The New America Future of War conference occurred yesterday on April 9th and, among the topics discussed, perhaps most disturbing were the potential cyberattack scenarios presented by a panel of experts from the financial, military, and cybersecurity industries.
Military Times reported on the information presented on the panel. The underlying theme from experts in all areas was that there just wasn’t much media coverage of cyberattacks that have occurred so far. Without that exposure to raise awareness, it’s easy to be even less concerned and prepared than we should be.
The Military Times article cited this specific comment from the conference:
“Robert M. Lee, a former National Security Agency cyber expert and current CEO of Dragos Inc., pointed to a new development that is a first in cyberattacks.
A piece of malware called Trisis was used to sabotage an industrial control system of an electric company. But it was more than just an attack on electric power.
“It was the first piece of malware specifically designed to kill people,” Lee said.
The malware would allow hackers to access controls that could cause leaks or explosions, rather than simply switching off power to parts of the grid.
But both in that incident and ones preceding it in recent years the actual events garnered little public acknowledgement by government leaders nor responses that would help deter such attacks.”
The enemy is watching that lack of response, noted Peter W. Singer, author of the novel “Ghost Fleet: A Novel of the Next World War.” And as with the emergence of autonomous cars, it will take the first tragedy to bring more widespread awareness.
The cyberattacks that are hitting every other industry these days can have a quick and deadly effect on troops on a battlefield. One particularly insidious type of (Read more...)
*** This is a Security Bloggers Network syndicated blog from Cylance Blog authored by Cylance Research and Intelligence Team. Read the original post at: https://threatmatrix.cylance.com/en_us/home/dangers-and-advancement-military-cyberattacks.html