Critical digital infrastructure: Why societies are becoming so vulnerable to cyberattacks |Techtopia

แชร์
ฝัง
  • เผยแพร่เมื่อ 6 ก.ค. 2022
  • For weeks, a cyberattack paralyzed the German district of Anhalt-Bitterfeld in 2021, bringing its whole administration to a standstill. It was a stark illustration of how hackers can knock out entire communities in milliseconds - and how digital technology has become vital for running our societies.
    Such “critical digital infrastructure” helps boost efficiency. But it also makes communities ever more vulnerable to hacking. And attacks are on the rise. In this episode of Techtopia, DW Chief Technology Correspondent Janosch Delcker investigates how a criminal industry makes billions by taking computers hostage - and how governments can use similar methods as a political weapon.
    Subscribe: th-cam.com/users/deutsche...
    For more news go to: www.dw.com/en/
    Follow DW on social media:
    ►Facebook: / deutschewellenews
    ►Twitter: / dwnews
    ►Instagram: / dwnews
    Für Videos in deutscher Sprache besuchen Sie: / dwdeutsch

ความคิดเห็น • 85

  • @lioraselby5328
    @lioraselby5328 ปีที่แล้ว +24

    videos like this are good motivation for me to keep studying computer networking and cybersecurity

    • @justiceperez3087
      @justiceperez3087 ปีที่แล้ว +4

      I hope it goes well m8

    • @money3076
      @money3076 ปีที่แล้ว +1

      Thank you for your comments..write ✍️ to me👆👆👆

    • @money3076
      @money3076 ปีที่แล้ว

      @@justiceperez3087 Thank you for your comments..write ✍️ to me👆👆👆

    • @ChezYusuf
      @ChezYusuf ปีที่แล้ว +3

      We can safe humanity by contributing our quarter in protecting our networks and information structure. I’m also an IT student

    • @zaeltrus
      @zaeltrus ปีที่แล้ว +3

      I am a final year computer science student, I wanted to pick VR development as my specialisation. My brother landed me a trainee position at a cyber security firm, since then, I realised this is my calling. And since then I am paranoid about everything I do on and offline 😂

  • @twestgard2
    @twestgard2 ปีที่แล้ว +18

    The gasoline-related attack mentioned at 12:10 only affected the company’s billing system. The actual gasoline system was perfectly safe and untouched the entire time. It was perfectly possible to distribute gasoline the entire time. The only thing affected was the ability to profit from it.

    • @anisraiss
      @anisraiss ปีที่แล้ว +3

      they cant say that because it is not fearmongering

    • @julianbrown3100
      @julianbrown3100 ปีที่แล้ว +1

      While that's technically true, there was still a fear that the attack could spread to the operational tech. Also, it was kind of interesting that they only needed to stop the billing system in order to stop the flow of gas.

    • @twestgard2
      @twestgard2 ปีที่แล้ว +1

      @@julianbrown3100 We should look very skeptically at the phrase “there was still a fear that…” because it puts weight behind unsubstantiated fears. If there’s some objective cause to believe that there’s the technical capability to attack the gasoline itself, that’s important. If there’s reason to think they wanted to or were willing to, that’s important. But just treating fears that aren’t connected to reality as if they deserve serious response is how you get wild overreactions and in foreign policy the consequences of that can be extremely bad.
      Also the fact that the profitability of a private company can cause the loss of crucial infrastructure tells us that we have a critical infrastructure weakness in allowing private profits to carry more than they should. We can build defenses by, for example, having an emergency purchase/sale agreement in place in the event of an emergency. Something that would kick in as soon as the private company loses its ability to provide basic necessities in the ordinary course of business. That way the amount of loss is lessened.

    • @julianbrown3100
      @julianbrown3100 ปีที่แล้ว +1

      @@twestgard2 It's been quite a while since I looked into this case, but if I remember correctly, there was no microsegmentation to separate the OT from other systems. So, yes, the fear that the attack could spread to the OT was (very much based in reality and) material during Colonial's mitigation and remediation efforts.
      The threat actors in question ultimately regretted the attack, since it brought too much attention to them. But it would be foolish to think that we could trust in future threat actors' goodwill or good intentions in staying away from critical infrastructure. I'm not usually one to fear-monger but this particular case should serve as a wakeup call - and it did, as we saw from the many, many white house/CISA statements on cybersecurity in critical infrastructure, supply chains, and private enterprise to come out in its wake.
      Your suggestion for an emergency purchase agreement sounds interesting. I'm not sure if the niggly practicalities would work out, but it could ensure that 'the spice flows.'

    • @twestgard2
      @twestgard2 ปีที่แล้ว

      @@julianbrown3100 yeah, my point is not that cyber threats don’t exist or aren’t serious. They do exist and they are serious.
      My point is that our choices about how to build and distribute the critical infrastructure were poorly conceived, in two specific ways: one is that we overly rely on privatization and the required profits of that system are what shut down the system. We can make different choices there, such as an emergency taking when and if the for-profit system fails to function. The second thing is that we concentrate infrastructure in a misguided concept of efficiency, which is the direct opposite of safety redundancy in engineering. The gasoline shortage could only happen because there was one company that was too big to fail and that’s a structural vulnerability that we are building into our own armor. We should break up monopolies as a matter of national security.

  • @willaumep
    @willaumep ปีที่แล้ว +10

    They do not need for a user to type their credential, most of the time they have done some reconnaissance and they have apayload designed to exploit know vulnerabilities that the target is likely to have. just going to a web site or opening the attachement can be enough to download that payload.

    • @money3076
      @money3076 ปีที่แล้ว

      Thank you for your comments..write ✍️✍️ to me👆👆

    • @thekaiser4333
      @thekaiser4333 ปีที่แล้ว

      What is very suspicious is, that neither the governments, nor the police, nor the secret services and most suspicious, that investigative journalists do never identify the cyber criminals nor have them arrested unless it is convenient for them privately and personally.

  • @phil20_20
    @phil20_20 ปีที่แล้ว +4

    Not like the days of the closed system I trained for. You weren't connected to the internet, just a private network - a REAL private network.

  • @jesselima_dev
    @jesselima_dev ปีที่แล้ว +2

    Great short documentary.
    We need to use the best technologies. In fact, we must use the best possible tools to mitigate risks. However, it's all gone if we do not train everyone on how to avoid the threats.
    A few years ago, I heard many times, "All companies will become IT companies or will be left behind". Now, those companies also need to be security companies by design. Security tools, processes and personal training are a must-have for any company. As a company, if you do not invest time and money continuously in tools, processes and personal training, then you (the company) are significantly at risk.

    • @21stcenturyscots
      @21stcenturyscots ปีที่แล้ว +1

      "we must use the best possible tools to mitigate risks"
      Yes. And you must develop those tools!
      Go to work now! You must save the world!

    • @jesselima_dev
      @jesselima_dev ปีที่แล้ว

      @@21stcenturyscots Yes. I am a developer!

  • @nathanngumi8467
    @nathanngumi8467 ปีที่แล้ว +4

    The future is digital infrastructure interconnectivity, and cyber security will be critical going forward.

  • @CAStone-kq4md
    @CAStone-kq4md ปีที่แล้ว +3

    A simple solution would be to disconnect from the internet .

  • @Texasdav1
    @Texasdav1 ปีที่แล้ว

    DW documentaries, short and long, are always so well done. It is easy to follow the storyline--you keep your viewers engaged from beginning to end.

  • @fandyllic1975
    @fandyllic1975 ปีที่แล้ว +4

    I really good video, but watchers should be skeptical of some of the solutions. There was an implication in the video that companies and governments should assume cyber attacks will succeed and possibly focus effort and money on hiring cybersecurity professionals to clean up messes more than prevent attacks. People should be aware that cybersecurity companies may be motivated to act like pharmaceutical companies and push cure over prevention, since cure will be more profitable. Tools and resources should consider prevention tactics like secure browsers and zero trust models at the user level as well as monolithic backend, data center solutions.

  • @penguin902
    @penguin902 ปีที่แล้ว +2

    12:20 This would be very hard to do. That's like saying. "Robbing a bank is bad but if you try to rob 10 banks at once it'll be worse!". The bigger the crime the more people involved and the higher the chance of leak or capture before it starts.

  •  ปีที่แล้ว +1

    At the same time costs for getting certified in IT is redicules expensive. So the costs for schooling and reschooling should come down to get more IT workers. I get companies want the best of the best but they need to settle for more average workers than a few of the best.

  • @GaasubaMeskhenet
    @GaasubaMeskhenet ปีที่แล้ว +2

    remove the motivating factor.
    abolish money

  • @Spitfire_Cowboy
    @Spitfire_Cowboy ปีที่แล้ว +1

    Mmm kali is such an awesome learning tool. Jack the ripper was da bomb back in the day.
    Nowadays, its easier to use a RaspberryPi with a base debian install an installing what tools you need.
    Remember: if you find something, report it to the relevant operators. Never use what you find for malicious purposes.

  • @narkelnaru2710
    @narkelnaru2710 ปีที่แล้ว +1

    I expected better information on the perpetrators.

  • @AliceAmane
    @AliceAmane ปีที่แล้ว +2

    Wait, does that mean IT technicians are the soldiers of tomorrow?

  • @ClintonGonsalves-ed9zw
    @ClintonGonsalves-ed9zw ปีที่แล้ว +1

    This is scary since this can devastate economies and can also stop major trade of the countries. Maybe further development in Quantum computing could solve this problem. But it is a two sided coin indeed.

  • @magatism
    @magatism ปีที่แล้ว +1

    I fear for the transatlantic cables...

  • @linmal2242
    @linmal2242 ปีที่แล้ว +1

    Cut the hard lines!

  • @casparcoaster1936
    @casparcoaster1936 ปีที่แล้ว

    Damn.

  • @aarongiorno6580
    @aarongiorno6580 ปีที่แล้ว +2

    Problem is you just use all that tec on your own people.

  • @daddy9132
    @daddy9132 ปีที่แล้ว +3

    I also wants be an ethical hacker

    • @money3076
      @money3076 ปีที่แล้ว

      Thank you for your comments..write ✍️ to me👆👆👆👆

  • @HL65536
    @HL65536 ปีที่แล้ว

    So they had no backup and no anti-phishing training. Utter incompetence.

  • @gamlerik1
    @gamlerik1 ปีที่แล้ว +2

    The cannary in the coal mine. :D

  • @janein6491
    @janein6491 ปีที่แล้ว

    07:22 - 07:33 "We lost all Mails from the last 20 years." ... ooooh, how I´d love to hear that..I´d break out the champaign and stop working. For every request I´d shrug my shoulders and say something like: "I´d love to help, but you know...the emails..." and I´d let my voice trail of...

  • @bcaominh
    @bcaominh ปีที่แล้ว

    I guess the Landkreis didn't get the "digital transformation" memo...

  • @yellowbhee7220
    @yellowbhee7220 ปีที่แล้ว

    Ration should star soon

  • @watanglipuhadjar2654
    @watanglipuhadjar2654 ปีที่แล้ว +1

    canary in the coal mine.. lesson from mistakes, over and over.

  • @krishnkant9477
    @krishnkant9477 ปีที่แล้ว +1

    I have zero idea how to protect myself from an hacker but I have done a basic thing.
    I keep two different sim cards, one in a smartphone and another one in a tablet.
    The smartphone is used for contacting with others, via phone calls and social media platforms but there is no critical data stored in the smartphone.
    While whatever essential files and documents I have to save are saved in the tablet and the number of the simcard in Tablet is completely private. There is no transfer of files, folders and other information from the tablet with other devices, but only by my smartphone.

    • @money3076
      @money3076 ปีที่แล้ว

      Thank you for your comments..write ✍️ to me👆👆👆

    • @urimtefiki226
      @urimtefiki226 ปีที่แล้ว

      Simply don't do anything, whatever you do you are in his hands. The more you try to do something the more you encourage him to torture and steal your work.

  • @meejinhuang
    @meejinhuang ปีที่แล้ว +3

    Cyberattacks shouldn't be so common. It's poor system architecture and software. One day only trusted IPs will be able to access critical networks or even commercial websites.

    • @davidhiggins2804
      @davidhiggins2804 ปีที่แล้ว

      Well that's not entirely true some well designed software can still have bugs/ vulnerabilitys

  • @peteranderson3956
    @peteranderson3956 ปีที่แล้ว

    Because Germany thought the Russians were their friends? Increase your defense budget already for goodness sake!

  • @MrBeeMAD
    @MrBeeMAD ปีที่แล้ว +1

    Хакеры взломали систему. Обнаружили что оно говняно, и решили делиться своими интересами.

    • @money3076
      @money3076 ปีที่แล้ว

      Write ✍️✍️ to me 👆👆

  • @elizeleroux6388
    @elizeleroux6388 ปีที่แล้ว

    now we desperate need men to catch hackers

  • @rdsc.455
    @rdsc.455 ปีที่แล้ว

    PEGASUS, although all know about Pegasus its origin, its sale its purchaser and its misuse even with some high political entities being its victims no one have been doing or say cannot do anything to prevent it, to stop its sale and penalise its producers.

  • @rainyang8101
    @rainyang8101 ปีที่แล้ว

    interesting

  • @bunnyniyori6324
    @bunnyniyori6324 ปีที่แล้ว

    I won't mind being forced to mail a letter, use physical currency and rely on a landline. I don't care if cashiers need to actually manually input prices and count change. And being unable to talk on FB or watch TH-cam won't kill me. I seriously don't care if I can't buy it online. And too bad if you have to actually get dressed and go to work. Life wasn't better in 1970, it was just less complicated. And I wouldn't mind a little simpler, to be honest.

  • @86MarcusP
    @86MarcusP ปีที่แล้ว

    😔

  • @hate.doublespeak991
    @hate.doublespeak991 ปีที่แล้ว +1

    Give Klaus Shwabb his great reset!

  • @J.R.Graham
    @J.R.Graham ปีที่แล้ว

    Great true story,book title-"Cowboy Mafia "-

  • @jasonrose77
    @jasonrose77 ปีที่แล้ว

    Presenter doesn't blink much. Sort of freaky once you notice it. 😁

  • @rainyang8101
    @rainyang8101 ปีที่แล้ว

    so that's another reason why you can't do anything.

  • @sizzla123
    @sizzla123 ปีที่แล้ว

    Good episode
    Proverbs 9:10 The fear of the LORD is the beginning of wisdom, and knowledge of the Holy One is understanding.

  • @CSS-in-Points
    @CSS-in-Points ปีที่แล้ว +3

    101th like, 22th comment.

  • @dubistverrueckt
    @dubistverrueckt ปีที่แล้ว +1

    Hype and fluff to distract from REAL issues like keeping the nuclear reactors running, and restarting the rest. I would think that staying warm in the winter and keeping factories running are more important!

    • @davidhiggins2804
      @davidhiggins2804 ปีที่แล้ว +1

      Cyber security is extremely important without it all modern system will fall

  • @szalailaci3722
    @szalailaci3722 ปีที่แล้ว

    Not suitable for listening As a podcast. I won't.

  • @anisraiss
    @anisraiss ปีที่แล้ว

    preparing for the wef attack

  • @deborahwhy3637
    @deborahwhy3637 ปีที่แล้ว +1

    ◇late late late late news! ◇yet helpful to the "clueless global masses", ◇who truly probably won't see this video; don't care; and who are too "lazy minded" to read, & educate themselves, about the "out of control" standalone attacks, or well- connected & organized; vicious criminal network threats. ☆danke◇🖖🏽

    • @money3076
      @money3076 ปีที่แล้ว

      Thank you for your comments..write ✍️ to me👆👆👆👆

  • @AlgoNudger
    @AlgoNudger ปีที่แล้ว

    Cybersecurity is a bs! 🤣

    • @davidhiggins2804
      @davidhiggins2804 ปีที่แล้ว

      A bs ?

    • @AlgoNudger
      @AlgoNudger ปีที่แล้ว

      @@davidhiggins2804 how you protect your systems from full-chain, 0-click, 0-day with persistence', kernel code execution attack?

  • @cinitapatrick2174
    @cinitapatrick2174 ปีที่แล้ว

    Predictive programming coming ..coming soon
    World economic forum.
    Social credit biometric ids brave new world.
    Yet I see so many sheeples here cheering 😳😳🤦‍♀️🤦‍♀️

  • @ABCXYZ-jk8me
    @ABCXYZ-jk8me ปีที่แล้ว +2

    Are You Born-again ?