• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Nine Ways Entrepreneurs Can Use Cloud Technology To Scale Their Businesses

March 30, 2023

Nokia G60 5G review

March 30, 2023

Seattle startup uses GPT to create meeting highlight reels – Startup

March 30, 2023
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    Samsung’s One UI 5 update is largely about personalization

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»Colonial Pipeline attack: Hacking the physical world
Security

Colonial Pipeline attack: Hacking the physical world

July 6, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Colonial Pipeline attack: Hacking the physical world
Share
Facebook Twitter LinkedIn Pinterest Email

The assault is a reminder of rising cyberthreats to crucial infrastructure whereas additionally exhibiting why suppliers of important companies are ripe targets for cybercriminals

Whereas detractors have argued that threats towards bodily infrastructure are overstated and largely theoretical, the growing list of organizations which were efficiently attacked suggests in any other case. And now the media is filled with studies of the flow-on results of the ransomware assault leveled towards Colonial Pipeline by the DarkSide cybercriminal gang. The truth is, so much has occurred since – US President Joe Biden has signed an executive order geared toward bettering the nation’s cyber-defenses and the corporate has restarted normal operations, whereas DarkSide claims to have shut up shop and there are additionally reports that Colonial Pipeline paid the gang $5 million in ransom.

Regardless, whereas the investigation into the assault is ongoing, detection of Win32/Filecoder.DarkSide has been in play since October 2020, so attackers wouldn’t appear to be utilizing some super-sneaky, state-sponsored zero-day exploit to compromise their targets.

For years we’ve famous would-be attackers quietly probing round crucial infrastructure targets, even launching assaults towards particular, high-value targets akin to within the examples listed above. This reveals no signal of slowing. When these assaults occurred, we had been requested whether or not we’d see related efforts within the North American market. We stated sure. We had been proper.

It’s fascinating that within the case of NotPetya (aka Diskcoder.C), the particular items of the assault by themselves had been additionally not super-crazy zero days. Within the present setting, the fact is that attackers don’t must burn zero days; they will get in with out them.

See also  Axio's solution for quantifying cyber risk raises $23 million

By spending important time understanding a goal’s community and infrastructure, specifically crafted assault sequences are surprisingly efficient with a excessive diploma of off-the-shelf threats we’ve identified about for years.

Whereas there was important safety effort by crucial infrastructure operators lately, they’re beginning with decades-old gear, networking gear, and communications protocols to start with. This implies they’ve little greater than serial protocols (with no safety), Modbus, which isn’t significantly better, or certainly one of a handful of others which are equally insecure. They forklifted in safety gateways and have made strides, nevertheless it’s nonetheless comparatively straightforward to search out chinks within the safety armor. They’re ramping up safe communication applied sciences, however the effort nonetheless feels nascent.

Add to this the impression of shutting down some chunk of bodily infrastructure we largely take with no consideration, and attackers have low-hanging fruit ripe for the selecting.

In the meantime, crucial infrastructure operators try to lure safety specialists away from Silicon Valley to work on some distant mountaintop securing a crucial facility with its ageing expertise. This may be unalluring and, subsequently, a exhausting promote if the opposite choice is a sizzling startup in massive metropolis.

However when the lights, water, gas, or communication networks out of the blue cease, count on renewed give attention to crucial infrastructure safety.

And whereas there are critical teams of expertise pundits ramping up particular initiatives to thwart ransomware, it’s unnerving realizing that attackers can nonetheless be efficient utilizing years-old threats we thought we had been all protected towards and had solved.



Source link

See also  Cyber insurance coverage is on the rise, and organizational safety postures should comply with swimsuit
Attack Colonial hacking physical Pipeline World
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

This Self-Taught Artist Picked Up A Paintbrush At Age 48. Now The Art World Has Discovered Her.

February 12, 2023

By Teaching Young Men How To Date In The Post-Pandemic World, She Built A Nearly $1 Million Business

January 3, 2023

Why the World Fell for FTX CEO Sam Bankman-Fried

December 4, 2022

How Apple privacy changes have forced social media marketing to evolve

October 16, 2022
Add A Comment

Comments are closed.

Editors Picks

Arcade management sim Arcade Paradise locks in August release date

July 2, 2022

The Final of Us’ PS5 remake features a velocity run mode and smarter AI

July 22, 2022

GRC leads £695,000 investment round into Finexos

August 23, 2022

Qureate pronounces new anime lady therapeutic massage sport Therapeutic massage Freaks

July 14, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Nine Ways Entrepreneurs Can Use Cloud Technology To Scale Their Businesses

Nokia G60 5G review

Seattle startup uses GPT to create meeting highlight reels – Startup

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2023 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.