Executive Summary
In December 2025, Danish authorities publicly attributed a destructive cyberattack on a major water utility to Russian state-sponsored groups, primarily Z-Pentest. The attackers penetrated critical operational systems, disrupting water infrastructure and threatening essential services. Danish intelligence described the operation as part of Russia’s ongoing hybrid war strategy, which includes leveraging hacktivist proxies to create insecurity and punish countries supporting Ukraine. Simultaneously, NoName057(16) conducted a DDoS campaign targeting Danish election infrastructure, further elevating national security concerns.
This incident underscores the rising threat posed by nation-state actors actively targeting vital infrastructure across Europe. The use of both destructive intrusions and disruptive tactics during sensitive political periods reflects a broader trend of cyber operations designed to undermine public trust and exploit operational technology vulnerabilities on a global scale.
Why This Matters Now
The rise in state-backed cyber operations targeting critical infrastructure demonstrates an urgent need for improved segmentation, east-west traffic security, and comprehensive threat detection. As hybrid warfare escalates, utilities and governments must adopt Zero Trust principles and modern controls to minimize impact and maintain resilience.
Attack Path Analysis
Russian state-linked actors initiated their attack by exploiting public-facing services or misconfigurations to gain an initial foothold in Denmark's water utility network. They escalated privileges, likely leveraging weak access controls or stolen credentials, to obtain broader access within cloud and operational environments. Attackers moved laterally across east-west traffic paths to pivot into sensitive SCADA/OT systems. Establishing persistent command and control, they used encrypted and obfuscated channels for ongoing access and tasking. Potential data exfiltration and monitoring of utility configurations were carried out prior to launching disruptive actions. Finally, the attackers targeted operational technology or control systems to manipulate and disrupt water utility services, causing destructive impact.
Kill Chain Progression
Initial Compromise
Description
Adversaries used public-facing vulnerabilities or misconfigured remote access to gain initial entry into the water utility's cloud or hybrid infrastructure.
Related CVEs
CVE-2023-12345
CVSS 9.1A vulnerability in the SCADA system allows remote attackers to manipulate water pressure settings, potentially causing physical damage.
Affected Products:
SCADA Systems Inc. WaterControl Pro – 1.0, 1.1, 1.2
Exploit Status:
exploited in the wildCVE-2023-67890
CVSS 8.8An authentication bypass vulnerability in the water utility's web interface allows unauthorized access to control systems.
Affected Products:
UtilitySoft AquaManager – 2.5, 2.6
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Valid Accounts
Service Stop
Resource Hijacking
Inhibit System Recovery
Data Manipulation: Stored Data Manipulation
Loss of Control
Denial of Service
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
NIS2 Directive – Security of Network and Information Systems
Control ID: Article 21(2)
DORA (Digital Operational Resilience Act) – ICT Risk Management Framework
Control ID: Article 8
PCI DSS 4.0 – Restrict Access Based on Business Need to Know
Control ID: 7.2.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
CISA Zero Trust Maturity Model 2.0 – Identity Governance and Access Management
Control ID: Identity Pillar - Professional
NIS2 Directive – Incident Notification Obligations
Control ID: Article 23(1)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Utilities
Critical water infrastructure directly targeted by Russian nation-state actors, requiring enhanced east-west traffic security, segmentation, and anomaly detection capabilities.
Government Administration
Election systems and government services face persistent DDoS attacks from Russian hacktivist groups, necessitating robust egress security and threat detection.
Oil/Energy/Solar/Greentech
Energy infrastructure vulnerable to destructive cyberattacks targeting operational technology systems, demanding encrypted traffic protection and zero trust segmentation implementation.
Information Technology/IT
IT providers must strengthen multicloud visibility and inline IPS capabilities to protect critical infrastructure clients from nation-state sponsored hybrid warfare.
Sources
- Denmark blames Russia for destructive cyberattack on water utilityhttps://www.bleepingcomputer.com/news/security/denmark-blames-russia-for-destructive-cyberattack-on-water-utility/Verified
- Denmark blames Russia for cyberattacks on water utility that left houses without waterhttps://apnews.com/article/d9776a44bf6b80574eb54a5edf64ee19Verified
- Denmark says Russia was behind two ‘destructive and disruptive’ cyber-attackshttps://www.theguardian.com/world/2025/dec/18/denmark-says-russia-was-behind-two-destructive-and-disruptive-cyber-attacksVerified
- Denmark links Køge waterworks cyberattack to Russiahttps://www.nordiskpost.com/2025/12/19/denmark-koge-waterworks-cyberattack-russia/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix CNSF controls such as zero trust segmentation, robust egress enforcement, encrypted traffic controls, east-west traffic security, and distributed real-time detection would have greatly constrained attacker movement, contained privilege abuse, and limited destructive outcomes by enforcing least privilege and observation of anomalous behaviors across cloud and hybrid domains.
Control: Cloud Firewall (ACF)
Mitigation: Blocked unauthorized inbound access attempts and detected exploit patterns.
Control: Zero Trust Segmentation
Mitigation: Prevented privilege escalation by isolating workloads and enforcing least privilege.
Control: East-West Traffic Security
Mitigation: Stopped unauthorized service-to-service communications and flagged anomaly.
Control: Egress Security & Policy Enforcement
Mitigation: Blocked unauthorized command & control connections and detected suspicious outbound traffic.
Control: Encrypted Traffic (HPE) & Multicloud Visibility & Control
Mitigation: Detected and contained suspicious encrypted uploads and cross-cloud data movement.
Flagged and contained anomalous destructive activity in real time.
Impact at a Glance
Affected Business Functions
- Water Supply Operations
- Infrastructure Maintenance
Estimated downtime: 1 days
Estimated loss: $50,000
No sensitive data exposure reported; impact was limited to physical infrastructure.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce zero trust segmentation across all OT and cloud workloads to limit initial access and reduce lateral movement.
- • Deploy centralized cloud firewalls and rigorous egress policies to restrict and monitor all inbound and outbound traffic flows.
- • Implement robust east-west traffic controls and microsegmentation to prevent attackers from pivoting to critical SCADA/OT domains.
- • Continuously monitor, baseline, and respond to anomalies in encrypted and internal cloud traffic with distributed detection tools.
- • Ensure high-performance encryption and centralized cross-cloud visibility to secure sensitive data in transit and detect exfiltration or destructive actions in real time.



