How to terrorism

Locutus

Adorable Deplorable
Jun 18, 2007
32,230
45
48
65
The unfortunate demise of some douchebag western leader, bombing a plane or kidnap-beheadings are way too 90's...this is how to properly terrorism. power grids, water supplies, internet, air traffic control networks and such.




An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries.

Among the targets of Dragonfly were energy grid operators, major electricity generation firms, petroleum pipeline operators, and energy industry industrial equipment providers. The majority of the victims were located in the United States, Spain, France, Italy, Germany, Turkey, and Poland.

The Dragonfly group is well resourced, with a range of malware tools at its disposal and is capable of launching attacks through a number of different vectors. Its most ambitious attack campaign saw it compromise a number of industrial control system (ICS) equipment providers, infecting their software with a remote access-type Trojan. This caused companies to install the malware when downloading software updates for computers running ICS equipment. These infections not only gave the attackers a beachhead in the targeted organizations’ networks, but also gave them the means to mount sabotage operations against infected ICS computers.

This campaign follows in the footsteps of Stuxnet, which was the first known major malware campaign to target ICS systems. While Stuxnet was narrowly targeted at the Iranian nuclear program and had sabotage as its primary goal, Dragonfly appears to have a much broader focus with espionage and persistent access as its current objective with sabotage as an optional capability if required.

In addition to compromising ICS software, Dragonfly has used spam email campaigns and watering hole attacks to infect targeted organizations. The group has used two main malware tools: Backdoor.Oldrea and Trojan.Karagany. The former appears to be a custom piece of malware, either written by or for the attackers.



more


Dragonfly: Western Energy Companies Under Sabotage Threat | Symantec Connect
 

damngrumpy

Executive Branch Member
Mar 16, 2005
9,949
21
38
kelowna bc
The west traded optimism for fear. The leaders sewed a web of fear and the citizens
bought it. Fear only last so long and then anger sets in and there is reaction not good
either. What we need is folks to rationalize the whole process.
The problem is the fear concept precipitated some serious actions and reactions and
now we are on a path of serious problems if not a war Actually we were attacked and
we have been in a war since 2001 and we are just catching up to the fact.
 

WLDB

Senate Member
Jun 24, 2011
6,182
0
36
Ottawa
Actually we were attacked and
we have been in a war since 2001 and we are just catching up to the fact.

The people responsible for or involved in that attack are now all dead or in prison. Its done. Time to move on. War against a tactic, which is what terrorism is, is a war that will never end.
 

Serryah

Executive Branch Member
Dec 3, 2008
8,977
2,073
113
New Brunswick
We need to all get together, have a group hug and move on.:roll:

.........jeez, I hear Beatle music.


So long as we don't get ____________ (fill in your desired racial, sexist, bigoted term here) cooties. :-(

... yellow submarine??