Over the last four years, foreign hackers have stolen source code and blueprints to the oil and water pipelines and power grid of the United States and have infiltrated the Department of Energy’s networks 150 times.
So what’s stopping them from shutting us down?
The phrase “cyber-Pearl Harbor” first appeared in the 1990s. For the last 20 years, policy makers have predicted catastrophic situations in which hackers blow up oil pipelines, contaminate the water supply, open the nation’s floodgates and send airplanes on collision courses by hacking air traffic control systems.
“They could, for example, derail passenger trains or, even more dangerous, derail trains loaded with lethal chemicals,” former Defense Secretary Leon E. Panetta warned in 2012. “They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country.”
It is getting harder to write off such predictions as fearmongering. The number of attacks against industrial control systems more than doubled to 675,186 in January 2014 from 163,228 in January 2013, according to Dell Security — most of those in the United States, Britain and Finland.
And in many cases, outages at airports and financial exchanges — like a computer outage that took down computers at airports across the country late Wednesday, including Kennedy International Airport in New York and Logan Airport in Boston — are never tied to hacks.
But it’s clear hackers are trying.
The Department of Homeland Security last year announced that it was investigating an attack against 1,000 energy companies across Europe and North America. In 2012, 23 gas pipeline companies were hacked by online spies, according to a Homeland Security report. Private investigators later linked the attack to China.
Last year, in a disclosure overshadowed by the news of the attack on Sony, a German federal agency said that in an attack at an unnamed steel mill, hackers had managed to jump from the company’s corporate network to its production systems, causing significant damage to a blast furnace.
And in an extensive attack at Telvent, an information technology and industrial automation company now owned by Schneider Electric, Chinese hackers made off with its product source code and blueprints to facilities operated by its customers, which include 60 percent of the pipeline operators in North America.
For now, dire predictions of destructive online attacks on American targets ignore the fact that the actors with the ability to cause the gravest harm to America’s critical infrastructure — China and Russia and allies like Israel and Britain — are sufficiently deterred from doing so by fear of retaliation or because of longstanding trade and diplomatic relationships. And attacks by those aggressively trying to get such a capability — Iran, North Korea and Islamic militant groups — are still several years off.
Read more: Online Attacks on Infrastructure Are Increasing at a Worrying Pace
The Latest on: Online Attacks on Infrastructure
via Google News
The Latest on: Online Attacks on Infrastructure
- SEPA ‘will not engage with criminals’ as it continues to deal with cyber attackon January 22, 2021 at 6:10 am
Some of the information stolen in the attack has been published online but police are warning against searching for it ...
- Threat Actors Can Exploit Windows RDP Servers to Amplify DDoS Attackson January 22, 2021 at 4:45 am
Netscout researchers identify more than 14,000 existing servers that can be abused by ‘the general attack population’ to flood organizations’ networks with traffic.
- Federal cyber agency announces new campaign to fight ransomware attackson January 21, 2021 at 9:39 am
The Cybersecurity and Infrastructure Security Agency (CISA) on Thursday rolled out a new public awareness campaign to push back against the plague of ransomware cyberattacks that have increasingly ...
- Microsoft: This is how the sneaky SolarWinds hackers hid their onward attacks for so longon January 20, 2021 at 11:00 pm
The SolarWinds hackers put in "painstaking planning" to avoid being detected on the networks of hand-picked targets.
- Hackers smash into Beximco Group’s IT infrastructureon January 20, 2021 at 1:34 pm
Hackers smash into Beximco Group’s IT infrastructure. ALTDOS operates primarily in the ASEAN region and has been involved in cyber ...
- CISA details attacks on cloud serviceson January 20, 2021 at 12:50 pm
The Cybersecurity and Infrastructure Security Agency warned of attacks that leverage phishing and email forwarding vulnerabilities as well as one that bypassed multifactor authentication.
- Magecart attacks in 2021: Cat-and-mouse game continues between cybercrooks, researchers, law enforcementon January 20, 2021 at 7:57 am
RiskIQ research published last week revealed that Magecart groups, which plant JavaScript skimmers on website checkout pages to hoover up payment form data, were hiding thousands of malicious domains ...
- How the Heightened Domestic Extremist Threat Could Materialize in Attackson January 19, 2021 at 12:49 pm
In a sea of bellicose online threats, the challenge is finding those that may be put into action within the aspirational, knowing that post-inauguration domestic threats could follow some patterns.
- Parler Is Back Online—Reportedly with Support of Russianson January 19, 2021 at 4:34 am
Parler, the social network popular with Donald Trump supporters, has partially returned online. The Guardian is reporting that its return to the Internet came with the support of a Russian-owned ...
- Parler is back online with help from Russian security firmon January 19, 2021 at 3:36 am
Parler, a social media website and app popular with the American far-right, partially returned online on Sunday – with the help of a Russian-owned technology company.
via Bing News