Ban quản trị chúng tôi sẽ tiến hành rà soát Spamer và các bài viết không đúng Box sẽ bị xóa sạch, Các spamer cố tình sẽ bị Block IP vĩnh viễn . Xin cảm ơn bạn đã đọc
How do cyber attackers close oil pipelines?
|
05-11-2021, 01:40 PM
Post: #1
|
|||
|
|||
How do cyber attackers close oil pipelines?
![]() Researchers at the largest fuel pipeline in the United States are working to recover from a deadly cyber attack that cut the oil flow.The hacking of the colonial pipeline was seen as one of the most significant attacks on national infrastructure in history. Oil pipelines are nearly half of the east coast, and pump prices are expected to rise if the power goes out for a long time. How was the pipeline hacked? For many, the picture of the เกม slotxo oil industry is one of the greasy black pump tubes and liquids.In fact, the modern colonial pipeline operation type is very digital.Pressure sensors, thermostats, valves and pumps are used to monitor and control the flow of diesel, gasoline and jet fuel over hundreds of miles of pipelines.The colony also had robots A high-tech "smart pig" (pipe inspection gauge) running through the pipe to detect anomalies.All of these operational technologies are connected to a central system.And as cyber experts like CheckPoint's Jon Niccolls explain where connections are vulnerable to cyberattacks:All the equipment used in modern pipelines are controlled by computers instead of people," he said.If they are connected to an organization's internal network and are under attacked by cyber attacks, the pipeline is vulnerable to malicious attacks. How did hackers enter? Experts say direct attacks against operational technologies are rare because these systems tend to be better protected.Therefore, it is more likely that hackers gain access to Colonial's computer systems through the administration of the business. Some of the biggest attacks we've seen all started with email," Mr Niccolls said. Employees may be tricked into downloading certain malware, etc.We've also seen recent examples of hackers using vulnerabilities or compromising third-party software.Hackers will take any chance they have to gain a foothold in the network." Hackers may have been in Colonial's IT network for weeks or months before executing a ransomware attack.In the past, criminals have committed assault after finding their way into a software program responsible for the operating technology.In February, hackers gained access to Florida's water systems and attempted to pump "dangerous" quantities of chemicals.The worker saw it happen on his screen and stopped the attack on its tracks.Likewise, in the winter of 2015-2016, hackers in Ukraine were able to flick digital switches in power plants, affecting hundreds of thousands of people. How can this be stopped? The easiest way to protect operational technologies is to make them offline without being connected to the Internet at all.But this will be harder for businesses as they rely more and more on connected devices to improve efficiency.Traditionally, organizations have been doing what's known as 'air gapping,'" says cybersecurity expert Kevin Beaumon.They will ensure that critical systems run on separate networks, not tied to outward-facing IT.However, the now-changing nature of the world means things that are increasingly connected to dependence. Who is a hacker? The FBI confirmed that DarkSide, a relatively new ransomware gang. But the abundance, which is thought to be based in Russia, is responsible.It is unusual for criminal groups to attack. But experts such as Andy Norton of cyber defender Armis say that is a growing concern.What we're seeing right now is that the ransomware gang is in full swing," he said.In the event that there is a major public service on line, it is more likely that they will receive the ransom.Interestingly, the group posted an apology for the hack on the darknet website. Although it does not directly refer to Colonial, it does refer to "Today's News" saying: "Our goal is to generate income and not create problems for society.From today onwards, we will be introducing to moderating and moderating each company that our partners want to encrypt in order to avoid future social impact.Like all ransomware groups, DarkSide has an affiliate program that allows "partners" to use malware in targeted attacks in exchange for a percentage of the ransom profit. DarkSide previously said it would begin donating the extort money to charities. How can critical services be prevented? Experts have long been concerned that critical national infrastructure has been hacked.Last month, the Ransomware Task Force's worldwide group of experts called it "National security risk"The group said the government needed to take urgent action to prevent the payment of the secret ransom. |
|||
« Next Oldest | Next Newest »
|
XEM NHIỀU
![]() |
User(s) browsing this thread: 1 Guest(s)
Powered By MyBB, © 2002-2025 MyBB Group.
Theme created by TCTshop Designs, © 2009-2011.
Theme created by TCTshop Designs, © 2009-2011.
![]() TRANG RAO VẶT | DIỄN ĐÀN DU LỊCH | DIỄN ĐÀN SEO |