These Cyberattacks Keeps Getting Crazier...

00:17:02
https://www.youtube.com/watch?v=142dhDP8QwM

Resumo

TLDRThe video covers the breach of the US nuclear weapons agency, specifically the NNSA, which is part of the Department of Energy. The breach was part of a larger cyber attack involving Microsoft SharePoint, affecting around 400 institutions globally. The speaker reassures viewers that no sensitive nuclear codes were compromised, as the nuclear weapons systems are air-gapped and have multiple security measures in place. The hack exploited a vulnerability in on-premise SharePoint servers, allowing unauthorized code execution. The video emphasizes the importance of cybersecurity and the potential risks to critical infrastructure from such attacks.

Conclusões

  • 🔒 The NNSA was breached, but no sensitive information was compromised.
  • 💻 The hack was part of a larger Microsoft SharePoint vulnerability.
  • 🌐 Around 400 institutions were affected globally.
  • 🛡️ Nuclear weapons systems are air-gapped and have multiple safeguards.
  • ⚠️ Cyber attacks on critical infrastructure pose serious risks.
  • 🔍 A zero-day exploit was used in the attack.
  • 📊 Organizations should prioritize cybersecurity practices.
  • 🖥️ SharePoint is a content management system used by many organizations.
  • 🚨 Nexus threat actors are often government-affiliated hackers.
  • 🔑 Regular updates and cloud services can enhance security.

Linha do tempo

  • 00:00:00 - 00:05:00

    The video discusses a breach of the US nuclear weapons agency, specifically the National Nuclear Security Administration (NNSA), which is responsible for maintaining the country's nuclear stockpile. The speaker reassures viewers that no sensitive information, such as nuclear codes, was compromised. The NNSA's systems are designed with safeguards, including airgapping and legacy technology, to prevent unauthorized access. The breach is part of a larger cyber attack involving Microsoft SharePoint, affecting around 400 institutions, with a suspected Chinese nexus threat actor behind the exploitation.

  • 00:05:00 - 00:10:00

    The hack occurred through a vulnerability in on-premise SharePoint servers, allowing unauthorized code execution. The speaker explains the technical details of the exploit, categorized as CVE 202553770, which involved deserialization of untrusted data. Despite the breach, the NNSA had good cybersecurity practices in place, enabling them to respond quickly and limit the impact. Other government organizations were also affected, raising concerns about the security of critical infrastructure.

  • 00:10:00 - 00:17:02

    The speaker emphasizes the growing threat of cyber attacks on critical infrastructure, highlighting the potential consequences for public safety. While the nuclear arsenal remains secure, the targeting of other essential services poses significant risks. The video concludes with a call for better international agreements to address cyber warfare and protect critical systems, urging viewers to remain vigilant about cybersecurity threats.

Mapa mental

Vídeo de perguntas e respostas

  • What agency was breached?

    The National Nuclear Security Administration (NNSA) under the US Department of Energy.

  • Was any sensitive information compromised?

    No, sensitive nuclear codes or classified information were not compromised.

  • What was the method of the hack?

    The hack exploited a vulnerability in on-premise Microsoft SharePoint servers.

  • How many institutions were affected by the hack?

    Around 400 institutions were affected globally.

  • What is a nexus threat actor?

    A nexus threat actor is someone affiliated with a government, often involved in cyber warfare.

  • What is SharePoint?

    SharePoint is a content management system and internet platform used for collaboration and document management.

  • What is a zero-day exploit?

    A zero-day exploit is a vulnerability that is exploited before it is known to the vendor and patched.

  • What are some safeguards for nuclear weapons?

    Nuclear weapons are air-gapped, use legacy systems, and require multiple authorizations to launch.

  • What should organizations do to protect against such hacks?

    Organizations should implement good cybersecurity practices, including regular updates and using cloud services.

  • What are the implications of cyber attacks on critical infrastructure?

    Cyber attacks on critical infrastructure can lead to significant risks, including threats to human lives.

Ver mais resumos de vídeos

Obtenha acesso instantâneo a resumos gratuitos de vídeos do YouTube com tecnologia de IA!
Legendas
en
Rolagem automática:
  • 00:00:00
    Yeah, the title is not clickbait here,
  • 00:00:02
    ladies and gentlemen. Yes, the US
  • 00:00:04
    nuclear weapons agency did in fact get
  • 00:00:07
    breached. Now, you know, I love talking
  • 00:00:09
    about computer cyber security. I love
  • 00:00:10
    talking about crazy hacks, especially
  • 00:00:12
    when things are out of our control
  • 00:00:14
    because uh sometimes all you can do in
  • 00:00:16
    this crazy world is sort of laugh. Okay?
  • 00:00:19
    And uh that's really all you're able to
  • 00:00:21
    do right now, ladies and gentlemen. So,
  • 00:00:23
    for anybody that doesn't know what's
  • 00:00:24
    been going on, this is the United States
  • 00:00:28
    Department of Energy. And underneath the
  • 00:00:29
    Department of Energy is again the
  • 00:00:32
    National Nuclear Security
  • 00:00:34
    Administration, the NNSA.
  • 00:00:37
    Now, what is the job of the NNSA? Their
  • 00:00:41
    core missions, meaning this is literally
  • 00:00:43
    what they're made for, is to ensure the
  • 00:00:45
    United States maintains a safe, secure,
  • 00:00:49
    and reliable nuclear stockpile through
  • 00:00:52
    the application of unprecedented
  • 00:00:55
    science, technology, engineering, and
  • 00:00:57
    manufacturing.
  • 00:00:59
    So, their job is to maintain all of the
  • 00:01:02
    nuclear weapons that the United States
  • 00:01:05
    has, which for anybody that doesn't
  • 00:01:06
    know, if you look at the grand list of
  • 00:01:08
    how many nukes people own, there's
  • 00:01:10
    really not all that many countries that
  • 00:01:12
    have nuclear weapons. But the two
  • 00:01:14
    biggest, the United States and the
  • 00:01:16
    Russian Federation, I think the Russians
  • 00:01:18
    have more in number, but the United
  • 00:01:20
    States has a guarantee
  • 00:01:23
    that all of the ones that they have can
  • 00:01:26
    blow up. Now, obviously, you only really
  • 00:01:28
    need a few nuclear bombs to end
  • 00:01:30
    humanity. Somehow, we've made hundreds
  • 00:01:33
    upon hundreds to the point where you
  • 00:01:35
    could end the world several times over,
  • 00:01:38
    okay? And still have enough nuclear
  • 00:01:40
    weapons to raise the party even higher.
  • 00:01:43
    Why would somebody need that many
  • 00:01:44
    nuclear weapons? To be honest with you,
  • 00:01:46
    I will let the government answer for
  • 00:01:48
    that, okay? Because it makes no sense to
  • 00:01:51
    me. Now, when I read that apparently
  • 00:01:54
    that they got breached, that's some
  • 00:01:56
    scary headline. Whoa, the nukes got
  • 00:01:59
    breached. Now, I want to demystify and,
  • 00:02:02
    you know, basically call the
  • 00:02:03
    misinformation. Okay, I'm somebody that
  • 00:02:06
    knows my fair share about cyber
  • 00:02:07
    security. I know what I need to tell to
  • 00:02:09
    the audience that nothing sensitive or
  • 00:02:13
    nothing classified, no nuclear codes,
  • 00:02:16
    none of that was actually distributed to
  • 00:02:18
    the world. So again, just to give you an
  • 00:02:20
    idea, if you're worried that the bombs
  • 00:02:22
    are going to be hacked and fly above
  • 00:02:23
    you, they're most definitely not. Okay,
  • 00:02:26
    to give you a quick idea about how
  • 00:02:27
    nuclear weapons sort of work, the actual
  • 00:02:30
    technology behind nuclear weapons and
  • 00:02:32
    the measures that we have are pretty low
  • 00:02:36
    tech to be honest with you. So first
  • 00:02:38
    off, a lot of these nuclear weapons are
  • 00:02:39
    airgapped. So meaning that they are
  • 00:02:42
    completely isolated from the actual
  • 00:02:43
    internet. Meaning that no hacker should
  • 00:02:45
    in theory be able to breach into the
  • 00:02:47
    computers that run them. Now the other
  • 00:02:49
    thing is there are a lot of legacy
  • 00:02:52
    systems that are still used in nuclear
  • 00:02:55
    weapons. Okay? And that's literally by
  • 00:02:57
    design. Having things that are low tech
  • 00:02:59
    makes them ultimately actually less
  • 00:03:01
    vulnerable to modern methods. So you
  • 00:03:03
    don't have to really worry. And just to
  • 00:03:06
    give you a final action over here,
  • 00:03:08
    there's things like permissive action
  • 00:03:10
    action links, which are actually
  • 00:03:12
    failsafe electronic locks. And of
  • 00:03:14
    course, you need more than one person to
  • 00:03:16
    fire nuclear weapons. Okay? So, trust me
  • 00:03:19
    when I say this. There are a lot of
  • 00:03:21
    actual safeguards we as human beings
  • 00:03:24
    have made to prevent ourselves from
  • 00:03:26
    blowing each other up. And the reason we
  • 00:03:28
    do it is because we've made nuclear
  • 00:03:30
    weapons. They can end lives.
  • 00:03:32
    Okay? You got to be real careful with
  • 00:03:34
    the nuclear weapons you make. Now, I've
  • 00:03:36
    known that some people have said, "But
  • 00:03:38
    Muda, I heard they ran nuclear weapons
  • 00:03:40
    on floppy discs." According to Sachs,
  • 00:03:43
    they've moved to a highly secure
  • 00:03:45
    solidstate digital storage solution. And
  • 00:03:48
    highly secure is all you need to hear in
  • 00:03:50
    this story. So, you might be like,
  • 00:03:51
    "Well, Muda, if they didn't hack the
  • 00:03:53
    nuclear weapons, then what did they hack
  • 00:03:55
    out of the actual nuclear agency?" Well,
  • 00:03:58
    according to the actual nuclear agency,
  • 00:04:00
    it was really a small number of systems
  • 00:04:02
    that were impacted. However, this is
  • 00:04:05
    part of a much larger hack called the
  • 00:04:07
    Microsoft SharePoint hack or the tool
  • 00:04:10
    chain hack. And for anybody that doesn't
  • 00:04:12
    know what's going on here, as of like
  • 00:04:13
    the last couple days, around 400
  • 00:04:17
    institutions
  • 00:04:19
    were actually hacked internationally.
  • 00:04:21
    Okay, this is a pretty massive hack
  • 00:04:23
    that's been happening. So, one of the
  • 00:04:25
    chief boys on the actual update over
  • 00:04:27
    here, some of the chief people from
  • 00:04:28
    Microsoft literally did say that there
  • 00:04:30
    were multiple threat actors, but they
  • 00:04:33
    assessed that one actor for the early
  • 00:04:35
    exploitation is a Chinese nexus threat
  • 00:04:38
    actor. Now, what is a nexus threat
  • 00:04:40
    actor? Well, a nexus threat actor is
  • 00:04:42
    somebody that basically is affiliated
  • 00:04:44
    with the government. Remember, cyber
  • 00:04:46
    warfare is pretty much legal as long as
  • 00:04:49
    the government backs you. Okay? So
  • 00:04:51
    whether you're an American NSA hacker,
  • 00:04:54
    whether you're some Russian hacker,
  • 00:04:56
    whether you're an Iranian hacker or a
  • 00:04:57
    Chinese hacker, a North Korean hacker,
  • 00:05:00
    ain't no way you're getting
  • 00:05:01
    extradited for hacking some of the
  • 00:05:03
    biggest players in the game. But I think
  • 00:05:05
    we're at a point where maybe it should
  • 00:05:07
    be considered somewhat of a war crime
  • 00:05:09
    when you're trying to breach into the
  • 00:05:11
    nuclear military weapons apparatus of a
  • 00:05:15
    rival country. So how did this
  • 00:05:18
    hack actually happen, ladies and
  • 00:05:19
    gentlemen? Well, through something known
  • 00:05:21
    as Microsoft SharePoint. Now, for
  • 00:05:23
    anybody that doesn't know what
  • 00:05:24
    SharePoint is, to give you a quick
  • 00:05:26
    understanding of how SharePoint works is
  • 00:05:29
    it's basically a content management
  • 00:05:31
    system and an internet platform. What an
  • 00:05:34
    internet platform is is people actually
  • 00:05:36
    in companies or corporate areas or even
  • 00:05:38
    locally can make their own internal
  • 00:05:40
    internet with things like website
  • 00:05:42
    portals, document management, a lot of
  • 00:05:44
    collaboration tools. You can make your
  • 00:05:46
    own local internet. Okay, your internet
  • 00:05:48
    if you will where again all of these
  • 00:05:51
    websites should in theory be accessible
  • 00:05:53
    internally or you can use them as part
  • 00:05:54
    of your big business. So for instance,
  • 00:05:57
    if you want to get access to something
  • 00:05:59
    like SharePoint for instance, you can go
  • 00:06:01
    to Microsoft and you can purchase plans
  • 00:06:04
    as low as $6.80
  • 00:06:06
    Canadian per user each month. And of
  • 00:06:10
    course some companies go at 17 bucks a
  • 00:06:12
    user a month. Sometimes if you want
  • 00:06:14
    like Microsoft's AI, you can pay 40
  • 00:06:17
    bucks per user a month. And you might be
  • 00:06:19
    like, who's willing to do that? Well, in
  • 00:06:21
    this case, it was a lot of organizations
  • 00:06:23
    like the United States government, okay?
  • 00:06:25
    For them, burning money is no
  • 00:06:27
    problem, okay? It's just ask them to
  • 00:06:29
    spend $100 million. They will.
  • 00:06:32
    Now, I want to just stress and say that
  • 00:06:34
    this wasn't Microsoft actually getting
  • 00:06:37
    hacked. So, there are two key
  • 00:06:39
    differences here. There is SharePoint
  • 00:06:41
    online which is what we just looked at
  • 00:06:43
    where you can go to Microsoft and buy a
  • 00:06:45
    subscription for a cloud version of
  • 00:06:47
    SharePoint or there is on premise. Now I
  • 00:06:50
    want to specifically say the onremise
  • 00:06:52
    version actually got hacked. So for
  • 00:06:54
    anybody that doesn't know the difference
  • 00:06:56
    when you go to Microsoft you can
  • 00:06:57
    actually download something like
  • 00:06:59
    SharePoint 2019 and you can download
  • 00:07:01
    this install this and actually try it
  • 00:07:03
    yourself for like 180 days. They give
  • 00:07:05
    you a whole uh user key for it and
  • 00:07:07
    everything and you can actually do
  • 00:07:09
    SharePoint stuff on your local system.
  • 00:07:12
    So you can run things on your local
  • 00:07:14
    devices, your local servers and they
  • 00:07:16
    never touch Microsoft. Okay, it's a
  • 00:07:18
    locally self-hosted version of
  • 00:07:20
    SharePoint. Now again when it came to
  • 00:07:22
    the Department of Energy, the nuclear
  • 00:07:25
    division got hacked with the SharePoint
  • 00:07:27
    on premise. So that's why they actually
  • 00:07:30
    had a limited number of systems. They
  • 00:07:32
    also had a lot of good cyber security
  • 00:07:34
    practice. So realistically they were
  • 00:07:36
    able to snap onto this pretty quickly,
  • 00:07:38
    capture it and lock it down and start
  • 00:07:40
    cleaning it pretty rapidly. A lot of
  • 00:07:42
    this hack just happened very rapidly
  • 00:07:44
    across the board. Everyone's kind of
  • 00:07:46
    just trying to survive it right now. But
  • 00:07:49
    there are other organizations that got
  • 00:07:50
    hacked like the US education department.
  • 00:07:53
    You had Florida's Department of Revenue
  • 00:07:55
    and you had plenty of other government
  • 00:07:57
    systems that got effectively hit and
  • 00:07:59
    that is something that is very
  • 00:08:01
    worrisome. So the actual attack that
  • 00:08:03
    happened was something that is now
  • 00:08:05
    categorized as CVE 202553770.
  • 00:08:10
    So this is the deserialization of
  • 00:08:12
    untrusted data in on premises SharePoint
  • 00:08:15
    servers allowing an unauthorized hacker
  • 00:08:17
    to execute code over a network. Now,
  • 00:08:20
    that's a lot of nerd speak, but
  • 00:08:22
    basically what's happening is they were
  • 00:08:24
    able to use a post request and using a
  • 00:08:27
    vulnerability in the SharePoint server,
  • 00:08:29
    they were able to get SharePoint to
  • 00:08:31
    process something in an untrusted manner
  • 00:08:33
    and basically run remote code. Now, if
  • 00:08:36
    you've ever heard of an RCE, you
  • 00:08:38
    probably have if you watch my channel
  • 00:08:40
    with virus investigations and all the
  • 00:08:41
    cyber security I talk about, it
  • 00:08:43
    allows a hacker to run code on
  • 00:08:46
    somebody's system. And that code could
  • 00:08:48
    be anything, okay? It could be code that
  • 00:08:50
    allows them to persist for a long time
  • 00:08:52
    on a server, move laterally, or grab a
  • 00:08:55
    whole bunch of information. Remember,
  • 00:08:57
    the people who are discovering and doing
  • 00:08:59
    these kind of hacks are some pretty
  • 00:09:01
    scary types of people. Now, this was
  • 00:09:03
    given a code of 9.8, which basically
  • 00:09:05
    means this needs to be patched
  • 00:09:08
    ASAP. That's what that code means. Now,
  • 00:09:12
    to give you an idea, this was something
  • 00:09:13
    also known as a zero day. Now, for
  • 00:09:15
    anybody that doesn't know what a zero
  • 00:09:17
    day is, a zero day is effectively a hack
  • 00:09:19
    that people have discovered. A lot of
  • 00:09:21
    malicious guys, in this case, allegedly
  • 00:09:24
    the Chinese Nexus group, but really it
  • 00:09:26
    could be anyone. These people discovered
  • 00:09:28
    a hack. They did not report it to
  • 00:09:30
    Microsoft. They didn't report it to
  • 00:09:31
    anybody. They kind of waited until they
  • 00:09:33
    could use this to basically attack a
  • 00:09:36
    whole bunch of organizations. So rapidly
  • 00:09:38
    this exploit was used against 400
  • 00:09:41
    agencies, nuclear group included, and uh
  • 00:09:44
    yeah, everyone just kind of faced the
  • 00:09:46
    whiplash. Now Microsoft came in and
  • 00:09:49
    obviously they released a bunch of
  • 00:09:50
    patches which they highly
  • 00:09:53
    recommend, highly recommend you install
  • 00:09:56
    them onto your systems, especially if
  • 00:09:58
    you're running that SharePoint locally.
  • 00:10:00
    And if you're not running it locally,
  • 00:10:02
    move that into the cloud as
  • 00:10:04
    Microsoft would recommend because the
  • 00:10:06
    cloud stuff, it's all totally fine. So,
  • 00:10:08
    how did this exploit basically work? And
  • 00:10:11
    you can actually try this for yourself
  • 00:10:13
    and sort of lab it out if you want.
  • 00:10:15
    Basically, you can make three different
  • 00:10:17
    virtual machines and you can grab
  • 00:10:18
    SharePoint and provided you don't update
  • 00:10:20
    it obviously to the latest patches,
  • 00:10:22
    which would mitigate this actual
  • 00:10:24
    malware, you can kind of examine how
  • 00:10:27
    this attack would work, you know, in
  • 00:10:28
    theory. So to give you an idea that zero
  • 00:10:31
    day when it was exploited and again it
  • 00:10:33
    could have been organizations like linen
  • 00:10:35
    typhoon, it could have been violet
  • 00:10:37
    typhoon. So to give you an idea how this
  • 00:10:40
    kind of works from a technical level is
  • 00:10:42
    the attacker would send a post request
  • 00:10:45
    to the endpoint of that onremise
  • 00:10:48
    SharePoint server and that code could
  • 00:10:50
    look something similar to layout 15 tool
  • 00:10:53
    panes aspects display mode edit. Now the
  • 00:10:56
    trick here is the header for it. The
  • 00:10:59
    referer header should basically be
  • 00:11:01
    setting to layout/signout.aspix.
  • 00:11:05
    So for having a spoofed header for
  • 00:11:07
    instance, what SharePoint will do is it
  • 00:11:09
    will think it comes from a signed out
  • 00:11:11
    page and therefore it bypasses from what
  • 00:11:14
    I understand some level of
  • 00:11:15
    authentication. Now once you've bypassed
  • 00:11:18
    a level of authentication, you can send
  • 00:11:20
    a malicious payload and it looks
  • 00:11:23
    something similar to this as a post
  • 00:11:25
    request. Now once that is effectively
  • 00:11:28
    sent to the actual individual at
  • 00:11:30
    toolpane.aspix,
  • 00:11:32
    SharePoint deserializes all of that
  • 00:11:35
    untrusted data in an incredibly insecure
  • 00:11:38
    manner that effectively will trigger a
  • 00:11:40
    remote code execution and then it allows
  • 00:11:43
    the hacker to basically do whatever they
  • 00:11:45
    want. they run the code that they want
  • 00:11:47
    and they can do whatever nasty that
  • 00:11:49
    they want to do. Now, obviously, this
  • 00:11:51
    is dangerous because you never need
  • 00:11:53
    to log into anything. It's completely
  • 00:11:56
    unauthenticated. And a lot of those
  • 00:11:58
    hackers after they've stolen the actual
  • 00:12:01
    keys involved can basically remain
  • 00:12:03
    incredibly stealthy. And again,
  • 00:12:05
    thankfully, this was only for the
  • 00:12:07
    onremise servers. I believe a lot of
  • 00:12:09
    people still have moved up to the
  • 00:12:11
    online cloud side which you know after
  • 00:12:14
    today after what has just happened. Yeah
  • 00:12:17
    I think a lot more people are going to
  • 00:12:19
    be paying those subscription fees to
  • 00:12:20
    Microsoft just to get that just to get
  • 00:12:23
    off the premise especially if this kind
  • 00:12:25
    of stuff exists. Now luckily this is a
  • 00:12:28
    perfect proof of concept made by got
  • 00:12:31
    ocve all right where they can actually
  • 00:12:33
    show you how this stuff kind of works in
  • 00:12:35
    a more code manner. Okay, so they again
  • 00:12:38
    have entire sections where they check if
  • 00:12:40
    the tool pane ASPX is accessible. They
  • 00:12:42
    send a malicious web part payload to
  • 00:12:45
    tool pane.aspix. Okay, so you can see
  • 00:12:48
    layout 15 tool pane aspects, display
  • 00:12:50
    edit and yada yada yada. But yeah, it's
  • 00:12:52
    pretty bad ladies and gentlemen when
  • 00:12:55
    again this level of attack can happen.
  • 00:12:58
    Now, thankfully in a lot of this
  • 00:13:00
    situation, especially when it came to
  • 00:13:01
    the nuclear agency, the NNSA, they never
  • 00:13:05
    had to worry too much because a small
  • 00:13:07
    amount of those on premise SharePoint
  • 00:13:09
    servers were actually hit. And
  • 00:13:11
    thankfully, nothing classified, nothing
  • 00:13:13
    super duper sensitive actually ended up
  • 00:13:15
    getting hacked in here. In fact, from
  • 00:13:17
    what I understand, the government does
  • 00:13:18
    primarily use those 365 cloud services
  • 00:13:22
    as much as they can. So, that actually
  • 00:13:24
    probably was one of the big things that
  • 00:13:26
    ended up saving them. And again, just
  • 00:13:28
    having good practice for your cyber
  • 00:13:30
    security is always going to help you
  • 00:13:32
    down the road. It's one of the things
  • 00:13:33
    when I've talked about like, you know,
  • 00:13:34
    as long as you have things like password
  • 00:13:36
    managers, your two-factor
  • 00:13:37
    authentications, and again, I'm speaking
  • 00:13:39
    for like a very local user. As long as
  • 00:13:42
    you have good practices on setting that
  • 00:13:44
    kind of up and keeping it
  • 00:13:46
    maintained, which honestly isn't really
  • 00:13:48
    all that much work. A lot of it is just
  • 00:13:51
    what you do initially. You can kind of
  • 00:13:52
    set and forget in some cases. you
  • 00:13:55
    literally don't have to worry when
  • 00:13:56
    everything gets hacked. That's one of
  • 00:13:57
    the reasons why when we talked about
  • 00:13:59
    that 16 billion password story, you
  • 00:14:02
    know, a lot of it was just a it was a
  • 00:14:03
    nothing burger. And second of
  • 00:14:06
    all, as long as you followed good
  • 00:14:08
    practices, you literally could just fall
  • 00:14:10
    back asleep and never worry about your
  • 00:14:12
    because as long as you practice
  • 00:14:14
    good things, you're fine. And that's
  • 00:14:16
    kind of at a bigger scale what saved the
  • 00:14:19
    government. But to me, what's really
  • 00:14:20
    just scary about this is like all these
  • 00:14:22
    organizations are targeting a lot of
  • 00:14:25
    critical infrastructure. You know, this
  • 00:14:27
    isn't the only thing happening to us.
  • 00:14:29
    Like I was reading like the other week
  • 00:14:31
    that Singapore was going through a very
  • 00:14:33
    concentrated level of testing and cyber
  • 00:14:36
    warfare that's happening against their
  • 00:14:38
    critical infrastructure. What just
  • 00:14:40
    scares the out of me is obviously
  • 00:14:42
    how much these things are getting
  • 00:14:43
    targeted because, you know, for the last
  • 00:14:45
    couple years, you know, when we looked
  • 00:14:46
    at things like Colonial Pipeline, Solar
  • 00:14:48
    Winds, a lot of stuff, a lot of these
  • 00:14:50
    hacking groups are now going after
  • 00:14:51
    things that if they hack energy grids,
  • 00:14:54
    if they hack logistics, if they hack
  • 00:14:56
    critical infrastructure like
  • 00:14:58
    communications, it literally could be
  • 00:15:00
    stuff that can actually cost human
  • 00:15:02
    lives. Obviously, right? You know,
  • 00:15:04
    because if you take away people's power,
  • 00:15:06
    if you take away people's access to
  • 00:15:08
    resources, if you take away
  • 00:15:10
    communication, you probably are also
  • 00:15:12
    impacting things like hospitals, you
  • 00:15:14
    know, nursing care, a lot of things
  • 00:15:16
    where again these critical
  • 00:15:18
    infrastructures are are are literally
  • 00:15:20
    the the thread that holds people's lives
  • 00:15:23
    in balance. That is the that
  • 00:15:25
    scares me. You know, obviously,
  • 00:15:28
    thank God that the Department of Energy
  • 00:15:30
    has kept our nuclear weapons far away
  • 00:15:32
    from hackers, and the thankfully that
  • 00:15:35
    will forever be the case. But when it
  • 00:15:37
    comes to all the other stuff as well
  • 00:15:39
    too, a lot of the other organizations
  • 00:15:41
    that are in here that probably don't
  • 00:15:43
    have that level of IT support, that
  • 00:15:46
    level of cyber security, like
  • 00:15:47
    cleanliness, that's the you have to
  • 00:15:50
    watch out for, okay? Because ultimately
  • 00:15:52
    when the blackouts start happening and
  • 00:15:54
    the you know, uh, when when the
  • 00:15:56
    really hits the fan, okay, these
  • 00:15:58
    are the organizations that these
  • 00:15:59
    scumbags are going to target first. And
  • 00:16:01
    that's the stuff that freaks me, right?
  • 00:16:03
    Like in a normal world, this should
  • 00:16:05
    be an act of war. But we live in a
  • 00:16:07
    society where it just this stuff just
  • 00:16:09
    happens and we just keep pointing
  • 00:16:11
    fingers with nothing like actually being
  • 00:16:14
    resolved. You know, maybe we as
  • 00:16:16
    countries have to probably come together
  • 00:16:17
    and and and have some level of of they
  • 00:16:20
    call it the uh what what is that? Um
  • 00:16:23
    what is the what is the U the Geneva
  • 00:16:25
    Conventions, right, for like warfare.
  • 00:16:27
    Maybe we need to have something updated
  • 00:16:29
    to prevent each other from like cyber
  • 00:16:31
    attacking all the time because
  • 00:16:33
    ultimately what they're targeting
  • 00:16:35
    actually has some serious implications.
  • 00:16:37
    This is not some no nothing story. We
  • 00:16:40
    can laugh and be thankful that the
  • 00:16:42
    nuclear arsenal is safe and sound, but
  • 00:16:44
    we still should be vigilant and a little
  • 00:16:46
    cautious about why the all of our
  • 00:16:48
    critical infrastructure is getting
  • 00:16:50
    targeted on a day-to-day basis. That
  • 00:16:52
    is scary. Anyways, if you like what
  • 00:16:54
    you saw, please like, comment, and
  • 00:16:55
    subscribe. Dislike if you dislike it. If
  • 00:16:57
    you learned something, let me know in
  • 00:16:58
    the comment section below. I am
Etiquetas
  • cybersecurity
  • nuclear weapons
  • NNSA
  • SharePoint
  • hack
  • vulnerability
  • critical infrastructure
  • zero-day exploit
  • government
  • cyber warfare