Colonial Pipes Are The Most Dangerous Redeemer

[ad_1]
For many years, security companies warn of this government-backed smugglers have been able to shut down major US nuclear weapons by doing politics on cyberwar. But now cybercriminals have reverted to the chaos that military and intelligence agents have done nothing about, shutting down a pipeline that carries about half of the fuel they consume on the East Coast in the United States.
On Saturday, the Colonial Pipeline Company, which operates a pipeline that carries oil, diesel fuel, and natural gas on the 3,500-mile route from Texas to New Jersey, released words to prove reports that the repurchaser had beaten his nets. In response, the Colonelial Pipeline reportedly blocked other sections of the pipeline in an attempt to counter the threat. The incident represents one of the greatest American atrocities that has resulted from falsehoods in history. It also provides another alarming manifestation of the global plague of redemption.
“This is one of the biggest impacts on electricity in the United States that we have seen from cyberattack, a full stop,” said Rob Lee, CEO of the country’s largest security company Dragos. Aside from the economic impact on Colonial Pills or those supplied by many of its oil-powered customers, Lee points out that nearly 40% of US electricity by 2020 was produced by burning gas, more than any other source. That is to say, the threat that pipeline terrorists threaten the common power grid. “You have a real potential for affecting electric motors in a less efficient way by cutting gas. This is a big deal,” he adds. “I think Congress will have some questions. The donor received a ransom from the offenses, this was not even a government-sponsored revolt, and it affected the process as follows?”
The colonial Pipeline briefly explains to the public that it has “initiated an investigation into what is happening, what is still going on.” Reuters reports who responded to the incident from a security company FireEye supporting the company, and that investigators think that a rescue team called Darkside he can be responsible. According to reports with a public protection company at Cybereason, Darkside has sued more than 40 organizations and demanded between $ 200,000 and $ 2 million in ransom.
Colonial pipeline closure comes amid a growing epidemic of redemption: Players have hospitals for disabilities and seizures, disrupted law enforcement agencies as well threatened to release the public on police photos, and disabled urban systems in Baltimore and Atlanta.
Most of the redeemed do not announce their attack. But Lee says his company has seen a dramatic increase in rescue operations that are improving industry-leading and infrastructure-building strategies, as profit-seekers seek greater opportunities to be at risk. “The robbers are starting to think about industrialization, and in the last seven or seven months we’ve been seeing a lot,” Lee said. “I think we’ll see more.”
On the contrary, rescue workers have faced industrial hazards in recent years. Hydro Norsk, Hexion, and Momentive all met with redemption in 2019, and security investigators last year found Ekans, the the first redemptive program designed to cripple industrial processes. Although directing the gas pipeline operator has never happened: At the end of 2019, burglars planted ransom money on machines of the US pipeline company, Cybersecurity and Infource Security Agency warned in early 2020– although it was not a large size of the Colonial Pipeline.
During the initial pipeline battle, CISA warned that burglars had seized the opportunity to use the IT and technology “of the pipeline company – a computer machine that controls physical equipment.” In the case of the Colonial Pipeline, it is not clear whether the robbers connected the same differences that allow them to penetrate the pipeline or create dangerous objects. Just getting access to the internet could be a good reason for the company to shut down the operation of the pipeline as security, says Joe Slowik, a security analyst at Domaintools and former head of the Computer Security and Incident Response Team at the U.S. Department of Energy. “The user did the right thing in this regard in response to the incident,” Slowik says. “If you don’t re-evaluate the environment and make it clear how you’re working, then you have to shut it down.”
[ad_2]
Source link