Updated: Feb 18
In a recent article published by WIRED http://bit.ly/2FoRF4t The Highly Dangerous ‘Triton’ Hackers Have Probed the US Grid we learned of recent network probing of at least 20 US electric grids. This is alarming due to the fact that the hackers previously executed a very reckless cyberattack that made history. This attack could very well have turned destructive and possibly lethal.
We agree that probing in and of itself isn't dangerous but the fact that hackers are looking for entry points into actual electrical grid networks should be cause for alarm and action! The article references security analysts from the Electric Information Sharing and Analysis Center (E-ISAC) and the critical-infrastructure security firm Dragos and their research into Xenotime (aka “Triton actor”) the same hackers that penetrated the Saudi Arabian oil refinery Petro Rabigh in 2017. Their “malware was designed to disable the so-called safety-instrument systems” aimed at “crippling equipment that monitors for leaks, explosions, or other catastrophic physical events”. Fortunately, the hackers accidentally triggered an emergency shut down of the plant and no severe consequences resulted.
Realistically we know hackers performing these preliminary scans are actually prepping for an invasion into network systems which could lead to serious consequences to Americans.
We do have options to be pro-active in this time of constant breaches. While there are possible steps that can be taken to redesign, strengthen passwords or apply all operating system security patches. These options take time and are not 100% secure. What is needed is a new unconventional security approach that will stop all attack vectors. NCoded Communications stands ready to deliver a Zero Trust Environment Overlay.
The NCC ZTE Overlay is a proprietary design developed to complete the following
objectives through new and unconventional proprietary technology:
Reduce Your Attack Surface
Secure User Access
Cloak Your Infrastructure from Evil Actors
The final objective is to neutralize the adversaries.
Once completed, you will have established a Software Design Perimeter (SDP) cloaking your environment from being seen or accessible on the Internet by anyone.
The Operational Technology (OT) security premise once the ZTE Overlay is deployed is:
If they can’t see it, they can’t steal it!
For the full in depth and detailed position paper written by Peter W. Rung, CEO please contact us at firstname.lastname@example.org