Israel’s Electricity Authority has been infected by malware that they are still trying to recover from. Tim Erlin, director of IT security and risk strategy for Tripwire have the following comments on it.
[su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire :
“This doesn’t appear to be a direct attack on Israel’s electric grid, like the one seen in Ukraine, but on the regulatory body called “The Electric Authority.” The difference is important as generation, transmission and distribution facilities are more likely to have direct impact on electricity supply than the authority that regulates them.
It’s very responsible of Israel to hold off pointing fingers until there’s sufficient information for accurate attribution.
It will be important for Israel to identify the objective of this attack, and determine whether the attacker succeeded. Given the Electric Authority’s responsibilities, an attacker may have been after sensitive information to plan another attack or regulatory information that could provide an economic advantage later on. There might be a personal motive and the objective of disruption.”[/su_note]
[su_box title=”About Tripwire” style=”noise” box_color=”#336588″]Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.[/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.