Chronic. It is a huge and solid artery that irrigates most of the United States. The colonial pipeline extends nearly 9,000 kilometers along the eastern coast of the United States, from Houston to New York, and then through Washington and Atlanta. It satisfies 45% of the gasoline, fuel oil, kerosene and other refined fuel needs in this area of Texas by itself.
But since the evening of Friday, May 7, traffic has not flowed out. A computer attack destroyed the information system of the network operating company. The hacker has encrypted the data and demanded a ransom to unlock it. What is uncertain is that the US government has declared a state of emergency to allow tankers to traverse the 17 states that the network traverses. The ship was requisitioned.
This is the first time a computer attack has hit critical energy infrastructure so severely. But this is not the first time professionals have been warned.In 2016, according to Wall Street Journal, The cybersecurity service of the U.S. Department of Homeland Security has identified 186 vulnerabilities in the energy sector, and in 2018, similar intrusions (with ransom) affected the compression unit ordering system of natural gas suppliers. The company has no response plan for such attacks.
Just like the current epidemic, many experts have announced the epidemic in various tones for more than ten years. However, when evil came, the victim fell sharply. Not prepared at all. However, this is no longer a black swan problem. This is an extremely unlikely event with devastating consequences, but a risk that is now known and clearly pointed out. Whether hiding in Russia, China or California, hackers are now attacking schools, hospitals and even government departments. Sometimes it is infection, or even destruction, and sometimes it is taking important data and programs hostage.
The fault is usually the same, located in the center of the machine, the old equipment, dating back to before the appearance of the Internet, plus modern systems connected to the network. The thief touched one with the other. Digital crime is flourishing in the transformation of the world to the Internet. Prepare carefully for this.