AGL 37.72 Decreased By ▼ -0.22 (-0.58%)
AIRLINK 168.65 Increased By ▲ 13.43 (8.65%)
BOP 9.09 Increased By ▲ 0.02 (0.22%)
CNERGY 6.85 Increased By ▲ 0.13 (1.93%)
DCL 10.05 Increased By ▲ 0.52 (5.46%)
DFML 40.64 Increased By ▲ 0.33 (0.82%)
DGKC 93.24 Increased By ▲ 0.29 (0.31%)
FCCL 37.92 Decreased By ▼ -0.46 (-1.2%)
FFBL 78.72 Increased By ▲ 0.14 (0.18%)
FFL 13.46 Decreased By ▼ -0.14 (-1.03%)
HUBC 114.10 Increased By ▲ 3.91 (3.55%)
HUMNL 14.95 Increased By ▲ 0.06 (0.4%)
KEL 5.75 Increased By ▲ 0.02 (0.35%)
KOSM 8.23 Decreased By ▼ -0.24 (-2.83%)
MLCF 45.49 Decreased By ▼ -0.17 (-0.37%)
NBP 74.92 Decreased By ▼ -1.25 (-1.64%)
OGDC 192.93 Increased By ▲ 1.06 (0.55%)
PAEL 32.24 Increased By ▲ 1.76 (5.77%)
PIBTL 8.57 Increased By ▲ 0.41 (5.02%)
PPL 167.38 Increased By ▲ 0.82 (0.49%)
PRL 31.01 Increased By ▲ 1.57 (5.33%)
PTC 22.08 Increased By ▲ 2.01 (10.01%)
SEARL 100.83 Increased By ▲ 4.21 (4.36%)
TELE 8.45 Increased By ▲ 0.18 (2.18%)
TOMCL 34.84 Increased By ▲ 0.58 (1.69%)
TPLP 11.24 Increased By ▲ 1.02 (9.98%)
TREET 18.63 Increased By ▲ 0.97 (5.49%)
TRG 60.74 Decreased By ▼ -0.51 (-0.83%)
UNITY 31.98 Increased By ▲ 0.01 (0.03%)
WTL 1.61 Increased By ▲ 0.14 (9.52%)
BR100 11,289 Increased By 73.1 (0.65%)
BR30 34,140 Increased By 489.6 (1.45%)
KSE100 105,104 Increased By 545.3 (0.52%)
KSE30 32,554 Increased By 188.3 (0.58%)

Hacking attacks that destroy rather than steal data or that manipulate equipment are far more prevalent than widely believed, according to a survey of critical infrastructure organizations throughout North and South America.
The poll by the Organization of American States, released on Tuesday, found that 40 percent of respondents had battled attempts to shut down their computer networks, 44 percent had dealt with bids to delete files and 54 percent had encountered "attempts to manipulate" their equipment through a control system.
Those figures are all the more remarkable because only 60 percent of the 575 respondents said they had detected any attempts to steal data, long considered the predominant hacking goal.
By far the best known destructive hacking attack on US soil was the electronic assault last year on Sony Corp's
Sony Pictures Entertainment, which wiped data from the Hollywood fixture's machines and rendered some of its internal networks inoperable.
The outcry over that breach, joined by President Barack Obama, heightened the perception that such destruction was an unusual extreme, albeit one that has been anticipated for years.
Destruction of data presents little technical challenge
compared with penetrating a network, so the infrequency of publicized incidents has often been ascribed to a lack of motive for attackers.
Now that hacking tools are being spread more widely, however, more criminals, activists, spies and business rivals are experimenting with such methods.
"Everyone got outraged over Sony, but far more vulnerable are these services we depend on day to day," said Adam Blackwell, secretary of multidimensional security at the Washington, D.C.-based group of 35 nations.
The survey went to companies and agencies in crucial sectors as defined by the OAS members. Almost a third of the respondents were public entities, with communications, security and finance being the most heavily represented industries.
The questions did not delve into detail, leaving the amount of typical losses from breaches and the motivations of suspected attackers as matters for speculation. The survey-takers were not asked whether the attempted hacks succeeded, and some attacks could have been carried off without their knowledge.
The survey did allow anonymous participants to provide a narrative of key events if they chose, although those will not be published.
Blackwell told Reuters that one story of destruction involved a financial institution. Hackers stole money from accounts and then deleted records to make it difficult to reconstruct which customers were entitled to what funds.
"That was a really important component" of the attack, Blackwell said.
In another case, thieves manipulated equipment in order to divert resources from a company in the petroleum industry.
Blackwell said that flat security budgets and uneven government involvement could mean that criminal thefts of resources, such as power, could force blackouts or other safety threats.
At security company Trend Micro Inc., which compiled the report for the OAS, Chief Cybersecurity Officer Tom Kellermann said additional destructive or physical attacks came from political activists and organized crime groups.
"We are facing a clear and present danger where we have non-state actors willing to destroy things," he said. "This is going to be the year we suffer a catastrophe in the hemisphere, and when you will see kinetic response to a threat actor."
So-called "ransomware," which encrypts data files and demands payment be sent to remote hackers, could also have been interpreted as destructive, since it often leaves information unrecoverable.
A spokesman for the US Department of Homeland Security, SY Lee, said the department did not keep statistics on how often critical US institutions are attacked or see destructive software and would not "speculate" on whether 4 out of 10 seeing deletion attempts would be alarming.
US political leaders cite attacks on critical infrastructure as one of their greatest fears, and concerns about protecting essential manufacturers and service providers drove a recent executive order and proposed legislation to encourage greater information-sharing about threats between the private sector and government.
Yet actual destructive attacks or manipulation of equipment are infrequently revealed. That is in part because breach-disclosure laws in more than 40 states center on the potential risks to consumers from the theft of personal information, as with hacks of retailers including Home Depot Inc and Target Corp.

Copyright Reuters, 2015

Comments

Comments are closed.