Hacktivist Honeypot Hijinks: Russia-Aligned Group Fooled by Fake Water Utility System
TwoNet, a Russia-aligned hacktivist group, has been hilariously duped into attacking a honeypot masquerading as a water treatment facility, as revealed by cybersecurity firm Forescout. Believing they had nailed a real hack, they broadcasted their “achievement” on Telegram, only to find they had been pranking themselves in a cybersecurity sting operation.

Hot Take:
Looks like TwoNet took a dip in the shallow end of the cybersecurity pool, thinking they were orchestrating a grand infiltration, only to end up splashing around in a honeypot. If only they’d used a bit of sunscreen to protect against this embarrassing exposure! Forescout’s got them caught red-handed, like a kid with a hand in the cookie jar—except this time, it’s a water treatment plant’s HMI. Better luck next hack, TwoNet!
Key Points:
- TwoNet hacktivists targeted a honeypot disguised as a water treatment utility.
- The gang claimed responsibility for the attack on their Telegram channel.
- Default credentials and known vulnerabilities were exploited in the attack.
- This incident is part of a larger trend of hacktivists targeting operational technology.
- Forescout recommends improved security measures for OT systems.