• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechCybersecurity

‘Dorky’ Google Search Helped Hacker Bust Into a New York Dam

By
Hilary Brueck
Hilary Brueck
Down Arrow Button Icon
By
Hilary Brueck
Hilary Brueck
Down Arrow Button Icon
March 28, 2016, 9:42 AM ET
Google Illustration
BERLIN, GERMANY - JUNE 02: The Google search engine is displayed on a screen on June 02, 2014 in Berlin, Germany. (Photo by Michael Gottschalk/Photothek via Getty Images)Photograph by Michael Gottschalk — Photothek/Getty Images

A few extra-fancy Google searches may have been at work when a hacker busted into a New York dam in 2013.

The alleged hacker used a simple technique called “Google dorking” to tap into the computer system that controlled gates and other mechanisms on the Bowman Avenue dam in suburban New York, the Wall Street Journal reports.

“He was just trolling around, and Google-dorked his way onto the dam,” a person familiar with the investigation told the Journal.

Get Data Sheet, Coins2Day ’s technology newsletter.

That dam hack was part of a massive, multi-year breach that tapped into at least 46 financial institutions across the United States. On Thursday, the White House indicted seven Iranians for the attacks.

Attorney General Loretta Lynch said the breach totaled up to tens of millions of dollars in damages. The hackers are suspected of working on behalf of the Iranian government.

The so-called “dorking” technique that was used on the dam is not always a malicious one. It’s simply a way to use specific Google search terms to find more hidden information and pages that wouldn’t normally turn up in a regular Google search.

This particular search strategy can help turn up information companies or agencies may not have meant to make totally public online, like login portals. Experts also use dorking to look for security holes.

For more about Google search, watch:

But the straightforward, unsophisticated technique that was used in the dam breach is concerning for security experts. As Intel CTO Steve Grobman told Reuters, “This is as a good example of how critical infrastructure is vulnerable to various actors.”

The other security breaches in the indictment. All of which took place between 2011 and 2013, included other kinds of attacks that targeted financial institutions such as Bank of America, Nasdaq OMX Group, the New York Stock Exchange, and Capital One, the Journal noted.

About the Author
By Hilary Brueck
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.