- Teen star Danielle Cohn faked pregnancy for YouTube prank 4 Weeks Ago
- How to watch ‘A Discovery of Witches’ for free 4 Weeks Ago
- Rev up your own family rivalries with these ‘Game of Thrones’ board games 4 Weeks Ago
- Mueller’s ‘harm to ongoing matter’ is the best way to stay silent about your life 4 Weeks Ago
- 10 Korean skincare brands that are worth your money Today 10:00 AM
- 20 unique Mother’s Day gifts for the cool moms Today 9:45 AM
- Ancestry.com ad tries to sell slavery as romance—not rape Today 9:44 AM
- The 9 best Satanic movies on Shudder Today 9:22 AM
- Twitch streamer banned after accidentally revealing racist chats Today 9:21 AM
- This video captures 15 years of meme trends in 10 minutes Today 8:57 AM
- Trump calls parts of Mueller Report ‘total bullshit’ in unfinished tweetstorm Today 8:24 AM
- Amid ‘Avengers’ hype, ‘Spider-Man: Far From Home’ bumps up release date Today 7:57 AM
- Netflix’s ‘Someone Great’ is a coming-of-age rom-com for twenty-somethings Today 7:03 AM
- The best new movies and TV shows to stream this weekend Today 7:00 AM
- ‘Ramy’ explores the intersection of Muslim and millennial identities Today 6:30 AM
Triton is a new malware ‘deliberately’ designed to put lives at risk
Triton is the next name in malwrae.
A computer malware discovered in the Middle East is now targeting companies in North America, according to a report in the MIT Technology Review,
Triton is a frightening new malware that responders say is designed to cause damage to human life. One such instance, in Saudia Arabia, nearly took down a petrochemical plant.
Julian Gutmanis, a malware first responder, had to take care of an attack at a plant in Saudi Arabia in 2017. “This was the first time the cybersecurity world had seen code deliberately designed to put lives at risk,” he told the Technology Review.
In the worst case scenario, the plant could have released toxic hydrogen sulfide gas or caused explosions—but, luckily, Gutmanis was able to take control back of the plant.
Triton allows hackers to take control of these systems remotely—which, in the wrong hands, could have terrible consequences. Dragos, a cybersecurity firm, says hackers now look for targets outside of the Middle East, including in North America.
“I’ve been into a lot of plants in the U.S. that were nowhere near as mature [in their approach to cybersecurity] as this organization was,” he told the Technology Review. He added the attack likely came from employees working from inside the firm.
While Iran was initially believed to be behind Triton, Security experts from FireEye are now looking at a different culprit: Russia, and more specifically the Central Scientific Research Institute of Chemistry and Mechanics in Moscow (even though the firm was not able to draw clear links).
So what can companies do to be protected from this type of attack? The Technology Review says a strategy known as “defense in depth,” using multiple layers of security to separate corporate networks from the internet.
Still, experts now urge American companies to revisit all their operations in order to reduce the risk posed by malware such as Triton.
Stéphanie Fillion is a French-Canadian journalist covering politics and foreign affairs in Montreal, Canada. She has worked for Radio-Canada in Vancouver and was a San Paolo fellow at La Stampa in Turin. In 2015, she won the Eu-Canada Young Journalist Award. She holds an M.A. in Journalism, Politics and Global Affairs from Columbia Journalism School and a B.A. in Comparative Politics, History and Italian Studies from McGill University. Her work appeared in outlets such as Quartz, Vice News, Ipolitics, and PassBlue.