused from a 2023 retail breach. Sitting in an infostealer marketplace ever since.
Attacker logs in from Vilnius. SMS MFA code intercepted via SIM swap.
No alert fires. The login looks clean.
Two weeks inside Sarah's mailbox. Learning who approves what. Learning how she writes.
Finds a real thread: "Hey, the pipe-inspect folks are changing their bank account next month."
Takes notes. Waits for the moment.
Wired to "the vendor's new account" in Riga. Through 11 money-mule accounts across three continents.
Recovered: $0.
Bob still doesn't know any of this happened. To Bob, Day 42 was Tuesday.
The attacker is still in Sarah's mailbox. Rummaging through her archive folder. Finds a 6-year-old thread from IT.
"Deploying new patch agent, here's the creds, please don't change them."
Service account: svc-patch-deploy. Local admin on 40% of Bob's workstations. Nobody walked it back.
SCADA is air-gapped. Thank god. Water supply is safe.
But payroll. HR. Billing. The customer portal — all of it encrypts in four hours.
Ransom demand: $2.4M. County supervisors on the evening news by 6 PM.