Cyber Resilience Corps: Protecting Communities Together
This talk introduces the Cyber Resilience Corps, a collaborative initiative providing pro-bono cybersecurity services to high-risk, resource-constrained community organizations like rural water utilities and non-profits. The speakers detail the operational model of connecting corporate cybersecurity volunteers with organizations facing significant threats from nation-state actors and ransomware groups. The presentation highlights the critical need for basic security hygiene, such as MFA and asset inventory, in sectors often overlooked by traditional security vendors. The session concludes with a call to action for cybersecurity professionals to volunteer their skills to help secure essential public infrastructure.
Why Your Next Target Should Be a Rural Water Utility
TLDR: Community infrastructure like rural water utilities and small non-profits are currently facing a wave of opportunistic attacks that bypass basic security controls. Attackers are leveraging T1566-002 spearphishing and T1078 valid account abuse to compromise systems that lack even fundamental OWASP A07:2021-Identification and Authentication Failures. Security researchers and pentesters have a unique opportunity to provide pro-bono support to these high-risk, resource-constrained organizations before they become the next headline.
The assumption that small organizations fly under the radar is a dangerous myth. While the cybersecurity industry obsesses over complex supply chain compromises and zero-day exploits, threat actors are busy picking the low-hanging fruit. Rural water utilities, local food banks, and small non-profits are being hit by ransomware crews and opportunistic attackers who do not care about the size of the target. They care about the ease of entry. If you are a researcher or a pentester, you have likely seen this during engagements: a lack of basic hygiene, shared credentials, and a complete absence of multi-factor authentication.
The Reality of Insecure Infrastructure
During a recent panel at DEF CON 2025, researchers highlighted the stark reality facing community-level infrastructure. These organizations often rely on third-party managed service providers who may not prioritize security, or they operate with legacy systems that have not been patched in years. The attack surface is often surprisingly simple. We are talking about exposed RDP, weak password policies, and a total lack of asset inventory.
When an attacker targets these entities, they are not looking for a sophisticated exploit chain. They are looking for a way in. A common entry point is T1566-002, where a well-crafted spearphishing email targets a town clerk or a water system operator. Once the attacker gains a foothold, they move laterally using T1078 to abuse valid accounts. Because these organizations often lack centralized logging or EDR, the attacker can maintain persistence for months without detection.
Technical Gaps and Exploitation
The technical failures in these environments are often foundational. For instance, many of these utilities use shared credentials for administrative access to their industrial control systems or business networks. If you are performing a penetration test, you do not need to burn a zero-day. You just need to look for the low-hanging fruit.
Consider the common practice of using pre-shared keys for wireless networks or failing to enforce MFA on Microsoft 365 accounts. Attackers are actively scanning for these misconfigurations. In one case study, researchers identified that a water utility had no visibility into their own hardware or software inventory. They were effectively blind to what was running on their network. If you cannot see it, you cannot secure it.
For those interested in helping these organizations, the Google Jigsaw suite of tools, specifically the Jigsaw Password Checkup or similar open-source auditing tools, can be invaluable for identifying compromised credentials. When you are on an engagement, focus on the basics:
- Enumerate exposed services using
nmap -sV -sC -p- <target_ip>. - Check for default credentials on common administrative interfaces.
- Verify if MFA is enforced on all external-facing portals.
The Role of the Security Community
The gap between the security posture of a Fortune 500 company and a rural water utility is massive. This is where the Cyber Resilience Corps comes in. This initiative connects cybersecurity professionals with community organizations that cannot afford traditional security services. It is a model that relies on the expertise of the community to fill a critical market gap.
As a pentester, you have the skills to identify these vulnerabilities. Instead of just reporting them to a client who will ignore them, you can help these organizations understand the risk. The goal is not to perform a full-scale red team exercise that breaks their production environment. The goal is to provide actionable, high-impact advice that moves the needle on their security posture.
Defensive Priorities for Resource-Constrained Teams
If you are working with a blue team at one of these organizations, prioritize the "boring" stuff. It is not glamorous, but it is effective.
- Asset Inventory: You cannot protect what you do not know exists. Use simple network scanning to map out every device.
- MFA Everywhere: This is the single most effective control against the majority of attacks targeting these sectors.
- Patch Management: Focus on the critical vulnerabilities that are actively being exploited in the wild. Check the CISA Known Exploited Vulnerabilities Catalog to see what you should prioritize.
The next time you are looking for a project, consider reaching out to a local non-profit or utility. You do not need to be a nation-state level researcher to make a difference. You just need to be willing to help them close the doors that are currently wide open. The threat is real, the impact is tangible, and the community needs your expertise. Stop waiting for the next big breach to happen and start helping the organizations that are most vulnerable to it.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
OWASP Categories
All Tags
Up Next From This Conference

DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks

Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen




