Colonial Pipeline is a private company. Should the US Government get involved?

30% of NC stations are out of gas.

Still no word on when the "experts" can get the pipeline working again. It will take weeks after that to get things back to normal, in part because of a shortage of truck drivers.
 
30% of NC stations are out of gas.

Still no word on when the "experts" can get the pipeline working again. It will take weeks after that to get things back to normal, in part because of a shortage of truck drivers.

this is deep state shenanigans.

im so sure a ransomware gang did it. come on, man.
 
"Colonial Pipeline wasn't the first and won't be the last cyber pirate attack"
https://www.msn.com/en-us/news/poli...t-be-the-last-cyber-pirate-attack/ar-BB1gAkqL

"The fact that an apparent group of cyber pirates -- a secret criminal nerd syndicate -- can take down the aorta of fuel for the East Coast should be sending shockwaves through the country."

The most surprising thing here is the government saying paying ransom or whatever was a private issue for Colonial when its causing gas lines.
 
All they gotta do is make a backup of their hard drives every so often.

Ransomware is a joke! :laugh:

Recovery is not as simple as you make it out to be. They have to discover when the first computers were infected since if they install any file created after that first infection they could just be reinfecting their network. Ransomware can sit idle for a period of time before being activated. This means they could lose 6 months or more of files.

They have to take down every computer, completely wipe them, and then reinstall each computer. You can't use the existing software to restore files since the ransomware could be hiding in any file waiting to be activated. If the ransomware manages to infect drives then you might have to replace drives on every computer as well. If your backups are to a central back up and it takes 2 hours to reinstall each computer and you have 400 computers it will take you a month to get everyone back up. But even after you reinstall each computer then you have to do any updates, software installs or anything else that occurred after the initial infection.
 
Recovery is not as simple as you make it out to be. They have to discover when the first computers were infected since if they install any file created after that first infection they could just be reinfecting their network. Ransomware can sit idle for a period of time before being activated. This means they could lose 6 months or more of files.

They have to take down every computer, completely wipe them, and then reinstall each computer. You can't use the existing software to restore files since the ransomware could be hiding in any file waiting to be activated. If the ransomware manages to infect drives then you might have to replace drives on every computer as well. If your backups are to a central back up and it takes 2 hours to reinstall each computer and you have 400 computers it will take you a month to get everyone back up. But even after you reinstall each computer then you have to do any updates, software installs or anything else that occurred after the initial infection.
Question from an idiot about computers, would a backup system have prevented this?
 
You know somebody had to open an email to get that ransomware, right?

Should has anti-phishing tips posted by the PC.

That is one avenue of attack but is hardly the only avenue. Perhaps the attacker was able to SSH into a server. Or they sent a Word document using a hacked company account. Or it was a software vendor that had their updates hacked. (See SolarWinds.) Or it was a program downloaded from the internet from a fake website.
 
Question from an idiot about computers, would a backup system have prevented this?

It would not prevent it. It only helps to recover from it if you can isolate when the infection happened. Proper security is the only way to prevent it.

One of the best ways to prevent it from going too far is to monitor your computers for disk activity. There are security softwares that do that. If it suddenly sees a lot of files being written to which needs to happen for files to be encrypted it sends out an alert and can work to shut things down.
 
Our cyber security is Dog Shit because our leaders barely have given a fuck about doing this job well.

BUCKLE UP!

Not their job. I am responsible for my network security. Only me. It is not government's job to secure the network of a private company. You are right in that the federal government network security is generally dog shit.
 
You cant have cyber security without government assistance.

YES YOU CAN. Government provides NO assistance here. Me, myself, and I are the only ones responsible for securing my network. Not government. I can and already have done a far better job than many government systems (often trivially easy to break into).
 
It would not prevent it. It only helps to recover from it if you can isolate when the infection happened. Proper security is the only way to prevent it.

One of the best ways to prevent it from going too far is to monitor your computers for disk activity. There are security softwares that do that. If it suddenly sees a lot of files being written to which needs to happen for files to be encrypted it sends out an alert and can work to shut things down.
Thank you
 
You cant have cyber security without government assistance.

Public-private key encryption (the basis of SSL and HTTPS) was constructed by private individuals, not government. Government wanted to install a backdoor in it. The developers told them to get lost.
 
Back
Top