Security News > 2020 > February > Ransomware Attack Hit US Natural Gas Facility
A ransomware attack on a U.S. natural gas compression facility led to a two-day shutdown of operations, according to an alert from the Cybersecurity and Infrastructure Security Agency.
From there, attackers planted what the agency called "Commodity ransomware" within both networks that encrypted data throughout the facility.
It did not offer details about when the attack happened, what strain of ransomware was involved or whether a ransom was paid.
CISA says it issued an alert about the ransomware attack to warn other businesses about such attacks and offer some defensive and mitigation best practices.
In the ransomware attack that CISA described, the agency noted that malware affected the "Human machine interfaces, data historians and polling servers," of the natural gas compression facility, which meant the operators lost the ability to read real-time data from OT devices, according to the report.
News URL
https://www.inforisktoday.com/ransomware-attack-hit-us-natural-gas-facility-a-13740
Related news
- JetBrains is still mad at Rapid7 for the ransomware attacks on its customers (source)
- Stanford: Data of 27,000 people stolen in September ransomware attack (source)
- US govt probes if ransomware gang stole Change Healthcare data (source)
- Nissan confirms ransomware attack exposed data of 100,000 people (source)
- Crypto scams more costly to the US than ransomware, feds say (source)
- TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks (source)
- What the Latest Ransomware Attacks Teach About Defending Networks (source)
- Over 100 US and EU orgs targeted in StrelaStealer malware attacks (source)
- US sanctions APT31 hackers behind critical infrastructure attacks (source)
- Lessons from a Ransomware Attack against the British Library (source)