Homepage / Technology / Hackers are targeting nuclear facilities, Homeland Security and FBI say
Casino Güncel Giriş ile deneme bonusu veren siteleri keşfedin Kaydolun ve büyük kazançlar elde etmeye başlayın! CTS FOS-3126-PLUS-2A 24 Port Gigabit Managed Access Switch Simet Bilişim Teknolojileri A Ş. $300 Fund On the internet | Immediate On the internet Acceptance | No Credit assessment #4. Personal loans: Best Personal loans Having Poor credit Predicated on Rates Bryant Automobiles To become listed on Forces That have W-K Chevrolet Buick GMC Australia’s Online Online casino: Q7 Gambling Enterprise Just how CAIVRS Declaration Can possibly prevent You from Taking That loan “zagraj W Nowoczesnym Kasynie Onlin Manisa Gazeteciler Cemiyetinden Milletvekillerine çağrı Just how Taxation Bundle Change Inspired Domestic Collateral Financing and HELOCs to own 2018 and you can Beyond What can I take advantage of good 3000 lbs financing getting? One begs the question: is leveraged financing value including to your funding means? Exactly what do the changes Indicate having Federal Education loan Consumers? Pinup-az Online Casino Pin U Jakarta Smile: Klinik Dan Dokter Gigi Family Dental Care Pin Up Yukle Azerbaycan Android ötrü Pinup Apk Yükləyin 2023 School Of Marine Education They often in addition to use up all your adequate credit rating and you can date with the job to generally meet antique financing criteria Are you currently a seasoned Seeking Farming? USDA Can help Up until the drama, he told me, he failed to invest a penny, and you may a frequent underwriter approved ten money Branch is just one of the finest pay day loan apps such as for example Dave available for sale now 8 Software Such as for example Dave to have Quick Cash advances Benefits and drawbacks of a good 401(k) Mortgage Türkiye ve Avrupanın Online Casinosu Giriş Yap In which Do i need to See A reliable Credit card debt relief Company? 4 Reasons why you should Play with an unsecured loan to settle Credit card Personal debt How do you create a narrative article? Lisanslı kumar makineler para için: temel arama parametreleri Are you presently using your offset membership smartly? Just how much Should you Lay out to your a good $20,100 Vehicle? two hundred Buck Financing: How to get Immediate Put Exact same Date? Contrary Mortgage against. House Security Mortgage against. HELOC: That is Greatest? Expected in order to co-sign? What to know prior to co-finalizing a mortgage or financing Best Loans to have Funding a keen Camper Get Verde Casino Értékelés, Ingyen Pörgetés, Kaszinó Bónusz, Legjobb On The Internet Kaszin официального Сайт Онлайн Казин And also as in the list above, the 7a are a highly versatile sorts of financing 2 the fresh new individual-title profit supported by leases hit the market House of Jack Gambling Establishment Review Today the web based retail icon became mixed up in scholar loan sector by itself because of a collaboration that have Wells Fargo What is the Certificate From Qualifications (COE)? YourPayday is another among the many best choice to CashNetUSA to get a hold of online payday loans Searching Student education loans Remark: What you need to Understand What are the results Once you Imagine a loan? Washington FHA Lenders Washington FHA Loan Recommendations 2022 You should make sure When deciding on web site to have an online payday loan Betebet Giriş Adresi 846betebet com Casino X Официальный Сайт Играть В Казино середине Онлайн House of Jack Gambling Establishment Review ASUS Dual GeForce RTX 4070 OC 12GB GDDR6X 192 Bit Beyaz DLSS 3 Ekran Kartı Black Myth: Wukong Hediyeli Казино 1xbet Играть Онлайн бесплатно%2C Официальный Сайт%2C Скачать Клиен Efes Bet Casino: Kazanmanın Garantisiyle Eğlencenin Adresi Efescasino Güncel Giriş Sitesi Türkiye’nin En Büyük Yazlık Konut Üreticisi новые Бонусы В Онлайн-казино За Июнь 2024 Лучшие Предложения ддя Игр Pin Up 306 On Line Casino Başlanğıc Qeydiyyat, Bonuslar, Yukl เข้าร่วมทดลองเล่นสล็อตในเว็บตรงของเราและรับประสบการณ์ที่สนุกที่สุ 2024-ci Ilin Daha əla Qumar Saytları ️ Azərbaycanın Top Onlayn Qumar Veb-saytları Slottica online casino oyunları Игровые слоты в 7к: окунитесь в мир азартных развлечений Kim Гјretiyor oyun makineler: zamanla test edilmiЕџ Гјreticiler yazД±lД±m Kim Гјretiyor oyun makineler: zamanla test edilmiЕџ Гјreticiler yazД±lД±m The dashboard Diet Plan: A Comprehensive Overview How to Examine for Diabetes at Home Just How to Provide Pet Cats Pills: Easy Tips as well as Techniques Essay Writing Tips – How to Write Personal Essays How to Play Free Golf Solitaire Online How to Find the Best Mobile Casinos to Play Mobile Casino Slots Online Gambling Establishments that Approve Mastercard: A Comprehensive Overview Free Slot: A Guide to Playing and Winning Online Online Gambling Enterprise Real Money No Down Payment: A Total Guide The Enjoyment of Online Port Gamings Dealing With Varicose Veins: Efficient Strategies for Relief and also Prevention Comprehending Phase 2 High Blood Pressure: Reasons, Signs, and also Treatment Affordable Essay Writing Service Bitcoin Gambling Enterprises: The Future of Online Gambling Instant Play Online Gambling Enterprise: All You Required to Know Online Slots Real Cash No Down Payment: An Overview to Free Rotates and Perk Uses Neteller Gambling Enterprises: A Comprehensive Guide to Safe and Secure Online Betting Online Online Casinos that Approve Neteller Online Casino Real Cash No Deposit: Play and Win Without Threat Blackjack Gamings for Fun: A Comprehensive Guide Online Gambling Establishments That Approve PayPal: A Full Overview Free Online Casino Games The Safest Online Gambling Sites Sugar Pills: What Are They as well as What Are They Made use of For? Why Are My Veins So Blue? Custom Term Papers – A Great Resource For Pupils Free Online Casino Slots A Review Play Free Blackjack Gamings Online: A Comprehensive Guide The Surge of Bitcoin Online Casinos: A Comprehensive Overview Leading Gambling Enterprises that Accept Mastercard: A Comprehensive Overview Top MasterCard Online Gambling Establishments: A Comprehensive Guide Just how to Detoxification Your Underarms: A Comprehensive Guide Discover the Enjoyment of Free Online Casino Site Games Leading Ports: A Comprehensive Guide to the very best Port Gamings What to Know When Playing a Slot Machine Online The Very Best Online Lending Application in Nigeria Free Online Port Games: A Comprehensive Guide

Technology

Hackers are targeting nuclear facilities, Homeland Security and FBI say

Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing plants in the United States and other countries.

Among the companies targeted was the Wolf Creek Nuclear Operating Corporation, which runs a nuclear power plant near Burlington, Kan., according to security consultants and an urgent joint report issued by the Department of Homeland Security and the Federal Bureau of Investigation last week.

The joint report was obtained by The New York Times and confirmed by security specialists who have been responding to the attacks. It carried an urgent amber warning, the second-highest rating for the sensitivity of the threat.

The report did not indicate whether the cyberattacks were an attempt at espionage — such as stealing industrial secrets — or part of a plan to cause destruction. There is no indication that hackers were able to jump from their victims’ computers into the control systems of the facilities, nor is it clear how many facilities were breached.

Wolf Creek officials said that while they could not comment on cyberattacks or security issues, no “operations systems” had been affected and that their corporate network and the internet were separate from the network that runs the plant.

In a joint statement with the F.B.I., a spokesman for the Department of Homeland Security said, “There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks.”

The hackers appeared determined to map out computer networks for future attacks, the report concluded. But investigators have not been able to analyze the malicious “payload” of the hackers’ code, which would offer more detail into what they were after.

John Keeley, a spokesman for the Nuclear Energy Institute, which works with all 99 electric utilities that operate nuclear plants in the United States, said nuclear facilities are required to report cyberattacks that relate to their “safety, security and operations.” None have reported that the security of their operations was affected by the latest attacks, Mr. Keeley said.

More from the New York Times:
Hacker who aided Russian intelligence is sentenced to 2 years
Private not state hackers likely to have targeted UK parliament: Sources
Hacks raise fear over NSA’s hold on cyberweapons

In most cases, the attacks targeted people — industrial control engineers who have direct access to systems that, if damaged, could lead to an explosion, fire or a spill of dangerous material, according to two people familiar with the attacks who could not be named because of confidentiality agreements.

The origins of the hackers are not known. But the report indicated that an “advanced persistent threat” actor was responsible, which is the language security specialists often use to describe hackers backed by governments.

The two people familiar with the investigation say that, while it is still in its early stages, the hackers’ techniques mimicked those of the organization known to cybersecurity specialists as “Energetic Bear,” the Russian hacking group that researchers have tied to attacks on the energy sector since at least 2012.

Hackers wrote highly targeted email messages containing fake résumés for control engineering jobs and sent them to the senior industrial control engineers who maintain broad access to critical industrial control systems, the government report said.

The fake résumés were Microsoft Word documents that were laced with malicious code. Once the recipients clicked on those documents, attackers could steal their credentials and proceed to other machines on a network.

In some cases, the hackers also compromised legitimate websites that they knew their victims frequented — something security specialists call a watering hole attack. And in others, they deployed what are known as man-in-the-middle attacks in which they redirected their victims’ internet traffic through their own machines.

Energy, nuclear and critical manufacturing organizations have frequently been targets for sophisticated cyberattacks. The Department of Homeland Security has called cyberattacks on critical infrastructure “one of the most serious national security challenges we must confront.”

On May 11, during the attacks, President Trump signed an executive order to strengthen the cybersecurity defenses of federal networks and critical infrastructure. The order required government agencies to work with public companies to mitigate risks and help defend critical infrastructure organizations “at greatest risk of attacks that could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.”

The order specifically addressed the threats from “electricity disruptions and prolonged power outages resulting from cybersecurity incidents.”

Jon Wellinghoff, the former chairman of the Federal Energy Regulatory Commission, said in an interview last week that while the security of United States’ critical infrastructure systems had improved in recent years, they were still vulnerable to advanced hacking attacks, particularly those that use tools stolen from the National Security Agency.

“We never anticipated that our critical infrastructure control systems would be facing advanced levels of malware,” Mr. Wellinghoff said.

In 2008, an attack called Stuxnet that was designed by the United States and Israel to hit Iran’s main nuclear enrichment facility, demonstrated how computer attacks could disrupt and destroy physical infrastructure.

The government hackers infiltrated the systems that controlled Iran’s nuclear centrifuges and spun them wildly out of control, or stopped them from spinning entirely, destroying a fifth of Iran’s centrifuges.

In retrospect, Mr. Wellinghoff said that attack should have foreshadowed the threats the United States would face on its own infrastructure.

Critical infrastructure is increasingly controlled by Scada, or supervisory control and data acquisition systems. They are used by manufacturers, nuclear plant operators and pipeline operators to monitor variables like pressure and flow rates through pipelines. The software also allows operators to monitor and diagnose unexpected problems.

But like any software, Scada systems are susceptible to hacking and computer viruses. And for years, security specialists have warned that hackers could use remote access to these systems to cause physical destruction.

Source: Tech CNBC
Hackers are targeting nuclear facilities, Homeland Security and FBI say

Comments are closed.