Create an Account
x

Log in

Username:

Password:
 

or Register

  Lost Password?




Ban quản trị chúng tôi sẽ tiến hành rà soát Spamer và các bài viết không đúng Box sẽ bị xóa sạch, Các spamer cố tình sẽ bị Block IP vĩnh viễn . Xin cảm ơn bạn đã đọc

Thread Informations
  • Author: kafa88
  • Views: 126
  • Posts: 0
Thread Quality: % 0
Share:

People who read that Thread

User(s) browsing this thread: 1 Guest(s)

Enter Keywords

Facebook



299.000đ
QUẦN JEAN ỐNG RỘNG CẠP CAO, DÀI XẺ GẤU PHONG CÁCH J6
99.000đ
ÁO KHOÁC CARDIGAN MẶT CƯỜI NỮ CHẤT NỈ COTTON
150.000đ
ÁO KHOÁC HOODIE NAM NỮ PHỐI THEO PHONG CÁCH HÀN QUỐC FORM RỘNG HÌNH THÊU SIÊU ĐẸP CỰC CHẤT LƯỢNG HÀNG HOT TREND
148.000đ
QUẦN DÀI NỮ SUÔNG KẺ CARO
148.000đ
SET ĐẦM MẶC HAI KIỂU KÈM BÔNG CỔ MOCKING THÂN SAU(CÓ MÚT) MD126
49.000đ
ÁO THUN NỮ, ÁO PHÔNG UNISEX COTTON SU MÁT MẺ EDIE BAUER






Tu dong dao bitcoin

Post Reply 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
How do cyber attackers close oil pipelines?
05-11-2021, 01:40 PM
Post: #1
How do cyber attackers close oil pipelines?
[Image: _118452672_pipe.png]


Researchers at the largest fuel pipeline in the United States are working to recover from a deadly cyber attack that cut the oil flow.The hacking of the colonial pipeline was seen as one of the most significant attacks on national infrastructure in history.
Oil pipelines are nearly half of the east coast, and pump prices are expected to rise if the power goes out for a long time.


How was the pipeline hacked?

For many, the picture of the เกม slotxo oil industry is one of the greasy black pump tubes and liquids.In fact, the modern colonial pipeline operation type is very digital.Pressure sensors, thermostats, valves and pumps are used to monitor and control the flow of diesel, gasoline and jet fuel over hundreds of miles of pipelines.The colony also had robots A high-tech "smart pig" (pipe inspection gauge) running through the pipe to detect anomalies.All of these operational technologies are connected to a central system.And as cyber experts like CheckPoint's Jon Niccolls explain where connections are vulnerable to cyberattacks:All the equipment used in modern pipelines are controlled by computers instead of people," he said.If they are connected to an organization's internal network and are under attacked by cyber attacks, the pipeline is vulnerable to malicious attacks.


How did hackers enter?

Experts say direct attacks against operational technologies are rare because these systems tend to be better protected.Therefore, it is more likely that hackers gain access to Colonial's computer systems through the administration of the business. Some of the biggest attacks we've seen all started with email," Mr Niccolls said. Employees may be tricked into downloading certain malware, etc.We've also seen recent examples of hackers using vulnerabilities or compromising third-party software.Hackers will take any chance they have to gain a foothold in the network."

Hackers may have been in Colonial's IT network for weeks or months before executing a ransomware attack.In the past, criminals have committed assault after finding their way into a software program responsible for the operating technology.In February, hackers gained access to Florida's water systems and attempted to pump "dangerous" quantities of chemicals.The worker saw it happen on his screen and stopped the attack on its tracks.Likewise, in the winter of 2015-2016, hackers in Ukraine were able to flick digital switches in power plants, affecting hundreds of thousands of people.


How can this be stopped?

The easiest way to protect operational technologies is to make them offline without being connected to the Internet at all.But this will be harder for businesses as they rely more and more on connected devices to improve efficiency.Traditionally, organizations have been doing what's known as 'air gapping,'" says cybersecurity expert Kevin Beaumon.They will ensure that critical systems run on separate networks, not tied to outward-facing IT.However, the now-changing nature of the world means things that are increasingly connected to dependence.


Who is a hacker?

The FBI confirmed that DarkSide, a relatively new ransomware gang. But the abundance, which is thought to be based in Russia, is responsible.It is unusual for criminal groups to attack. But experts such as Andy Norton of cyber defender Armis say that is a growing concern.What we're seeing right now is that the ransomware gang is in full swing," he said.In the event that there is a major public service on line, it is more likely that they will receive the ransom.Interestingly, the group posted an apology for the hack on the darknet website.

Although it does not directly refer to Colonial, it does refer to "Today's News" saying: "Our goal is to generate income and not create problems for society.From today onwards, we will be introducing to moderating and moderating each company that our partners want to encrypt in order to avoid future social impact.Like all ransomware groups, DarkSide has an affiliate program that allows "partners" to use malware in targeted attacks in exchange for a percentage of the ransom profit. DarkSide previously said it would begin donating the extort money to charities.


How can critical services be prevented?

Experts have long been concerned that critical national infrastructure has been hacked.Last month, the Ransomware Task Force's worldwide group of experts called it "National security risk"The group said the government needed to take urgent action to prevent the payment of the secret ransom.
Find all posts by this user
Quote this message in a reply
Post Reply 

XEM NHIỀU

[-]


Forum Jump:


User(s) browsing this thread: 1 Guest(s)

Contact Us   TRANG RAO VẶT | DIỄN ĐÀN DU LỊCH | DIỄN ĐÀN SEO   Return to Top   Return to Content   Lite (Archive) Mode   RSS Syndication