Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Pro-Russia Hacktivists “Claim” Attack on Water Utility Honeypot
News

Pro-Russia Hacktivists “Claim” Attack on Water Utility Honeypot

Team-CWDBy Team-CWDOctober 10, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A Russia-aligned hacktivist gang has been tricked into targeting a honeypot disguised as a water treatment utility, cybersecurity company Forescout has revealed.

The gang, TwoNet, claimed responsibility for an attack on the water treatment utility, believing they had conducted a real hack, on its Telegram channel.

The group logged into the honeypot’s human-machine interface (HMI) for a range of purposes, including defacement, process disruption, manipulation and evasion.

TwoNet used default credentials for initial access, and exploited weaknesses in the industrial honeypot to carry out these activities.

The researchers said the attack mirrors the tactics used by other hacktivist groups that have shifted from DDoS and defacement towards targeting operational technology (OT) and industrial control system (ICS) operations.

Honeypots are decoy systems deliberately exposed to the internet to lure attackers and capture their tactics.

Forescout noted it is the first time a threat actor has publicly claimed an attack that has occurred on one of its honeypots.

TwoNet Hacktivist Group

TwoNet first appeared on a Telegram channel in January 2025, initially focusing on DDoS attacks leveraging the MegaMedusa Machine malware.

In September, the group launched a new Telegram channel to claim activity, with a separate account rotating invite links to resist takedown.

Messages on this channel indicate the group has shifted from pure DDoS to a broader mix of activity, including OT/ICS targeting.

A message posted in an affiliated group, CyberTroops, stated that TwoNet was ceasing operations on September 30.

The researchers said this activity is part of a broader trend in the hacktivist ecosystem, where there are regular formations of alliances and rebrands.

“This underscores the ephemeral nature of the ecosystem where channels and groups are short-lived, while operators typically persist by rebranding, shifting alliances, joining other groups, learning new techniques or targeting other organizations,” Forescout noted.

Analysis of Honeypot Attack

The attack on the Forescout honeypot occurred just after TwoNet launched its new Telegram channel in September.

The intrusion came from an IP address linked to a German hosting provider. No prior malicious activity was linked to the address.

The attacker appeared to use the Firefox browser on the Linux operating system. They initially logged into the honeypot’s HMI using the default credentials admin/admin.

The threat actor then attempted database enumeration, successfully extracting schema information with a second set of queries. The researchers believe these queries were entered directly through the HMI web interface.

Next, the attacker created a new user account ‘BARLATI’, which was used to log in to the HMI over a period of around 20 hours. During that window, they conducted four actions:

  • Defacement: Exploitation of the vulnerability CVE-2021-26829 to change the HMI login page description to: [<]script>alert(“HACKED BY BARLATI, FUCK”)
  • Process disruption: Deletion of connected PLCs as data sources, disabling real-time updates
  • Manipulation: Changing PLC setpoints via the HMI
  • Evasion: Modification of system settings to disable logs and alarms

“The attacker did not attempt privilege escalation or exploitation of the underlying host, focusing exclusively on the web application layer of the HMI,” the researchers wrote in the Forescout report published on October 9.

Security Recommendations for OT Operators

The researchers set out a range of recommendations for security teams to mitigate the tactics used in the TwoNet honeypot attack. These include:

  • Remove OT systems from direct internet exposure
  • Use lots of segmentation
  • Require authentication on all IoT/OT admin interfaces
  • Disable anonymous/default accounts and enforce strong, unique credentials
  • Deploy deep packet inspection (DPI) that creates alerts for: exploitation, password guessing, unauthorized writes and changes in HMI
  • Monitor for devices used in distributed attacks, such as cameras and routers, and for unusual traffic from OT segments

They added that the case demonstrates that threat actors’ claims should be treated with caution.

“Hacktivist channels blend genuine incidents with exaggeration. Monitoring still yields value: intent, tooling, target selection, and emerging alliances,” the researchers advised.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleBreaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising
Next Article Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar)
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

It’s all fun and games until someone gets hacked

September 26, 2025

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

When ‘hacking’ your game becomes a security risk

October 17, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.