DreamPirates DreamPirates

For many people, the image of the oil industry is one of pipes

Author : tvmillo
Publish Date : 2021-05-11 15:16:34
For many people, the image of the oil industry is one of pipes

Investigators at the largest fuel pipeline in the US are working to recover from a devastating cyber-attack that cut the flow of oil.

The hack on Colonial Pipeline is being seen as one of the most significant attacks on critical national infrastructure in history.

https://nvdoe.instructure.com/courses/3077/pages/watch-nobody-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-here-today-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-wrath-of-man-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-separation-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-mortal-kombat-2021-hd-full-movie-online-free

The pipeline transports nearly half of the east coast's fuel supplies and prices at pumps are expected to rise if the outage is long lasting.

How can a pipeline be hacked?
For many people, the image of the oil industry is one of pipes, pumps and greasy black liquid.

In truth, the type of modern operation Colonial Pipeline runs is extremely digital.

Pressure sensors, thermostats, valves and pumps are used to monitor and control the flow of diesel, petrol and jet fuel across hundreds of miles of piping.

Colonial even has a high-tech "smart pig" (pipeline inspection gauge) robot that scurries through its pipes checking for anomalies.

All this operational technology is connected to a central system.

And as cyber-experts such as Jon Niccolls, from CheckPoint, explain, where there is connectivity, there is risk of cyber-attack:

https://nvdoe.instructure.com/courses/3077/pages/watch-nobody-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-here-today-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-wrath-of-man-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-separation-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-mortal-kombat-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-in-the-earth-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-the-unholy-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-godzilla-vs-kong-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-raya-and-the-last-dragon-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-demon-slayer-mugen-train-2020-hd-full-movie-online-free

"All the devices used to run a modern pipeline are controlled by computers, rather than being controlled physically by people," he says.

"If they are connected to an organisation's internal network and it gets hit with a cyber-attack, then the pipeline itself is vulnerable to malicious attacks."

How did the hackers break in?
Direct attacks on operational technology are rare because these systems are usually better protected, experts say.

So it's more likely the hackers gained access to Colonial's computer system through the administrative side of the business.

"Some of the biggest attacks we've seen all started with an email," Mr Niccolls says.

"An employee may have been tricked into downloading some malware, for example.

"We've also seen recent examples of hackers getting in using weaknesses or compromise of a third-party software.

https://nvdoe.instructure.com/courses/3077/pages/watch-minari-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-the-courier-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-evangelion-3010-thrice-upon-a-time-2021-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-after-we-collided-2020-hd-full-movie-online-free
https://nvdoe.instructure.com/courses/3077/pages/watch-365-days-2020-hd-full-movie-online-free
https://steemkr.com/news/@jossnews/biden-denies-benefits-are-holding-back-job-seekers
https://cox.tribe.so/post/https-nvdoe-instructure-com-courses-3077-pages-watch-nobody-2021-hd-full-mo--609a99838a0bedc5f42d539c
https://www.peeranswer.com/question/609a9731cff6f70f6deb8064
https://paiza.io/projects/gf8z7x0BCvKMAK-ZVBWJIA
https://onlinegdb.com/BJgV2KfddO
https://jsfiddle.net/valvelika/6aLbrky7/
https://rentry.co/n2rf7

"Hackers will use any chance they get to gain a foothold in a network."

Hackers could potentially have been inside Colonial's IT network for weeks or even months before launching their ransomware attack.

In the past, criminals have cause mayhem after finding their way into the software programs responsible for operational technology.

In February, a hacker gained access to the water system of Florida city and tried to pump in a "dangerous" amount of a chemical.

A worker saw it happening on his screen and stopped the attack in its tracks.

Similarly, in winter 2015-16, hackers in Ukraine were able to flick digital switches in a power plant, causing cuts affecting hundreds of thousands of people.

https://www.thewyco.com/general/colonial-hack-how-did-cyber-attackers-shut-off-pipeline-11-05-2021
https://www.thewyco.com/general/investigators-at-the-largest-fuel-pipeline-in-the-us-are-working-to-recover-11-05-2021
https://www.thewyco.com/general/the-hack-on-colonial-pipeline-is-being-seen-as-one-of-the-most-significant-11-05-2021

How can this be stopped?
The simplest way to protect operational technology is to keep it offline, with no link to the internet at all.

But this is becoming harder for businesses, as they increasingly rely on connected devices to improve efficiency.

"Traditionally, organisations did something known as 'air gapping'," cyber-security expert Kevin Beaumont says.

"They would make sure that critical systems were run on separate networks not linked to outward facing IT.

"However, the nature of the changing world now means more things are reliant on connectivity."

Who are the hackers?
The FBI has confirmed DarkSide, a relatively new but prolific ransomware gang thought to be based in Russia, was responsible.

It is unusual for criminal groups to attack "critical national infrastructure" - but experts such as Andy Norton, from cyber-defender Armis, says it is a growing concern.

"What we're seeing now is the ransomware gangs are maturing," he says.

"Where there is critical public service on the line, there is more chance of them getting the ransom paid."

Interestingly, the group posted something of an apology for the hack on its darknet website.

Although not directly referencing Colonial, it referred to "today's news", saying: "Our goal is to make money and not creating problems for society.

"From today, we introduce moderation and check each company that our partners want to encrypt to avoid social consequences in the future."

Like many ransomware groups, DarkSide runs an affiliate programme allowing "partners" to use its malware to attack targets, in exchange for a percentage of the ransom profits.

DarkSide have previously said it would start donating some of the extorted money to charities.

How can critical services be protected?
Experts have long been concerned about critical national infrastructure being hacked.

Last month, the Ransomware Task Force global coalition of experts called it a "national security risk".

The group says governments need to take urgent action to prevent ransoms being paid in secret.

It also wants pressure put on countries such as Russia, Iran and North Korea, which are regularly accused of harbouring ransomware groups.

But Mr Norton says organisations need to take responsibility as well.

"It's up to organisations to implement the type of cyber-security that is appropriate and proportionate and it's recognised that there are more teeth required by regulators to enforce this," he says.



Category : world

shortening the southbound convoy transit to 11 hours. But it only runs for 22 miles. For the rest of the passage, the ships must travel single file d

shortening the southbound convoy transit to 11 hours. But it only runs for 22 miles. For the rest of the passage, the ships must travel single file d

- shortening the southbound convoy transit to 11 hours. But it only runs for 22 miles. For the rest of the passage, the ships must travel single file d


Reject Over-Qualified Job Applicant

Reject Over-Qualified Job Applicant

- This candidate rejection letter rejection or sample email template can help save you a great deal of time when sending negative responses to applicants


it serie a juven Juventus Crotone diretta e streamingdove vedere il match oggiSi gioca alle 20 45 il posticipo del lunedì di

it serie a juven Juventus Crotone diretta e streamingdove vedere il match oggiSi gioca alle 20 45 il posticipo del lunedì di

- it serie a juven Juventus Crotone diretta e streamingdove vedere il match oggiSi gioca alle 20 45 il posticipo del lunedì di


Diablo 2: Resurrecteds Changes Are To Make The Remaster Easier To Play, Not Just Easier Overall

Diablo 2: Resurrecteds Changes Are To Make The Remaster Easier To Play, Not Just Easier Overall

- "We want to remain faithful, so theres a difference between making the game easier and making the game easier to play."