Just wait until they start hacking utilities: water and electricity…
It’s gonna be real spooky.
Why the fukk are any of these systems even capable of connecting to the internet?
Dude where have you been?
https://www.thecoli.com/threads/hackers-attempt-to-poison-water-supply-in-florida-fyi.835075/
Some of y’all aren’t going to make it. Clueless asf.
While you were distracted by the chronicles of the “Gorilla Glue Girl”, shade room shenanigans and the Super Bowl - hackers tried to start a biochemical attack on Florida’s water supply.
Hacker tried to contaminate Florida city's water supply, sheriff says
The attack occurred 20 miles from the site of the Super Bowl, two days before the game was to be played.
Hacker tried to contaminate Florida city's water supply, sheriff says
“Drink Lye and die” was the theme behind this.
A hacker gained remote access to a Florida city's water treatment plant in an attempt to contaminate the city's supply of water with a harmful chemical, authorities said Monday.
The unknown hacker breached the computer system at the Oldsmar water plant on Friday and briefly increased the amount of sodium hydroxide in the water supply from about 100 parts per million to 11,100 parts per million, Pinellas County Sheriff Bob Gualtieri said during a news conference.
Back in December 2020:
Electric utilities are grappling with the fallout from one of the most significant cyber intrusions in years, as the far-reaching impact of a sophisticated hacking campaign comes into sharper focus.
Four days after the supply chain cyberattack on IT service provider SolarWinds was revealed, details on its global victims — from federal agencies to oil and electricity companies — are still emerging (
Energywire, Dec. 15).
CYBERSECURITY: Huge federal hack ripples across energy industry
“"Any organization that says,
'Yep, we got it solved. It's all good,' in the next 90 days: I would respectfully disagree," said Jim Guinn, global managing director for cybersecurity in energy, chemicals, utilities and mining at Accenture.
The scope of customers that used SolarWinds ranges from government agencies to Fortune 500 manufacturers and power utilities. In an SEC filing, SolarWinds
estimated that 18,000 or fewer customers downloaded the malicious update containing the Sunburst malware.
According to federal records, the Federal Energy Regulatory Commission and the Bureau of Ocean Energy Management had contracts with SolarWinds in recent years. It's not clear if the Orion product was used and if those agencies downloaded the malicious update. The Department of Energy's Sandia and Oak Ridge national laboratories also used SolarWinds, according to a now-deleted
webpage listing the Austin, Texas-based IT firm's customers.
DOE did not respond to requests for comment. FERC declined to comment. BOEM deferred comment to DHS, which is leading the federal response to the hack.
Utilities affected
SolarWinds' customer page also listed the New York Power Authority as a client. NYPA confirmed it uses SolarWinds products and said they are working in "close collaboration with our industry cybersecurity associations and government agencies" to determine the potential impact.