![]() Indeed, history, shows that in a way, this goes back to times long before the advent of modern digital computers. These attacks collectively remind us of the risks faced by various types of critical infrastructure. Stuxnet is today known as the first discovered malware targeting industrial systems and the malware behind the first cyberattack on modern-day critical infrastructure. And yet, none marked the first time that a piece of malware has been used in an attack on critical infrastructure.īack in June 2010, Iran’s nuclear fuel enrichment facility in Natanz was hit by Stuxnet, sophisticated malware that destroyed numerous centrifuges, slashing Iran’s capacity to produce enriched uranium as a result. The incidents were a rude awakening for anyone who thought these kinds of events were science fiction. Industroyer2, uncovered during a response effort involving ESET and CERT-UA, is a new variant of sophisticated malware called Industroyer that turned the lights off in parts of Kyiv in December 2016.Īdditionally, in December 2015, BlackEnergy operators interrupted power supplies for hundreds of thousands of people in Ukraine’s Ivano-Frankivsk region for several hours after sabotaging the systems of several electricity distribution companies. ![]() Just days ago, Ukraine’s power grid came under attack as Sandworm attempted to deploy a piece of malware called Industroyer2 against the operations of an energy supplier in the country. Lessons from history and recent attacks on critical infrastructure throw into sharp relief the need to better safeguard our essential systems and services ![]()
0 Comments
Leave a Reply. |