(Bloomberg) President Joe Biden and members of Congress face a moment of truth when it comes whether they are willing to spend significant dollars to shore up U.S. cyber defenses.
US to require energy pipelines report computer hacks or face fines Toggle share menu
Advertisement
US to require energy pipelines report computer hacks or face fines Energy pipeline companies will have to report cybersecurity incidents to the U.S. government under a new directive that will be announced by the Transportation Security Administration (TSA) on Thursday, senior government officials said.
FILE PHOTO: Holding tanks are seen in an aerial photograph at Colonial Pipeline s Dorsey Junction Station in Woodbine, Maryland, U.S. May 10, 2021. REUTERS/Drone Base/File Photo
27 May 2021 06:15PM Share this content
Bookmark
WASHINGTON: Energy pipeline companies will have to report cybersecurity incidents to the U.S. government under a new directive that will be announced by the Transportation Security Administration (TSA) on Thursday, senior government officials said.
Energy pipeline companies will have to report cybersecurity incidents to the U.S. government under a new directive that will be announced by the Transportation Security Administration (TSA) on Thursday, senior government officials said.
The Agrius attack life cycle (Source: SentinelOne)
A threat group likely operating from Iran has been attacking Israeli targets for more than a year with the wiper variants Apostle and Deadwood, masking the intrusions as ransomware attacks to confuse defenders, according to SentinelOne.
The security firm, which didn t specify which targets in Israel were attacked, says the incidents took place this year and last, with the wiper functionality used in only some of the attacks.
The threat group, which SentinelOne dubbed Agrius, appears to have links to known Iranian actors, the research report states. An analysis of what at first sight appeared to be a ransomware attack revealed new variants of wipers that were deployed in a set of destructive attacks against Israeli targets, says Amitai Ben Sushan Ehrlich, a threat intelligence researcher at SentinelOne. The operators behind the attacks intentionally masked their activity as ransomware attacks.