• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»Colonial Pipeline attack: Hacking the physical world
Security

Colonial Pipeline attack: Hacking the physical world

July 6, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Colonial Pipeline attack: Hacking the physical world
Share
Facebook Twitter LinkedIn Pinterest Email

The assault is a reminder of rising cyberthreats to crucial infrastructure whereas additionally exhibiting why suppliers of important companies are ripe targets for cybercriminals

Whereas detractors have argued that threats towards bodily infrastructure are overstated and largely theoretical, the growing list of organizations which were efficiently attacked suggests in any other case. And now the media is filled with studies of the flow-on results of the ransomware assault leveled towards Colonial Pipeline by the DarkSide cybercriminal gang. The truth is, so much has occurred since – US President Joe Biden has signed an executive order geared toward bettering the nation’s cyber-defenses and the corporate has restarted normal operations, whereas DarkSide claims to have shut up shop and there are additionally reports that Colonial Pipeline paid the gang $5 million in ransom.

Regardless, whereas the investigation into the assault is ongoing, detection of Win32/Filecoder.DarkSide has been in play since October 2020, so attackers wouldn’t appear to be utilizing some super-sneaky, state-sponsored zero-day exploit to compromise their targets.

For years we’ve famous would-be attackers quietly probing round crucial infrastructure targets, even launching assaults towards particular, high-value targets akin to within the examples listed above. This reveals no signal of slowing. When these assaults occurred, we had been requested whether or not we’d see related efforts within the North American market. We stated sure. We had been proper.

It’s fascinating that within the case of NotPetya (aka Diskcoder.C), the particular items of the assault by themselves had been additionally not super-crazy zero days. Within the present setting, the fact is that attackers don’t must burn zero days; they will get in with out them.

See also  Ubisoft announces a slew of new Assassin's Creed titles set all over the world

By spending important time understanding a goal’s community and infrastructure, specifically crafted assault sequences are surprisingly efficient with a excessive diploma of off-the-shelf threats we’ve identified about for years.

Whereas there was important safety effort by crucial infrastructure operators lately, they’re beginning with decades-old gear, networking gear, and communications protocols to start with. This implies they’ve little greater than serial protocols (with no safety), Modbus, which isn’t significantly better, or certainly one of a handful of others which are equally insecure. They forklifted in safety gateways and have made strides, nevertheless it’s nonetheless comparatively straightforward to search out chinks within the safety armor. They’re ramping up safe communication applied sciences, however the effort nonetheless feels nascent.

Add to this the impression of shutting down some chunk of bodily infrastructure we largely take with no consideration, and attackers have low-hanging fruit ripe for the selecting.

In the meantime, crucial infrastructure operators try to lure safety specialists away from Silicon Valley to work on some distant mountaintop securing a crucial facility with its ageing expertise. This may be unalluring and, subsequently, a exhausting promote if the opposite choice is a sizzling startup in massive metropolis.

However when the lights, water, gas, or communication networks out of the blue cease, count on renewed give attention to crucial infrastructure safety.

And whereas there are critical teams of expertise pundits ramping up particular initiatives to thwart ransomware, it’s unnerving realizing that attackers can nonetheless be efficient utilizing years-old threats we thought we had been all protected towards and had solved.



Source link

See also  Sam Altman’s World Tour Hopes to Reassure AI Doomers| Startup
Attack Colonial hacking physical Pipeline World
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

How Prioritizing Emotional And Physical Health Benefits Business

September 6, 2023

Donald Trump’s Mug Shot Matters in a World of Fakes

August 25, 2023

The World Isn’t Ready for the Next Decade of AI

August 16, 2023

To Navigate the Age of AI, the World Needs a New Turing Test

August 14, 2023
Add A Comment

Comments are closed.

Editors Picks

Nespresso Vertuo Next review

September 16, 2022

The first 10 calls every entrepreneur should make – Startup

December 28, 2022

British Brand Works To Transform The Supplement Industry

September 30, 2022

‘Translate’ legal documents into plain language with new AI tool

February 22, 2023

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.