• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Techhacker

New York Dam Hacked by Iran, Report Says

By
Don Reisinger
Don Reisinger
Down Arrow Button Icon
By
Don Reisinger
Don Reisinger
Down Arrow Button Icon
December 21, 2015, 4:42 PM ET
Silhouettes
Computer hacker silhouette. Blue binary code background. Seattle office.Photograph by Getty Images

Iranian hackers infiltrated the computer system at a small dam in a quiet village 20 miles from New York City in 2013, according to a report on Monday.

The hackers are said to have snooped for information about the dam in Rye Brooke, N.Y. and examined its control system, but ultimately did nothing, Wall Street Journal said, citing people who have knowledge of the incident.

The hack was part of a broader attempt by Iranian hackers to infiltrate corporate networks and access sensitive information, according to the report. The U.S. government learned of the attack at the 20-foot-tall Bowman Avenue Dam after analyzing Internet traffic coming from Iran.

The Homeland Security Department, FBI, and the NSA all declined to comment about the specific claims. But S.Y. Lee, a spokesman for the DHS, told Fortune that the government agency coordinates “national efforts to strengthen the security and resilience of critical infrastructure, working with our federal and industry partners across the country to raise awareness about evolving threats and promote measures to reduce risks to systems we all rely on.” Lee added the DHS has teams that specifically respond to threats against industrial control systems.

Dam control systems, like the one hacked in Rye Brooke, are a worrisome target in the ongoing global cyber battles. Much of the nation’s critical infrastructure, including the power grid, is connected online.

The U.S. government has warned that security used to protect such infrastructure is often outdated, insecure, and therefore, easy to hack. After gaining access, hackers can turn off power, prevent systems from shutting down, overheat computers and servers, and interfere with a dam’s operations.

Earlier this year, the DHS revealed the extent of the problem by saying that its Industrial Control Systems Cyber Emergency Response Team responded to 245 “incidents” during the fiscal year ending in February. Those incidents targeted manufacturing, energy, nuclear, transportation, and water facilities, the agency said.

The DHS reported that the attacks were most often aimed at “economic espionage and reconnaissance.” Over half of those attacks were conducted by “sophisticated actors” that had the ability to install malware, scan and probe the networks, and launch specific attacks. Other cases were attributed to criminals, insider threats, and so-called “hacktivists,” people who hack into computer systems as part of a broader cause.

The DHS does not say where those attacks come from because, in many cases, it’s difficult to determine from where they originate since hackers use anonymizing technologies to hide their identities and locations. But hackers working on behalf of various countries have allegedly been involved for years.

In 2012, for example, then-Defense Secretary Leon Panetta said that Iran was one of the most prolific hackers, targeting everything from government systems to company networks. U.S. officials have also accused China of frequent attacks along with Russia, which was said to have gained access to the White House network including the President’s daily schedule. Last year, North Korea hackers allegedly attacked Sony Pictures before the premiere of The Interview starring Seth Rogen as a journalist on a mission to kill the country’s leader, Kim Jong Un.

WATCH: For more about government-sponsored hacking, check out the following Fortune video:

Similarly, the U.S. is accused of breaching China’s networks and may have briefly shut down North Korea’s Internet connectivity following The Interview dust up. It’s also believed that the U.S. and Israel conducted a joint operation in 2010 using the cyberweapon Stuxnet to immobilize the Natanz Iranian nuclear facility.

Like its counterparts, the U.S. government has declined to comment about those alleged breaches.

Earlier this year, in his most direct comments on the issue, President Obama said in a speech at the National Cybersecurity Communications Integration Center that cyber threats pose “one of the most serious economic and national security challenges we face as a nation,” and acknowledged that hacking is ongoing.

“Foreign governments, criminals and hackers probe America’s computer networks every single day,” he said. “Moreover, much of our critical infrastructure—our financial systems, power grids, pipelines, health care systems—run on networks connected to the Internet. So this is a matter of public safety and of public health.”

SIGN UP: Get Data Sheet, Fortune’s daily newsletter about the business of technology.

The trouble, however, is actually securing that infrastructure. According to John Kindervag, a security expert at Forrester, most of the U.S. infrastructure that is connected to the Internet is poorly protected.

“There are many technologies that are Internet-enabled but not secured,” says Kindervag. “Apparently the control systems around this dam might be an example of that. This type of report is not surprising given that many technologies are just giving Internet access without thinking about the consequences of that access.”

Ben FitzGerald, director of the technology and national security program at the Center for a New American Security, told Fortune that it was especially “noteworthy” that the alleged Iranian hackers “appeared to prove, not execute an attack.”

“This shows an implied norm that theft or destruction of data is not as significant as causing physical destruction via cyber means,” he says.

Finding a solution isn’t simple. Hackers are growing more sophisticated, and, as President Obama noted in a speech earlier this year, it’s impossible for just the government or the private sector to safeguard every control system.

“Neither government, nor the private sector can defend the nation alone,” he said. “It’s going to have to be a shared mission—government and industry working hand in hand, as partners.”

The President added that “the government and the private sector are still not always working as closely together as we should.” In some cases, he said that companies don’t want to admit they’ve been hacked and in others, it’s too difficult to work with the government to address the issues.

In other words, successful hacking continues with no sign of slowing down. And along the way, those hackers may create more havoc than a simple dam breach may suggest.

“We want cyber criminals to feel the full force of American justice, because they are doing as much damage, if not more, these days as folks who are involved in more conventional crime,” President Obama said.

About the Author
By Don Reisinger
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

AIData centers
Microsoft is picking up a Texas data center project OpenAI didn’t want, in a telling sign of how far they’ve drifted apart
By Matt O'Brien and The Associated PressMarch 27, 2026
2 hours ago
InnovationDrones
The Army and Amazon are creating an online storefront to buy drones as the technology transforms the battlefield
By Jason MaMarch 27, 2026
2 hours ago
kid on laptop with parent blindfolding them
PoliticsSocial Media
Americans want kids shielded from the internet. They don’t trust websites or the government to do anything about it
By Catherina GioinoMarch 27, 2026
3 hours ago
Director of the Federal Bureau of Investigation (FBI) Kash Patel delivers remarks as U.S. President Donald Trump makes an announcement on his Homeland Security Task Force in the State Dinning Room of the White House on October 23, 2025 in Washington, DC.
CybersecurityFBI
Pro-Iranian hackers claim they breached FBI Director Kash Patel’s personal email as Trump administration offers $10 million reward
By Eric Tucker and The Associated PressMarch 27, 2026
3 hours ago
C-SuiteMark Zuckerberg
Mark Zuckerberg has cut 25,000 jobs at Meta since 2022. Here’s what that says about his leadership
By Marco Quiroz-GutierrezMarch 27, 2026
4 hours ago
CryptoCrypto Playbook
Crypto is entering its ‘collared-shirt’ era says Andreessen Horowitz partner Guy Wuollet
By Jeff John RobertsMarch 27, 2026
5 hours ago

Most Popular

C-Suite
'I didn’t want anybody shooting me': Five Guys CEO gave away $1.5 million bonus to employees over botched BOGO burger birthday celebration
By Fortune EditorsMarch 25, 2026
2 days ago
AI
Exclusive: Anthropic acknowledges testing new AI model representing ‘step change’ in capabilities, after accidental data leak reveals its existence
By Fortune EditorsMarch 26, 2026
18 hours ago
Environment
Vail Resorts CEO says it’s time to think beyond the $1,000 ski pass that helped build the empire
By Fortune EditorsMarch 26, 2026
2 days ago
Success
Palantir’s billionaire CEO says only two kinds of people will succeed in the AI era: trade workers — ‘or you’re neurodivergent’
By Fortune EditorsMarch 24, 2026
3 days ago
Commentary
The Treasury just declared the U.S. insolvent. The media missed it
By Fortune EditorsMarch 23, 2026
4 days ago
Success
The scientist who helped create AI says it’s only 'a matter of time' before every single job is wiped out—even safer trade jobs like plumbing
By Fortune EditorsMarch 26, 2026
1 day ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.