Key Takeaways
Romania's national water management agency reported a ransomware attack that successfully locked out staff from approximately 1,000 computer systems. The National Directorate of Cyber Security (DNSC) confirmed that the incident compromised equipment ranging from individual workstations to central servers and said the unnamed attackers requested to be contacted within 7 days.
The Romanian National Waters Administration ransomware attack compromised approximately 1,000 IT&C systems, local press reports say, including:
Despite the severity of the Romanian water agency data breach, authorities have verified that essential operational technologies (OT) – specifically those controlling hydrotechnical infrastructure such as dams and flood defenses – were isolated from the attack vector and continue to function normally.Â
However, the compromise of email servers has forced personnel to rely on alternative communication channels to maintain operations, such as telephone and radio.
Unlike traditional ransomware campaigns that deploy custom encryption payloads, this incident is characterized by the use of "living off the land" binaries (LOLBins). Technical assessments indicate that the attackers executed a BitLocker ransomware attack, weaponizing the legitimate Windows BitLocker encryption tool to lock the agency's systems.Â
By utilizing pre-existing administrative tools rather than introducing malicious code from outside the host network, threat actors can effectively evade standard endpoint detection and response protocols.Â
The attackers have issued a ransom note demanding contact within seven days to decrypt the affected data. In response, the DNSC has issued a strict recommendation against engaging with the cyber extortionists or paying the ransom, which aligns with global best practices.Â
The agency continues to focus on remediation and system restoration while maintaining essential water management services through offline contingencies.
Following preliminary investigations, authorities decided to integrate the Romanian National Waters Administration's infrastructure into the Romanian Intelligence Service’s National Cyberint Center (CNC) cybersecurity program.
Earlier this month, researchers exposed LockBit 5.0 infrastructure in a major security failure, including a key IP address and domain. One month earlier, Russian hosting provider Media Land was sanctioned for supporting LockBit, BlackSuit, and Play ransomware.