Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Power China Government Security

China Compromised More than a Dozen US Pipelines Between 2011 and 2013 (wsj.com) 53

"Hackers working for the Chinese government compromised more than a dozen U.S. pipeline operators nearly a decade ago, the Biden administration revealed Tuesday while also issuing first-of-its-kind cybersecurity requirements on the pipeline industry," reports the Wall Street Journal. The disclosure of previously classified information about the aggressive Chinese hacking campaign, though dated, underscored the severity of foreign cyber threats to the nation's infrastructure, current and former officials said. In some cases, the hackers possessed the ability to physically damage or disrupt compromised pipelines, a new cybersecurity alert said, though it doesn't appear they did so. Previously, senior administration officials had warned that China, Russia and others were capable of such cyber intrusions. But rarely has so much information been released about a specific and apparently successful campaign.

Chinese state-sponsored hackers between 2011 and 2013 had targeted nearly two dozen U.S. oil and natural gas pipeline operators with the specific goal of "holding U.S. pipeline infrastructure at risk," the Federal Bureau of Investigation and the Department of Homeland Security said in Tuesday's joint alert. Of the known targets, 13 were successfully compromised and an additional eight suffered an "unknown depth of intrusion," which officials couldn't fully assess because the victims lacked complete computer log data, the alert said. Another three targets were described as "near misses" of the Chinese campaign, which relied heavily on spear phishing attacks.

Newsweek adds that the same day the U.S. Department of Homeland Security "announced new requirements for U.S. pipeline operators to bolster cybersecurity following a May ransomware attack that disrupted gas delivery across the East Coast." In a statement, DHS said it would require operators of federally designated critical pipelines to implement "specific mitigation measures" to prevent ransomware attacks and other cyber intrusions. Operators must also implement contingency plans and conduct what the department calls a "cybersecurity architecture design review."
This discussion has been archived. No new comments can be posted.

China Compromised More than a Dozen US Pipelines Between 2011 and 2013

Comments Filter:
  • by 93 Escort Wagon ( 326346 ) on Saturday July 24, 2021 @02:39PM (#61616429)

    At the end of the three year period, none of the pipeline operators will have these measures implemented. They'lll apply for - and be granted - an extension. Then another. Congress will hold hearings (scheduled during an election year) where they call in the heads of these companies to explain why it hasn't happened... although very little of the talking will come from anyone other than the Congressmen.

    • Without it, there would not be any focus on cyber security, and the Chinese could just turn America off if push came to shove.

      But randsomware has put a huge focus on fixing these things. The thieves are doing us a great service, paradoxically.

    • Now do the same for chemical factories, trains, power grids, satellite systems, water systems, traffic control, and critical manufacturers.
    • by gweihir ( 88907 )

      Indeed. There is only one solution: Regulate them, give them a year and if external independent audit and external independent pen-tests and security analyses still finds significant defects, fine the CEO. If a year later things still suck, _jail_ the CEO.

      Incidentally, there is absolutely no sane justification for giving them 3 years. That is way to long to fix something this basic.

  • by bogaboga ( 793279 ) on Saturday July 24, 2021 @02:42PM (#61616447)

    Just wondering whether there's anything common between Chinese and CIA agents when it comes to fomenting mayhem/chaos in distant lands... Is there?

    • Re: (Score:3, Insightful)

      by timeOday ( 582209 )
      Ultimately I agree it's not sensible to take sides based on what tactics are used in the struggle - rather, the bottom line is which you would rather be governed by. (And here I don't mainly mean full-scale occupation, but more realistically, influence - in the way that Russia's economic and political reality is pretty heavily shaped by the US, whereas the reverse is not true). As an American, for all our nation's faults, I would much rather continue to live in a world in which we have more influence than
    • Just wondering whether there's anything common between Chinese and CIA agents when it comes to fomenting mayhem/chaos in distant lands... Is there?

      The CIA is so incompetent that they couldn't accomplish this is they tried. They would end up driving on the wrong side of the road in England or something.

    • by gweihir ( 88907 )

      CIA agents are better at creating chaos and are also better liars.

  • by Anonymous Coward

    Spearfishing.

    https://us-cert.cisa.gov/ncas/... [cisa.gov]

    The emails examples that they provide is laughable if they are to show they were actually "targeted". Who attaches e.g. a file named "iTunesHelper.exe" or "kkk.exe" and expect someone to click on it in the US pipeline industry? This appears more to be just spam being sent to everyone possible, rather than targeting a certain industry.

  • and our people have been asleep at the wheel.

    Americans can always be counted on to do the right thing... after they have exhausted all other possibilities. - Not Churchill [quoteinvestigator.com]

  • 13 pipelines compromised during the Obama administration.

    0 disclosure about any of them during the Obama administration.

    0 mentions of the word "Obama".

    But "Biden Administration" mentioned at the very top.

    • by sjames ( 1099 )

      So executives can be made to feel important by receiving constant updates to data that they don't understand.

  • by Macdude ( 23507 ) on Saturday July 24, 2021 @05:15PM (#61616845)

    "This is a critical piece of national infrastructure, let's connect it to the internet" -- Said no one who has a basic understanding of security, ever.

    • by c-A-d ( 77980 )

      But it's so EASY to do. The Internet is everywhere! We can use firewalls to secure our networks from outside actors, and VPNs to transport the data securely!

    • "This is a critical piece of national infrastructure, let's connect it to the internet" -- Said no one who has a basic understanding of security, ever.

      Said everyone with a basic understanding of how this infrastructure works actually. It's the IT people and armchair experts who are delusional enough to believe that pipelines function without large real-time connection across the country.

      The problem is security people, specifically low cost ones. The kind of people you employ for security and who then promote disconnecting from the internet because that's all they know what to do, and then when you tell them that won't be possible they are stumped and now

    • by gweihir ( 88907 )

      "This is a critical piece of national infrastructure, let's connect it to the internet" -- Said no one who has a basic understanding of security, ever.

      These days there usually is no choice. The problem is not that this stuff is connected to the Internet. The problem is that it is inadequately secured and that nobody seems to know or care. This is a prime example where harsh regulation is needed and harsh _personal_ penalties for the C-levels that messed it up (always including the CEO) are necessary to change things.

  • Can we please have a daily report of all the military dictators and their crimes that the US supports today and continues to help ? Perhaps we can have a retrospective and have a daily recall of dictators like Saddam and the Saudis.
    What goes around comes around.
  • by sconeu ( 64226 ) on Saturday July 24, 2021 @09:01PM (#61617365) Homepage Journal

    DO NOT put fucking CRITICAL INFRASTRUCTURE on the public Internet!!!!

    • Sure, we'll just build a second internet on the side and pass the costs on to you.

      • by MrL0G1C ( 867445 )

        If you did build a second internet, itds have weak security because hey, it's not connected to the internet. And then someone would demand to have their computer connected to both nets. Game over.

        • Thankyou, someone gets it. Security is not a single feature, it's a corporate culture that needs to be instilled in all levels from people, to design, to operation.

    • by gweihir ( 88907 )

      Not really. But how about: Make sure critical infrastructure connected to the Internet has at least basic precautions in place and verify that regularly (i.e. internal and external audit). If security fails to be effective, _fine_ the CEO. If that continues for more than one year, _jail_ the CEO (or the former CEO if that one tried to run...).

  • Require them to be 800-171A compliant, and to hit CMMC by 2025.
  • If you leave the barn door wide open, blaming the one that walked in is just dishonest and a lie by misdirection. No matter how much you may hate China, the fact of the matter is you _allowed_ them to walk in bu not even having effective basic precautions.

  • To solve this problem, Biden just dropped charges against several Chinese accuse of industrial espionage and visa fraud. Apparently, the Bidenfolk think that being nice to Chinese will make them give up their aim of world domination. This is the approach Obama used with the Republicans, and obviously that was tremendously successful.

  • Seriously, what company keeps decade old logs of their infra? Something seems fishy that they come with these accusations so late.

A right is not what someone gives you; it's what no one can take from you. -- Ramsey Clark

Working...