Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267
0

Expert warns of rising threat of cyber attacks on physical infrastructure | #government | #hacking | #cyberattack | #hacking | #aihp



SINGAPORE – Governments and agencies must proactively upgrade and redesign the control systems that operate key infrastructure to counter the rising threat of malware designed to disrupt such systems and cause harm, said cyber-security expert Robert Lee on Tuesday (July 12).

The authorities also need to develop the capabilities to detect if incidents are indeed due to a cyber attack or other factors such as outages or maintenance issues, he added.

Mr Lee, who is chief executive and co-founder of the cyber-security firm Dragos, said Singapore’s Cyber Security Agency is doing well in proactively preparing for specific scenarios by ensuring relevant parties are aware of their roles and responsibilities in the event of an attack, instead of merely reacting to attacks.

He noted that many governments suffer from “analysis paralysis”, preferring to wait and see how other countries handle such threats.

“There are very few countries like Singapore that have chosen a direction and said this is a national security priority.”

Mr Lee was speaking at the Operational Technology Cybersecurity Expert Panel Forum 2022, a two-day event which ends on Wednesday.

While traditional cyber attacks target information systems like databases, malicious attackers are increasingly targeting the operational technology (OT) behind physical systems such as power plants, gas pipelines and manufacturing facilities.

Mr Lee cited the example of the Pipedream suite of malware tools discovered earlier this year, which was found to have the potential to target a range of sectors from power grids and factories to water utilities and oil refineries.

The attackers behind the tools exploited a common software module and aimed to disrupt specific targets in the energy sector, but could potentially have adapted the malware to target other sectors as well.

“A foreign government had developed this capability, and in our assessment, was within a couple of months from deploying it on a number of key electric and energy sites that handle liquid natural gas especially in the United States,” said Mr Lee.

“Its purpose was to be disruptive, with a potential to physically disrupt the infrastructure.”

Fortunately, cyber-security experts were able to identify and create defences against the malware before any attacks could be carried out.

Failing to anticipate and respond to an attack on OT could have serious consequences, including civilian deaths, Mr Lee said.

Click Here For The Original Source.


————————————————————————————-

Translate