The destroyers of the colonial pipelines had a secret weapon: companies that promote security
Similarly, the U.S. government has developed only a limited number of measures to pressure commercial companies, including pipeline companies, to promote cyber security. Security management is divided between a bunch of characters, which disrupts the alliance. The Department of Homeland Security conducts “unsafe inspections” on essential items, including pipelines.
It also highlighted the Colonial Pipeline in late 2013 as part of an investigation into the potential for terrorist attacks. The bomb was considered strong, meaning it could recover quickly, according to a former DHS officer. The department did not respond to further inquiries.
Five years later, DHS established pipeline protection nothing identifying weaknesses in plumbing computers and advising solutions to these problems. Participation is voluntary, and a person who is well versed in the profession said it is very useful for small companies with less real estate expertise than big ones like colonists. The National Risk Management Center, which oversees the project, also tackles other thorns story as an electoral protection.
The ransom has increased since 2012, with the advent of Bitcoin made it difficult to track or restrict payments. Terrorist tactics have shifted from campaigns to select “pumping and praying” that cost hundreds of dollars each to crack down on certain businesses, corporations, and non-profit groups that demand millions of dollars.
Attacks on the electricity industry have intensified during the epidemic – not just in the US but in Canada, Latin America, and Europe. Because companies allow employees to work from home, they are making some security changes, says McLeod.
Since 2019, many terrorists have once again become embroiled in a so-called “double seizure.” Once they get into the system, they steal secrets before setting up a ransom program that stores files and keeps hospitals, universities, and cities from carrying out their day-to-day operations. If the loss of access to the computer is not enough to threaten, they threaten to reveal the secrets, often sending examples as encouragement. For example, when Washington, DC, police failed to provide the $ 4 million demand that the Babuk group demanded last month, Babuk published intelligence, the names of the suspects and their witnesses, and staff files, from hospitals to polygraph tests , for managers and job seekers.