Article 4ZMR4 A US gas pipeline operator was infected by malware—your questions answered

A US gas pipeline operator was infected by malware—your questions answered

by
Dan Goodin
from Ars Technica - All content on (#4ZMR4)
gas-compressor-station-800x534.jpg

Enlarge

Tuesday's news that a ransomware infection shut down a US pipeline operator for two days has generated no shortage of questions, not to mention a near-endless stream of tweets.

Some observers and arm-chair incident responders consider the event to be extremely serious. That's because the debilitating malware spread from the unnamed company's IT network-where email, accounting, and other business is conducted-to the company's operational technology, or OT, network, which automatically monitors and controls critical operations carried out by physical equipment that can create catastrophic accidents when things go wrong.

Others said the reaction to the incident was overblown. They noted that, per the advisory issued on Tuesday, the threat actor never obtained the ability to control or manipulate operations, that the plant never lost control of its operations, and that facility engineers deliberately shut down operations in a controlled manner. This latter group also cited evidence that the infection of the plant's industrial control systems, or ICS, network appeared to be unintentional on the part of the attackers.

Read 30 remaining paragraphs | Comments

index?i=HMk1rAE9v18:l6mBp7x2NVw:V_sGLiPB index?i=HMk1rAE9v18:l6mBp7x2NVw:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments