/
사이버 레질리언스

Here Be Dragons: The Growing Cyber Threats to Critical Infrastructure

Medieval map and a portion of its text
Photograph from the U.S. Library of Congress. Text on the Hunt–Lenox Globe, dating from 1504.

In certain medieval maps, unexplored regions had a warning: hic sunt dracones. It meant “Here be dragons.” These words and images of fire-breathing beasts marked dangerous and unknown realms.  

In 2025, we’re facing a new kind of uncharted territory. Cyber risks are growing. Global tensions are rising. Institutions are under strain. And this time, it’s our critical infrastructure that’s under attack.

Just like the unexplored regions of medieval maps, today’s digital infrastructure has blind spots — and the threats lurking there are just as real. The dragons are still here; they've just gone digital.

According to The Economist’s Global Risk Outlook 2025, rising conflict is pushing nation-states to weaponize cyber capabilities — with critical infrastructure as a prime target.

What’s at stake for critical infrastructure?  

Critical infrastructure includes everything society depends on — utilities, finance, healthcare, telecom, and emergency services. These aren’t just technical systems. They’re lifelines. And threats to these essential services are growing.

As our own Trevor Dearing, director of critical infrastructure solutions, puts it: “If you hit power, water, or transportation systems, the impact is immediate and visible.”

And the concern isn’t just anecdotal. It’s shared across the cybersecurity landscape. According to World Economic Forum’s 2025 Global Cybersecurity Outlook, more than 60% of cybersecurity leaders say that geopolitical instability has increased the risk to critical systems.

The American Water breach

Among the growing list of critical infrastructure breaches, one stands out.

In October 2024, American Water — the largest U.S. water utility — shut down billing and customer systems after detecting unauthorized activity in its networks. Water service wasn’t affected, but the breach made headlines.

Why? Because American Water serves over 14 million people (roughly the population of Los Angeles) — and 18 military bases.

Critical infrastructure is now a top target for foreign-linked cybercriminals.

“All drinking water and wastewater systems are at risk — large and small, urban and rural,” warns the EPA.

The breach at American Water wasn’t an isolated case. It’s part of a pattern — a growing wave of cyberattacks targeting the systems we all rely on. Over the last two years, attacks have hit energy, water, transportation, and more. Here’s how it has unfolded.

Recent critical infrastructure attacks

  • May 2023 – Volt Typhoon in U.S. Critical Infrastructure
    Volt Typhoon, a Chinese state-backed group, targeted U.S. critical infrastructure — including maritime, energy, and transport. It used native Windows tools and stolen credentials to stay hidden — avoiding malware entirely to evade detection.
  • August 2023 – Polish Railway Hijack
    In Poland, hackers used radio signals to trigger emergency stops. They disrupted rail traffic with just $30 worth of equipment.
  • February 2024 – UnitedHealth ransomware attack
    A ransomware attack on UnitedHealth’s Change Healthcare disrupted insurance payments across the U.S., affecting hospitals, pharmacies, and 100 million Americans. The outage lasted weeks, delaying billions in reimbursements.
  • June 2024 – Texas Water System Hacked
    The CyberArmyofRussia_Reborn (CARR), a Russian hacktivist group, hit water systems in rural Texas. In Muleshoe and Hale Center, they used exposed remote ports to overflow tanks and disrupt operations.
  • August 2024 (discovered)– Salt Typhoon: Telecom Espionage Campaign
    Salt Typhoon
    , a China-backed threat actor, used stolen credentials and malware-free techniques to infiltrate U.S. telecommunications providers, including Verizon, AT&T, and T-Mobile. The group accessed sensitive subscriber metadata, raising serious concerns about espionage and U.S. national security.
  • October 2024 – American Water Breach
    American Water shut down billing and customer systems to stop a cyberattack. Water service continued, but the breach exposed how fragile legacy infrastructure can be.
  • November 2024 – Unitronics PLCs Targeted
    CyberAv3ngers
    exploited flaws in Unitronics’ PLCs — devices used in water plants. Their attacks hit dozens of systems in the U.S. and Israel.
  • March 2025 – Ukrainian Railway Attacks
    A cyberattack halted Ukraine’s national railway. It shut down ticketing and logistics. Officials blamed Russian actors.
  • April 2025 – Moroccan Social Security Fund Breached
    Hackers breached Morocco’s national social security system. They leaked sensitive data on Telegram. Reports linked the attack to Algerian groups.
  • May 2025 – UK Retail Infrastructure Hit
    Scattered Spider
    hit UK retailers — including Co-op and Harrods — with ransomware. It brought grocery logistics to a halt.

Critical infrastructure risks keep growing

So why are these systems so vulnerable?

CISA sounded the alarm in its 2024 review.

“Nation-state actors are increasingly targeting critical infrastructure to prepare for future disruption,” it wrote. “Sectors like water, energy, and healthcare are already under stress — from aging systems and weak cyber defenses.”

The fact is, modern threats move faster than old defenses, warns Illumio's Dearing.

“A lot of these systems run on unsupported software and unpatched code,” he said. “It’s a huge attack surface — and it’s often hard to monitor.”

At the dragon's gate

The medieval map is no longer mythical. Threats to critical infrastructure are here and now.

For a closer look at how Zero Trust strategies can help safeguard critical infrastructure from today’s evolving threats, explore the Department of Defense’s Zero Trust Reference Architecture. It offers practical guidance for reducing risk and building greater resilience.

And learn how to defend against the next inevitable critical infrastructure breach with a Zero Trust architecture.

관련 주제

관련 기사

에센셜 에이트 취약점 관리 노력의 최적화
사이버 레질리언스

에센셜 에이트 취약점 관리 노력의 최적화

서로 다른 시스템이 서로 연결되어 있고 이제 전 세계에 원격 근무자가 있기 때문에 사이버 범죄에 대한 노출과 기회가 증가하고 있습니다.

도메인 컨트롤러란?
사이버 레질리언스

도메인 컨트롤러란?

도메인 컨트롤러는 보안 인증 요청에 응답하고 컴퓨터 네트워크 도메인의 사용자를 확인합니다.네트워크 도메인을 보호하는 방법은 다음과 같습니다.

오늘날의 분산 시스템의 정책 과부하 해소를 위한 가이드
사이버 레질리언스

오늘날의 분산 시스템의 정책 과부하 해소를 위한 가이드

8가지 유형의 분산 시스템 정책을 살펴보고 해당 정책 인프라, 보안 및 자동화를 이해하기 위한 명확한 로드맵을 찾아보십시오.

Medusa 랜섬웨어가 중요 인프라에 대한 위협이 커지는 이유
랜섬웨어 억제

Medusa 랜섬웨어가 중요 인프라에 대한 위협이 커지는 이유

Medusa 랜섬웨어의 작동 원리와 전 세계 중요 인프라에 왜 그렇게 위험한지 알아보십시오.

에너지 사업자가 덴마크의 사상 최대 규모의 중요 인프라 공격으로부터 배울 수 있는 것
제로 트러스트 세그멘테이션

에너지 사업자가 덴마크의 사상 최대 규모의 중요 인프라 공격으로부터 배울 수 있는 것

이번 공격에 대해 우리가 알고 있는 내용과 에너지 사업자가 제로 트러스트 세그멘테이션을 통해 유사한 보안 침해에 사전에 대비할 수 있는 방법은 다음과 같습니다.

S&P Global: Top 3 Ways to Address Critical Infrastructure's Ransomware Threat
랜섬웨어 억제

S&P Global: Top 3 Ways to Address Critical Infrastructure's Ransomware Threat

Trevor Dearing, Illumio solutions marketing director, and Eric Hanselman, Global Market Intelligence chief analyst of S&P Global address ransomware concerns.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?