FacebookInstagramTwitterContact

 

Joint Operation           >>           Fuel Stations Temporary Closure           >>           Pitcher Plant Conservation           >>           MoU Signing Ceremony           >>           SEAMEO Centres Policy Research Network Summit Closing Ceremony           >>           Sainsbury's Says Almost Everyone Now Shops In Store           >>           Hersh Goldberg-Polin: Gaza Hostage's Parents Urge Him To 'Stay Strong' After New Video           >>           UNISSA Sinaut Campus Hari Raya Celebration           >>           Europe At Risk Of Dying Faces Big Decisions – Macron           >>           Harvey Weinstein's 2020 Rape Conviction Overturned In New York           >>          

 

SHARE THIS ARTICLE




REACH US


GENERAL INQUIRY

[email protected]

 

ADVERTISING

[email protected]

 

PRESS RELEASE

[email protected]

 

HOTLINE

+673 222-0178 [Office Hour]

+673 223-6740 [Fax]

 



Upcoming Events





Prayer Times


The prayer times for Brunei-Muara and Temburong districts. For Tutong add 1 minute and for Belait add 3 minutes.


Imsak

: 05:01 AM

Subuh

: 05:11 AM

Syuruk

: 06:29 AM

Doha

: 06:51 AM

Zohor

: 12:32 PM

Asar

: 03:44 PM

Maghrib

: 06:32 PM

Isyak

: 07:42 PM

 



The Business Directory


 

 



Security & Privacy


  Home > Security & Privacy


Hackers shut down plant by targeting its safety system


PA Archive/PA Images

 


 December 18th, 2017  |  15:54 PM  |   2422 views

WORLD

 

Hackers have already attacked critical infrastructure, but now they're launching campaigns that could have dire consequences. FireEye reported that a plant of an unmentioned nature and location (other firms believe it's in the Middle East) was forced to shut down after a hack targeted its industrial safety system -- it's the first known instance of a breach like this taking place. While the digital assault was clearly serious in and of itself, there are hints that it could have been much worse.

 

The malware, nicknamed Triton, hijacked a workstation using Schneider Electric's Triconex safety technology (typically used in power plants). The culprits hoped to modify controllers that could pinpoint safety problems, but some of those controllers entered a failsafe state in response and shut down the plant, leading operators to conduct the investigation that caught the hostile code. Triton was otherwise fairly sophisticated. It would try to recover failed controllers to avoid raising alerts, and would even overwrite its own programs with junk data if it couldn't salvage a controller inside of a given time window.

 

The hack wasn't made possible by a flaw in Triconex itself, FireEye noted. Instead, it appeared to be an "isolated incident."

 

While it's not certain who's responsible, FireEye said the hack was "consistent" with a "nation state" readying an attack. And that's concerning, especially if the perpetrators learn from their mistakes. While shutting down a power plant would be bad enough, it'd be worse if the malware could fool a safety system into allowing attacks that would damage the facility and lead to a long-term shutdown or an environmental disaster. In short, companies and governments alike may have no choice but to prioritize defending critical infrastructure if they want to avoid crippling attacks.

 


 

Source:
courtesy of ENGADGET

by Jon Fingas

 

If you have any stories or news that you would like to share with the global online community, please feel free to share it with us by contacting us directly at [email protected]

 

Related News


Lahad Datu Murder: Remand Of 13 Students Extende

 2024-03-30 07:57:54

Searing Heat Shuts Schools For 33 Million Children

 2024-04-26 01:35:07

Sainsbury's Says Almost Everyone Now Shops In Store

 2024-04-26 02:05:05