The director of the FBI compares this moment to 9/11: A time of reckoning about a threat that’s increasingly proven its ability to destabilize society.
He’s referring to cyberattacks.
Recent digital ransom attacks have accelerated an acknowledgment in Washington that the current trajectory is untenable.
That’s after meat plants were shuttered temporarily including in Canada this week; after cars lined up at empty U.S. gas stations when a major pipeline was hacked.
A hacker recently tampered with chemical levels at a water-treatment plant in Florida. Nuclear and other power facilities, voting systems, political parties, hospitals and governments have all been compromised.
“This is our new normal,” said Nicole Perlroth, a cybersecurity reporter at The New York Times and author of a new book on the history of cyberattacks.
Unless governments start taking the threat more seriously, she said in an interview: “This is only going to keep happening.”
- B.C. health authority isn’t effectively managing cybersecurity threat on medical devices, audit finds
The issue appears on the U.S. political agenda now.
U.S. lawmakers next week will grill the CEO of Colonial Pipeline, the company at the centre of a recent cyber attack, at two separate hearings in the House and Senate. The Justice Department has labelled the threat as on par with terrorism.
U.S. President Joe Biden intends to raise hacking in his first meeting with Russian President Vladimir Putin later this mont
The Biden administration is also reportedly mulling cyberattacks of its own against Russians, enraged at ransomware attacks from that country.
Yet Americans must weigh such attack plans against the reality that in a tit-for-tat exchange, their highly connected nation is as exposed as any on Earth and filled with potential targets for reprisal.
Meanwhile international talks are inching along at the United Nations toward a so-called digital Geneva Convention — a global pact on what cybercrimes must be off-limits.
That effort remains a long way off and h are wary of the Russian-led initiative, fearing authoritarian governments might use it to crack down on political dissent.
Perlroth’s new book, This Is How They Tell Me The World Ends, explores two key questions: How did we get here? And where do we go next?
https://columbuscountynews.com/advert/livepudzianowski-vs-jurkowski-live-steam-fight-ksw-61-watch-online/
https://columbuscountynews.com/advert/liveksw-61-pudzianowski-vs-jurkowski-full-fight-live-steam-online-now/
https://columbuscountynews.com/advert/fightjurkowski-vs-pudzianowski-live-steam-ksw-61-full-fight-online-now/
https://columbuscountynews.com/advert/fightksw-61-jurkowski-vs-pudzianowski-live-steam-official-ppv-full-fight-online/
https://columbuscountynews.com/advert/ksw-61-official-ppv-live-stream-jurkowski-vs-pudzianowski-online-now/
How a market was born
It begins with programmers in the 1990s who hacked as a hobby, probing software for security flaws and trying to alert companies.
They were treated as a nuisance or worse by companies like Microsoft that resented their products being picked apart.
John Watters bought a cash-strapped tech company and began paying hackers for what they discovered in the early2000s, then published their findings in security reports he sold to corporate clients.
A market was born.
It involved a brand new commodity, the discovery and sale of so-called zero-days — software flaws that allow intruders to inflict damage with zero warning.
- Coleman Group says it caught cyberattack in progress that may have accessed employee files
- Halifax Water looking to spend $1.1M to fix cybersecurity holes
Intelligence agencies came calling. Perlroth writes that deep-pocketed buyers affiliated with the U.S. government transformed the market.
Zero-days Watters once bought for $400 were suddenly going for $150,000 to U.S. government contractors; employees at the National Security Agency were quitting government jobs and doubling their annual salary by selling just one hack
The power of military cyberweapons came to public light in a 2010 attack on an Iranian uranium plant that slowed Iran’s nuclear program.
Foreign states and criminal gangs awoke to the possibilities of stockpiling zero-days. Unknown buyers were now offering hackers multimillion-dollar paydays.
‘This would only end badly’
Perlroth’s book describes a hacking conference in Vancouver a decade ago where one NSA veteran scanned a room filled with attendees from all over the world and shook his head, realizing that the United States was about to lose control of weapons it helped create.
“This, the man told himself, would only end badly,” she writes.
- Halifax Water looking to spend $1.1M to fix cybersecurity holes
Catastrophe struck a few years later, in the aftermath of the public revelations by Edward Snowden of the NSA’s programs.
Suspected Russian hackers dumped online the NSA’s stockpile of zero-days, which have since been used around the world in countless criminal attacks.
The 2017 WannaCry attack, for example, using the NSA’s tools knocked hundreds of thousands of computers offline.
Criminals demanded ransom payments and disrupted hospitals in Britain, numerous government offices and companies in 150 countries, in sectors including automobiles, rail, and package-delivery.