Energy News  
CYBER WARS
US exchanges offer a rich potential target for hackers
By Daniel HOFFMAN
New York (AFP) May 26, 2021

Cyberattacks have long been seen as a threat to financial markets, but worries are becoming even more acute following a US pipeline hack that set off a public panic and forced the company to pay a ransom.

Financial exchanges that manage daily transactions of tens or hundreds of billions of dollars are an appealing target for hackers.

Major stock exchanges insist they are on top of the issue, but remain mum about what steps they are taking to safeguard their networks.

"Technology and operational resiliency sits at the heart of everything we do," a Nasdaq spokesperson told AFP.

Likewise, the Chicago Board Options Exchange "takes cybersecurity very seriously and does not discuss our cyber defenses publicly," an exchange spokesperson said.

New York Stock Exchange President Stacey Cunningham told CNBC the exchange is "constantly working not only with our own teams but with others in the market, with the regulators and other exchanges on ensuring that markets are secure."

The Chicago Mercantile Exchange, a key trading venue for energy and agricultural products, declined comment entirely.

Recent history shows the hacking risk is far from a theoretical problem at financial exchanges.

Last August, New Zealand's NZX was crippled for four days following a digital siege.

The episode, a "distributed denial-of-service" attack, is a common type of cyberincident in which hackers saturate a system by sending a huge flood of requests, overwhelming the system and slowing or freezing operations.

"NZX has been advised by independent cyber specialists that the attacks ... are among the largest, most well-resourced and sophisticated they have ever seen in New Zealand," said NZX Chief Executive Mark Peterson said following the incident.

Such a calamity has yet to befall an exchange or major financial firm in the United States. But the worry has preoccupied US finance and government at the highest levels.

Federal Reserve Chair Jerome Powell told the news show "60 Minutes" last month that a cyberattack poses risks to financial markets even more severe than the liquidity freeze-up in the 2008 financial crisis.

"There are scenarios in which a large payment utility, for example, breaks down and the payment system can't work," Powell said. "Payments can't be completed.

"There are scenarios in which a large financial institution would lose the ability to track the payments that it's making."

Nasdaq employs resources to counter cyberthreats, but warns that "these measures may prove insufficient depending upon the attack or threat posed," the company said in a securities filing, adding that it "may be required to devote significant additional resources to the effort."

- Range of motivations -

The most typical means used by hackers to extort victims is to infiltrate a computer network with ransomware, which encrypts the system's data that can be lifted after the ransom is paid.

Earlier this month, Colonial Pipeline, which provides gasoline to much of the US East coast, ultimately paid some $4.4 million to hackers after the network was completely taken down for several days, sparking panic buying and a fuel shortage in some areas.

But money is not the only motivation for groups that might seek to take hostage a high-profile institution like a stock market, experts say.

"They may want to make money, damage the ability of the target to conduct business, steal sensitive information, or ruin their reputation," said Sean Cordero, a security advisor at Netenrich, a California cybersecurity company.

"Or, it could be all of the above and more."

The group's motivation also will determine the nature of the attack.

"If they are driven by espionage or are purely interested in gathering information, they would likely lay quiet and move discretely so that they may maintain access for as long as possible," said Alec Alvarado, a cyberintelligence specialist at Digital Shadows, a San Francisco company.

But groups seeking a large ransom payment may opt to inflict maximum immediate harm to elicit a quick response.

The range of motivations means firms should aim to make themselves "the hardest target" possible to thwart attacks, Alvarado said.

"Unfortunately, with ever-expanding attack surfaces, if a threat actor is willing to take the time to find a way in, chances are they probably will."

Cordero said frequent updates of security systems are needed to counter cyberrisks, requiring systems to be temporarily taken offline.

"This is ultimately a risk-based decision that can have major implications if not treated as such," Cordero said. "Unfortunately, these decisions tend to be relegated to the 'to-do' list and may go for months or years without action."


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The Space Media Network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceMediaNetwork Contributor
$5 Billed Once


credit card or paypal
SpaceMediaNetwork Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
Operating in the shadows: US Cyber Command
Washington (AFP) May 25, 2021
If the Pentagon's Cyber Command launches an online attack and nobody knows about it, does it deter anyone? Many Americans are asking what the country's army of cyber warriors are doing after repeated attacks on US computer systems by Chinese, Russian and other hackers. The answer may have been in the 780th Military Intelligence Brigade's subtle retweet on May 14 of a security firm's scoop that ransomware extortionist Darkside had been digitally shut down. No one knows who took control of Da ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Fashion's green future of seaweed coats and mushroom shoes

New technology turns plastic trash into jet fuel

Can lab-grown algae help tackle hunger?

US waives clean fuel rules to alleviate shortage after pipeline shutdown

CYBER WARS
Maxeon Solar Technologies to supply solar panels for Primergy's GW-Scale Gemini Project

Renewable energy powers ahead in 2020: report

Space weather and solar blobs

Researchers unveil roadmap to expand NY solar energy, meet green goals

CYBER WARS
US approves its biggest offshore wind farm yet

Vertical turbines could be the future for wind farms

Researchers working to further develop monopile production for offshore wind farms

Blowing in the wind: Fishermen threaten South Korea carbon plans

CYBER WARS
Rusal splits high carbon assets ahead of EU carbon tax

Iran rolling blackouts blamed on heat, drought, crypto-mining

New 'optical rectennas' harvest energy from heat with record efficiency

Green groups slam UK bank links to carbon emissions

CYBER WARS
Highview Power Developing 2 GWh of Liquid Air Long Duration Energy Storage Projects in Spain

Fuel cells reduce ship emissions

BASF in battery parts production deal with China's Shanshan

Renewable energy sources: On the way towards large-scale thermal storage systems

CYBER WARS
Effects of natural noise pollution on animals similar to noise from humans

Excess nitrogen has made sargassum the world's largest harmful algal bloom

Pandemic mask mountain sets new recycling challenge

Notre-Dame's square closed over lead pollution risks

CYBER WARS
French energy giant Total to change its name

No new fossil fuel projects for net-zero: IEA

Iraq says $150bn stolen oil cash smuggled out since 2003

No new fossil fuel projects for net-zero: IEA

CYBER WARS
Plans underway for Ingenuity's 6th flight

Chinese Mars rover beams back first photos

On its first try, China's Zhurong rover hit a Mars milestone

Perseverance, Hope and a fire god: a history of Mars rovers









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.