HomeIntelligenceBrief
BREACH BRIEF🔴 Critical Breach

Hackers Claim Administrative Control Over Venice San Marco Flood Defense Pumps

A hacktivist group announced they have breached the SCADA system that operates Venice’s San Marco flood‑defense pumps, claiming they can disable the pumps and flood the historic piazza. The incident highlights the cyber‑physical risk to public‑utility OT and the need for stringent third‑party security controls.

LiveThreat™ Intelligence · 📅 April 13, 2026· 📰 securityaffairs.com
🔴
Severity
Critical
BR
Type
Breach
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
securityaffairs.com

Hackers Claim Administrative Control Over Venice San Marco Flood Defense Pumps

What Happened — A threat‑actor group calling itself “Infrastructure Destruction Squad” (also known as “Dark Engine”) announced that it had breached the SCADA‑controlled hydraulic pump system protecting Piazza San Marco. The attackers posted screenshots of control panels, claimed full administrative access, and warned they could disable the pumps to flood the historic area.

Why It Matters for TPRM

  • Critical public‑utility OT can be compromised, turning a cyber intrusion into a physical disaster.
  • Third‑party vendors that supply, maintain, or host SCADA platforms may be the weak link.
  • Exposure demonstrates the need for continuous monitoring and incident‑response clauses in vendor contracts.

Who Is Affected — Government/public infrastructure, water‑management utilities, OT/SCADA service providers, and any downstream vendors that integrate with the flood‑defense system.

Recommended Actions

  • Verify that the vendor responsible for the pump control system has robust OT security controls (network segmentation, multi‑factor admin access, regular patching).
  • Demand evidence of incident‑response testing and a post‑mortem report.
  • Review contract clauses for cyber‑physical risk, including liability and service‑continuity guarantees.

Technical Notes — The breach appears to have begun in late March 2026 via an unknown remote‑access vector, possibly stolen credentials or an unpatched vulnerability. Attackers exfiltrated system screenshots, valve states, and control‑panel layouts. No specific CVE was disclosed. Source: Security Affairs

📰 Original Source
https://securityaffairs.com/190679/hacktivism/hackers-claim-control-over-venice-san-marco-anti-flood-pumps.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.