In April 2025, unidentified hackers breached the control system of a hydroelectric dam at Lake Risevatnet, southwest of Norway, and remotely opened one of the dam’s water discharge valves. The attackers set the valve to 100% capacity for approximately four hours, causing an increased outflow of 497 liters per second above normal. Although this figure was well within the dam’s safe design—its riverbed can handle up to 20,000 liters per second—the event exposed a severe operational risk: attackers had real-time control of physical processes, and safety depended on sheer luck and detection.
The breach exploited a web-accessible Human-Machine Interface (HMI), a core dam control component, which was left protected only by a weak password. This credential weakness, combined with the HMI’s direct internet exposure, allowed remote attackers to command critical operations undetected for hours. Only after roughly four hours did operators spot the unauthorized change and restore the system.
Forensic investigation pointed to a Russian-Hacktivist Group, Z-PENTEST, with Telegram videos published as proof. Norwegian authorities (Kripos) were notified. No physical damage occurred, but only because the attackers did not push the process past safe boundaries.
A 2024 Censys scan found 145,000+ ICS devices (including dams, water plants, and energy networks) exposed to the public internet. Of these, more than 48,000 were in the United States alone. Many devices—including HMIs, PLCs, and SCADA panels—are discoverable with simple scans, often still protected by default or easily guessed passwords.
Additional industrial research highlights:
Professional experts have sounded the alarm: “Assuming air-gapped security is no longer viable. Remote access, vendor connections, and weak authentication are now the industry’s biggest blind spots.” Real-world attacks increasingly involve “Manipulation of Control”—changing setpoints, opening valves, or disrupting processes—and “Manipulation of View” (hiding malicious actions from operators).
The Norwegian incident underlines the need for technical, evidence-based controls, not just regulatory box-ticking. Current best practice, as identified by security frameworks and industry research, includes:
With the EU’s NIS2 Directive and standards like IEC 62443/NIST CSF raising the bar, operators are now expected to demonstrate continuous risk management, not just occasional audits.
The Lake Risevatnet dam breach is a clear warning: attackers can—and do—gain operational control if basic cyber hygiene and risk management are not enforced. Numbers don’t lie: tens of thousands of critical assets remain exposed, vulnerabilities are increasing, and attack tactics are becoming more direct. Protecting infrastructure now means real-time visibility, technical vigilance, and adopting proven risk management automation—before an “almost” disaster becomes a real one.
The screen shows a control panel for the motorized valve (“Motorventil”) managing minimum water flow (“Minstevassførrør”), with manual controls and a gauge set to “Fr 49%,” which was changed by the Z-PENTEST hackers.
One Weak Password, Full Process Control: Inside Norway’s 2025 Dam Cyberattack
Project Management in OT/ICS Projects with IEC 62443 and MITRE ATT&CK using Radiflow
Rogue Communication Modules in Solar Inverters: Radiflow Threat Analysis