Romania's Water Management Agency Hit by Ransomware Attack Affecting 1,000 Systems
Attackers weaponized Windows BitLocker to encrypt systems across Romanian Waters, impacting 10 of 11 river basin management organizations.
Romania's national water management agency, Administrația Națională Apele Române (Romanian Waters), confirmed that a ransomware attack beginning December 20 has compromised approximately 1,000 systems across its infrastructure. The attack spread to 10 of the country's 11 river basin management organizations, affecting everything from geographic information systems to email servers.
TL;DR
- What happened: Ransomware attack on Romania's water management agency encrypted ~1,000 systems using BitLocker
- Who's affected: Romanian Waters and 10 of 11 regional river basin management organizations
- Severity: High - critical infrastructure attack disrupting water management operations
- Action required: OT/ICS operators should audit BitLocker policies and network segmentation between IT and OT systems
What Systems Were Compromised?
According to Romania's National Cyber Security Directorate (DNSC), the attack impacted a broad range of infrastructure:
- Geographic Information System (GIS) application servers
- Database servers containing operational data
- Windows workstations across multiple facilities
- Windows Server infrastructure
- Email and web servers
- Domain name servers
The DNSC confirmed that attackers exploited Windows BitLocker—a legitimate disk encryption feature—to encrypt files across the compromised systems. This technique, sometimes called "living off the land," uses built-in operating system tools to avoid detection by security software looking for known ransomware binaries.
How BitLocker Becomes a Weapon
BitLocker is Microsoft's full-disk encryption feature, designed to protect data if a device is lost or stolen. Ransomware operators have increasingly abused it because:
- It's already present on Windows systems—no malware deployment needed
- Security tools typically whitelist BitLocker as a legitimate process
- Encryption is fast and reliable (it's designed for enterprise use)
- Recovery requires either the BitLocker recovery key or paying the ransom
The attack pattern typically involves:
- Gaining administrative access to target systems
- Enabling BitLocker with an attacker-controlled recovery key
- Rebooting systems to complete encryption
- Deleting or exfiltrating the original recovery keys
- Demanding payment for key restoration
Geographic Spread of the Attack
The infection spread rapidly across Romanian Waters' distributed infrastructure. Ten of Romania's 11 Administrații Bazinale de Apă (river basin administrations) reported compromised systems. These regional organizations manage water resources, flood control, and dam operations across different river systems.
The lone unaffected basin administration hasn't been identified, but its isolation may indicate either better network segmentation, different system configurations, or simply that it wasn't connected to compromised infrastructure at the time of the attack.
Why Water Infrastructure Remains Vulnerable
Water utilities face several security challenges that make them attractive ransomware targets:
Legacy systems: Many water management systems run outdated operating systems because upgrading operational technology is expensive and requires careful testing to avoid disrupting critical services.
Converged IT/OT networks: As utilities digitize operations, the air gaps between corporate IT networks and operational technology controlling physical processes have eroded. An attacker who compromises the IT network can often pivot to systems controlling pumps, valves, and sensors.
Limited security budgets: Public utilities typically operate with constrained IT budgets. Security investments compete with infrastructure maintenance and regulatory compliance.
24/7 operational requirements: Water systems can't easily be taken offline for patching or security updates without affecting service delivery.
Remediation Efforts Ongoing
Romanian Waters stated that remediation work is still in progress. Recovery from a BitLocker-based attack typically requires either:
- Restoring from backups (if backups exist and weren't also encrypted)
- Using stored BitLocker recovery keys (if attackers didn't delete them)
- Rebuilding systems from scratch
- Paying the ransom (which authorities generally advise against)
The DNSC hasn't disclosed whether any ransom demand was made or the identity of the threat actors responsible.
Recommended Mitigations
- Control BitLocker deployment - Use Group Policy to restrict who can enable BitLocker and audit recovery key storage
- Segment OT networks - Maintain strict separation between corporate IT and operational technology networks
- Protect recovery keys - Store BitLocker recovery keys in a secure, air-gapped location that attackers can't access after initial compromise
- Deploy endpoint detection - Monitor for unusual BitLocker activity, including unexpected enablement or recovery key queries
- Maintain offline backups - Keep verified backup copies that can't be reached through network access
Frequently Asked Questions
Could this attack affect water quality or safety?
The disclosed impact focuses on IT systems (email, databases, GIS). Operational control systems for water treatment are typically separate, though network segmentation varies by utility. Romanian authorities haven't indicated any impact on water safety.
Why would attackers use BitLocker instead of ransomware?
Using built-in tools helps attackers evade detection. Security software is designed to catch malicious executables, not legitimate Windows features. BitLocker-based attacks also require no payload development or testing.
Is this connected to other water utility attacks in Europe?
No direct connection has been established. However, the attack follows Denmark's attribution of water utility attacks to Russian-linked groups earlier this week, highlighting ongoing threats to European water infrastructure.
Related Articles
Gentlemen Ransomware Cripples Romania's Largest Coal Power Producer
Oltenia Energy Complex shut down IT systems on December 26 after a ransomware attack encrypted critical documents and disrupted ERP, email, and web operations.
Dec 31, 2025Canadian College Suspends Classes After Holiday Cyber Attack
Aurora College in Canada's Northwest Territories cancels all classes January 5-9 after cyber attack over Christmas break takes down servers, email, and e-learning systems.
Jan 5, 2026Hacker Selling 139GB of US Utility Engineering Data
Pickett USA breach exposes LiDAR scans, transmission line surveys, and substation layouts for Tampa Electric, Duke Energy Florida, and American Electric Power. Asking price: 6.5 BTC.
Jan 9, 2026Dartmouth Breach Exposes 44,000 in Clop Oracle Campaign
Russian ransomware gang exploited CVE-2025-61882 to steal SSNs and financial data from the college. The same vulnerability hit Harvard, UPenn, and 100+ organizations.
Jan 7, 2026