Homepage / Technology / Hackers are targeting nuclear facilities, Homeland Security and FBI say
Menyelami Dunia Slot Thailand: Keseruan dan Peluang Kemenangan Besar Menyelami Dunia Slot Thailand: Pengalaman Bermain yang Tak Terlupakan Play 22,546+ Casino Slot Demo Games Водка БЕТ Казино официальный сайт и зеркало Vodka Casino Find your perfect match with quick hookup near me Top 7 Best Lesbian Cougar Internet Dating Sites in 2022 ◉ Sugar Daddy Ireland: Seeking Sugar in IE | SugarDaddySeek Online Kasino & Sportovní Sázení Oficiální Web Melbet Bonusları: Türk Oyuncular İçin En İyileri Roulette In Italiano Situs Slot Judi Bola Casino Online PutriJP Bagaimana Cara Memainkan Slot? 9 Kiat Terbaik Provider Permainan Kasino & Slot Online Terbaik Pragmatic Play Pragmatic Play Slot Mainkan Demo Gratis best name for boy 4718 best name for boy 2378 Purchase Lyrica Online Safely and Discreetly Top Online Casinos that Approve Neteller Deposits Online Gambling Establishments Accepting Mastercard: A Comprehensive Guide Finest Mobile Online Casino Site: The Ultimate Overview Live Casino Site Online: The Ultimate Overview The Power of Psychic Analyses Bier Haus Fruit Machine Online Free: A Fun and Thrilling Experience Why Do Blood Vessels Look Blue? What is Mometasone Furoate Cream Made Use Of For? Open the Keys of Numerology with a Free Numerology Calculator The Ultimate Overview to Online Tarot Card Readings Numerology Calculator: Opening the Mysteries of Figures Opening the Keys of Online Free Tarot Analysis Online Online Casinos with Neteller: A Convenient and Secure Settlement Option Online Gambling Enterprises That Accept Bitcoin: A Comprehensive Overview A Guide to Finding Online Casino Bonus Money Opening the Mysteries of Psychic Card Analysis GIS Support Top-3 kasyna online na prawdziwe pieniądze w Polsce 7slots ile En Ýyi Slot Eðlenceleri ve Ödüller Resting around: From Chaucer to Castro | Life and magnificence | Intercourse Story: The Mom Giving Nudes From a cafe or restaurant Restroom Reasons Behind the Increase in Sex Shops Официальный сайт букмекерской конторы 1Вин 1win Team Россия Результаты, расписание матчей календарь игр Dota 2 The International 2024 Киберспорт Чемпионат Christchurch Casino facing money-laundering allegations Otago Daily Times Online News Best NZ Online Casinos 2024 Top Real Money Online Casinos Los mejores casinos online en Argentina 2024 mostbet Verimli Açýlýþ Hediyesi! mostbet En Büyük Fýrsatlar Sizinle! Get started now and revel in the many benefits of adult hookup dating TITRE II : JEUX D’ARGENT ET DE HASARD, CASINOS Articles L320-1 à L324-16 TITRE II : JEUX D’ARGENT ET DE HASARD, CASINOS Articles L320-1 à L324-16 Азино777 на деньги ️ Играть в игровые автоматы казино онлайн Mostbet-az90 Qazanmaq Kazinoda və onlayn mərclərdə Azərbaycan Online Dating Is Damaged. Can The Metaverse Fix-it? Enjoy the many benefits of on line dating with your rich people dating website Jogo do aviãozinho: o que são as apostas de cassino e como PL aprovado pode legalizar prática? what to anticipate from an asian chatroom Online Turnkey Casino and Gambling Software Platform CasinoEngine What makes a gay daddy chat room unique? Get ready to chat and flirt with sexy singles Аудиокниги на английском языке топ лучшей литературы по теме Читайте и слушайте онлайн на MyBook Как делать ставки на сайте российского букмекера 888 ru: инструкция Get ready for exciting and fun local hookup chats Benefits of joining a couples seeking third person dating site Start your search now and meet your perfect match for nearby hook ups What makes interracial dating in buffalo unique? La Females Dating: Call Cute Ladies Trouble-Free Get prepared the ultimate asian hookup experience things to look for in a gay sugar daddy website 10 Most Readily Useful More Mature Females Hookup Sites – Victoria Milan Video pornografi anak: ‘Orang tua korban’ ikut menyaksikan, kata polisi BBC News Indonesia Video pornografi anak: ‘Orang tua korban’ ikut menyaksikan, kata polisi BBC News Indonesia Video pornografi anak: ‘Orang tua korban’ ikut menyaksikan, kata polisi BBC News Indonesia Video pornografi anak: ‘Orang tua korban’ ikut menyaksikan, kata polisi BBC News Indonesia 1xSlots Partners: здесь твой трафик будет дожат Обзор ПП от прямого рекламодателя онлайн-казино 1xSlots Winning Tips for Live Roulette at 1xSlots PinayVlog com Best Pinay Porn Site and Hot Pinay Sex Scandal PinayVlog com Best Pinay Porn Site and Hot Pinay Sex Scandal PinayVlog com Best Pinay Porn Site and Hot Pinay Sex Scandal Nasıl kumarhane başari bet casino çevrimiçi seç müşteriler2024’te Get started now – find the perfect hook up site for couples PinayVlog com Best Pinay Porn Site and Hot Pinay Sex Scandal PinayVlog com Best Pinay Porn Site and Hot Pinay Sex Scandal Ways to get Laid in Abu Dhabi – where you should get and Date women Зеркало Casino — Доступные фриспины, игровые слоты джекпот Đại lý mua bán thẻ cào Gate: Thẻ Game Online, Thẻ Mobile, Thẻ Gate Coin Price Forecast How Accurate Are Their Predictions? Most readily useful spots in order to satisfy Girls In Santiago de Compostela & Dating Guide – WorldDatingGuides Exploring the Globe of Online Psychic Reading Opening the Mysteries: Virtual Tarot Card Analysis The Mystical Globe of Tarot Cards Unlocking the Mysteries: Free Tarot Card Analysis Online Accurate Numerology Calculator: Unlock the Tricks of Your Life Path Opening the Mysteries: Free Online Psychic Reading Free Tarot Card Reading Online Accurate Lotus: Every Little Thing You Required to Know Unlock the Secrets of Your Future with Free Tarot Card Card Analysis Online Numerology Graph Calculator: A Comprehensive Guide Opening the Mysteries of Free Tarot Card Card Readings Numerologist Calculator: Unveiling the Tricks of Numerology Free Tarot Card Card Analysis Online – Unlocking the Mysteries of the Future Tarot Readings Online: Every Little Thing You Required to Know The Art of Card Reading: Lectura de Cartas The Ultimate Overview to Tarot Card Online Analysis

Technology

Hackers are targeting nuclear facilities, Homeland Security and FBI say

Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing plants in the United States and other countries.

Among the companies targeted was the Wolf Creek Nuclear Operating Corporation, which runs a nuclear power plant near Burlington, Kan., according to security consultants and an urgent joint report issued by the Department of Homeland Security and the Federal Bureau of Investigation last week.

The joint report was obtained by The New York Times and confirmed by security specialists who have been responding to the attacks. It carried an urgent amber warning, the second-highest rating for the sensitivity of the threat.

The report did not indicate whether the cyberattacks were an attempt at espionage — such as stealing industrial secrets — or part of a plan to cause destruction. There is no indication that hackers were able to jump from their victims’ computers into the control systems of the facilities, nor is it clear how many facilities were breached.

Wolf Creek officials said that while they could not comment on cyberattacks or security issues, no “operations systems” had been affected and that their corporate network and the internet were separate from the network that runs the plant.

In a joint statement with the F.B.I., a spokesman for the Department of Homeland Security said, “There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks.”

The hackers appeared determined to map out computer networks for future attacks, the report concluded. But investigators have not been able to analyze the malicious “payload” of the hackers’ code, which would offer more detail into what they were after.

John Keeley, a spokesman for the Nuclear Energy Institute, which works with all 99 electric utilities that operate nuclear plants in the United States, said nuclear facilities are required to report cyberattacks that relate to their “safety, security and operations.” None have reported that the security of their operations was affected by the latest attacks, Mr. Keeley said.

More from the New York Times:
Hacker who aided Russian intelligence is sentenced to 2 years
Private not state hackers likely to have targeted UK parliament: Sources
Hacks raise fear over NSA’s hold on cyberweapons

In most cases, the attacks targeted people — industrial control engineers who have direct access to systems that, if damaged, could lead to an explosion, fire or a spill of dangerous material, according to two people familiar with the attacks who could not be named because of confidentiality agreements.

The origins of the hackers are not known. But the report indicated that an “advanced persistent threat” actor was responsible, which is the language security specialists often use to describe hackers backed by governments.

The two people familiar with the investigation say that, while it is still in its early stages, the hackers’ techniques mimicked those of the organization known to cybersecurity specialists as “Energetic Bear,” the Russian hacking group that researchers have tied to attacks on the energy sector since at least 2012.

Hackers wrote highly targeted email messages containing fake résumés for control engineering jobs and sent them to the senior industrial control engineers who maintain broad access to critical industrial control systems, the government report said.

The fake résumés were Microsoft Word documents that were laced with malicious code. Once the recipients clicked on those documents, attackers could steal their credentials and proceed to other machines on a network.

In some cases, the hackers also compromised legitimate websites that they knew their victims frequented — something security specialists call a watering hole attack. And in others, they deployed what are known as man-in-the-middle attacks in which they redirected their victims’ internet traffic through their own machines.

Energy, nuclear and critical manufacturing organizations have frequently been targets for sophisticated cyberattacks. The Department of Homeland Security has called cyberattacks on critical infrastructure “one of the most serious national security challenges we must confront.”

On May 11, during the attacks, President Trump signed an executive order to strengthen the cybersecurity defenses of federal networks and critical infrastructure. The order required government agencies to work with public companies to mitigate risks and help defend critical infrastructure organizations “at greatest risk of attacks that could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.”

The order specifically addressed the threats from “electricity disruptions and prolonged power outages resulting from cybersecurity incidents.”

Jon Wellinghoff, the former chairman of the Federal Energy Regulatory Commission, said in an interview last week that while the security of United States’ critical infrastructure systems had improved in recent years, they were still vulnerable to advanced hacking attacks, particularly those that use tools stolen from the National Security Agency.

“We never anticipated that our critical infrastructure control systems would be facing advanced levels of malware,” Mr. Wellinghoff said.

In 2008, an attack called Stuxnet that was designed by the United States and Israel to hit Iran’s main nuclear enrichment facility, demonstrated how computer attacks could disrupt and destroy physical infrastructure.

The government hackers infiltrated the systems that controlled Iran’s nuclear centrifuges and spun them wildly out of control, or stopped them from spinning entirely, destroying a fifth of Iran’s centrifuges.

In retrospect, Mr. Wellinghoff said that attack should have foreshadowed the threats the United States would face on its own infrastructure.

Critical infrastructure is increasingly controlled by Scada, or supervisory control and data acquisition systems. They are used by manufacturers, nuclear plant operators and pipeline operators to monitor variables like pressure and flow rates through pipelines. The software also allows operators to monitor and diagnose unexpected problems.

But like any software, Scada systems are susceptible to hacking and computer viruses. And for years, security specialists have warned that hackers could use remote access to these systems to cause physical destruction.

Source: Tech CNBC
Hackers are targeting nuclear facilities, Homeland Security and FBI say

Comments are closed.