{"id":16542,"date":"2016-06-21T13:31:15","date_gmt":"2016-06-21T18:31:15","guid":{"rendered":"http:\/\/hcstx.org\/?p=16542"},"modified":"2016-06-21T13:31:15","modified_gmt":"2016-06-21T18:31:15","slug":"cyber-war-the-big-hack-of-nyc","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/06\/21\/cyber-war-the-big-hack-of-nyc\/","title":{"rendered":"Cyber-War: The Big Hack of NYC"},"content":{"rendered":"<p style=\"text-align:center;\"><img decoding=\"async\" src=\"http:\/\/pixel.nymag.com\/imgs\/daily\/intelligencer\/2016\/06\/10\/magazine\/16-feature-thebighack.jpg\" \/><\/p>\n<p style=\"text-align:center;\"><strong>A scenario that could happen based on what already has.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><b>On December 4, 2017,<\/b>\u00a0at a little before nine in the morning, an executive at Goldman Sachs was swiping through the day\u2019s market report in the backseat of a hired SUV heading south on the West Side Highway when his car suddenly swerved to the left, throwing him against the window and pinning a sedan and its driver against the concrete median. A taxi ran into the SUV\u2019s rear fender and spun into the next lane, forcing a school-bus driver to slam on his brakes. Within minutes, nothing was moving from the\u00a0<i><a href=\"http:\/\/nymag.com\/listings\/attraction\/intrepid_sea_air_space_museum\/\">Intrepid<\/a><\/i>\u00a0to the\u00a0<a href=\"http:\/\/nymag.com\/listings\/attraction\/whitney-museum-of-new-york\/\">Whitney<\/a>. When the Goldman exec came to, his driver swore that the crash hadn\u2019t been his fault: <span class=\"fn\">The car had done it.1<\/span><\/p>\n<p>Moments later, on the George Washington Bridge, an SUV veered in front of an 18-wheeler, causing it to jackknife across all four lanes and block traffic heading into the city. The crashes were not a coincidence. Within minutes, there were pileups on 51st Street, the southbound BQE, as far north as the Merritt Parkway, and inside the Midtown Tunnel. By nine, Canal Street was paralyzed, as was the corner of 23rd and Broadway, and every tentacle of what used to be called the Triborough Bridge. At the center of each accident was an SUV of the same make and model, but as the calls came in to the city\u2019s 911 centers in the Bronx and Brooklyn, the operators simply chalked them up to Monday-morning road rage. No one had yet realized that New York City had just been hit by a cyberattack \u2014 or that, with the city\u2019s water system, mass transportation, banks, emergency services, and pretty much everything else now wired together in the name of technological progress, <span class=\"fn\">the worst was yet to come.2<\/span><\/p>\n<section class=\"fns fns-desktop\">\n<header>\n<h3>THE REAL HACKS<\/h3>\n<p>The fictional account imagined here is based on dozens of conversations with cybersecurity experts, hackers, government officials, and more. An attack of such scope is unlikely, but each component is inspired by events that can, and in most cases have, happened.<\/p>\n<\/header>\n<div id=\"fn-1\">\n<ol>\n<li>In 2015, carmakers began paying greater attention to the fact that some new vehicles, now connected to the internet, had become as<a href=\"http:\/\/www.nytimes.com\/2015\/07\/24\/business\/the-web-connected-car-is-cool-until-hackers-cut-your-brakes.html?_r=0\" target=\"_blank\" rel=\"noopener\">hackable<\/a> as laptops. In March, <a href=\"https:\/\/www.wired.com\/2016\/03\/study-finds-24-car-models-open-unlocking-ignition-hack\/\" target=\"_blank\" rel=\"noopener\">researchers found<\/a>hackers were able to access the ignition on Audi, BMW, Ford, Honda, Hyundai, Kia, Lexus, Mazda, Mitsubishi, Nissan, Range Rover, Subaru, Toyota, and Volkswagen cars.<\/li>\n<\/ol>\n<\/div>\n<div id=\"fn-2\">\n<p>2.\u00a0<a href=\"https:\/\/www.congress.gov\/congressional-record\/2015\/8\/5\/senate-section\/article\/s6329-2\" target=\"_blank\" rel=\"noopener\">Homeland Security<\/a>recently estimated that one major cyberattack \u2014 the NSA chief has said it\u2019s a matter of \u201cwhen, not if\u201d \u2014 could cost $50 billion and cause 2,500 fatalities.<\/p>\n<\/div>\n<\/section>\n<p>A third-year resident in the emergency room at Columbia University Medical Center in Washington Heights walked through the hospital as a television was airing images from the accident on the George Washington Bridge; that meant several crash victims would soon be heading her way. When she got to her computer, she tried logging into the network to check on the patients who were already there, but she was greeted with an error message that read WE\u2019RE NOT LOOKING FOR BITCOIN THIS TIME.<\/p>\n<p>Columbia, like major institutions across the country, had spent the past few years fighting so-called\u00a0<a href=\"http:\/\/nymag.com\/selectall\/2016\/03\/how-to-check-for-keranger-transimission-ransomware.html\">ransomware attacks<\/a>, in which hackers locked a hospital or city hall or police department out of its own network until a <span class=\"fn\">ransom was paid.3<\/span> Hospital security teams had gotten wise to the problem, but every network\u2019s defenses had the same vulnerability: <span class=\"fn\">the people who used it.4<\/span> For weeks, a group of hackers had been sending LinkedIn messages to employees at Columbia pretending to be recruiters from Mount Sinai. When an employee opened an attachment featuring the recruiting pitch \u2014 as ten of them did \u2014 and enabled the macros as prompted onscreen \u2014 four of them did \u2014 they unknowingly unleashed malware onto their computer and gave the hackers a beachhead. After months of <span class=\"fn\">lurking5<\/span>, the hackers blocked Columbia\u2019s doctors and nurses from accessing their network, including patient files. Doctors couldn\u2019t access prescription records telling them which patients were scheduled to take which drugs when and resorted to improvised <span class=\"fn\">paper-record keeping6<\/span>, which many of the younger doctors had never done before. In nearly every corridor, they were consulting with one another in a panic, asking how much of their own expertise was really stored in the cloud and had just disappeared.<\/p>\n<section class=\"fns fns-desktop\">\n<div id=\"fn-3\">\n<p>3. In February, <a href=\"http:\/\/nymag.com\/selectall\/2016\/02\/hackers-holding-hollywood-hospital-for-ransom.html\">a hospital in L.A. paid 40 bitcoins<\/a>, or about $17,000, to get back into its system. Russian hackers have even set up English-language call centers to explain to victims how to acquire and send bitcoins.<\/p>\n<\/div>\n<div id=\"fn-4\">\n<p>4. Hackers recently sent Pennsylvania drivers <a href=\"http:\/\/www.phillymag.com\/news\/2016\/03\/25\/speeding-ticket-scam\/\" target=\"_blank\" rel=\"noopener\">fake traffic tickets<\/a> with malware, using GPS data so the tickets seemed to be from red-light cameras on their route home.<\/p>\n<\/div>\n<div id=\"fn-5\">\n<p>5. The average data breach is only identified five months later; hackers were allegedly inside a Ukrainian utility network for six months before shutting off electricity.<\/p>\n<\/div>\n<div id=\"fn-6\">\n<p>6. In March, a D.C.-area hospital system was hacked and forced to <a href=\"http:\/\/www.cbsnews.com\/news\/paralyzing-hack-dc-medstar-reverts-them-to-paper\/\" target=\"_blank\" rel=\"noopener\">keep paper records<\/a>. They got so overwhelmed they turned away cancer patients with radiation appointments.<\/p>\n<\/div>\n<\/section>\n<p>The crowd in the waiting room swelled and grew more tense as nurses ran by patients, unable to give updates on when they might be seen. Various procedures were taking longer than they should have \u2014 one man was kept on a powerful antibiotic for several hours, with serious side effects, before a delayed lab result came back reporting that he should go off the medication \u2014 and the staff was having trouble keeping track of patients. A little before noon, a man walked into the hospital looking for his wife, whom he had dropped off early that morning for a simple surgical procedure. A few minutes later, the nurse told him that it appeared his wife had been discharged.<\/p>\n<p>Most New Yorkers were proceeding with their day unaware. But the city\u2019s <span class=\"fn\">head of cybersecurity7<\/span> had begun to connect the dots: Six hospitals had already informed him that their systems had been shut down, and the city had sent out warnings to all the others. One Police Plaza had just reported that it, too, was locked out of the programs it used to dispatch <span class=\"fn\">officers and emergency personnel8<\/span>, which made responding to the traffic accidents around the city that much harder.<\/p>\n<section class=\"fns fns-desktop\">\n<div id=\"fn-7\">\n<p>7. New York\u2019s first head of cybersecurity started the job earlier this year.<\/p>\n<\/div>\n<div id=\"fn-8\">\n<p>8. In April, <a href=\"http:\/\/www.washingtontimes.com\/news\/2016\/apr\/18\/newark-police-forced-to-go-offline-after-cyberatta\/\" target=\"_blank\" rel=\"noopener\">Newark\u2019s police<\/a>were locked out of their computer system for three days.<\/p>\n<\/div>\n<\/section>\n<p>After a few phone calls to friends in the private sector, the cybersecurity chief got more nervous. At the beginning of 2017, one friend told him, she had been called to investigate a mysterious occurrence at a water-treatment plant: The valves that controlled the amount of chlorine released into the water had been opening and closing with <span class=\"fn\">unexplained irregularity9<\/span>. An alarm had gone off, so none of the tainted water had reached consumers, and the company\u2019s CEO brushed off the consultant\u2019s request to make the news public so others could prepare for similar attacks.<\/p>\n<section class=\"fns fns-desktop\">\n<div id=\"fn-9\">\n<p>9. Investigators recently reported a similar incident at an undisclosed water company.<\/p>\n<\/div>\n<\/section>\n<p>At MetroTech, New York\u2019s cybersecurity chief pulled out the Office of Emergency Management\u2019s 42-page booklet on how the city should react to a cyberattack \u2014 a copy of which he had printed out and stashed in his desk drawer in case his department\u2019s own network was compromised \u2014 and was flipping from page to page when he got a call from a reporter<i>.<\/i><\/p>\n<p>At 12:30 p.m., the\u00a0<i>Times<\/i>\u00a0published a story reporting that \u201cgovernment officials\u201d believed that the city was being hit with a wave of cyberattacks that appeared to be ongoing. A tipster claimed the hackers had caused at least a dozen car crashes and debilitated multiple hospitals and agencies \u2014 with more to come. If they could crash a car, could they crash a subway? The\u00a0<i>Times<\/i>\u00a0report included a line from a nurse at New York\u2013Presbyterian who said that the initial message announcing that the network was blocked had included a link to a web page that was displaying a timer ticking down to 1 p.m. and text that read MORE PATIENTS WILL BE ARRIVING SOON.<\/p>\n<p><span class=\"fn\"><b>The group of\u00a0<\/b>10<\/span> European <span class=\"fn\">black-hat hackers11<\/span> who launched the attack against New York had spent much of the previous decade breaking into American corporate networks \u2014 credit-card companies, hospitals, big-box retailers \u2014 <span class=\"fn\">mostly for profit,12<\/span>and sometimes just because they could. When those attacks became routine, the group moved into more politically inclined hacks, both <span class=\"fn\">against13<\/span> and on <span class=\"fn\">behalf14<\/span> of various governments,<span class=\"fn\">rigging elections15<\/span> and fomenting dissent. In the summer of 2016, the hackers received an anonymous offer of $100 million to perform a cyberattack that would debilitate a major American city. The group\u2019s members weren\u2019t much interested in death and destruction per se, so they declined their funder\u2019s request for a<span class=\"fn\">\u201cCyber 9\/11.\u201d16<\/span> But to self-identified anarchists with a reflexively nihilistic will to power, the proposition had some appeal. Causing disruption was something that had been on their minds recently, as their conversations veered toward the problems with global capitalism, the rise of technocentrism, bitcoin, and the hubris required <a href=\"http:\/\/nymag.com\/daily\/intelligencer\/2016\/06\/would-a-major-terror-attack-really-help-trump.html\">to nominate a man like Donald Trump<\/a>. Their animus got more personal when American authorities arrested a well-respected white-hat hacker who had broken into an insulin pump in order to show the dangers of connecting <span class=\"fn\">devices17<\/span> without proper security. The black hats were on the opposite end of the ideological spectrum but had more empathy for their fellow hacker than they did for the American people, who, they felt, deserved a comeuppance \u2014 or at least a very loud \u201cFuck you.\u201d The plan was to show how much of modern life in a city like New York could be disrupted by purely digital means. The hackers would get paid, but they also hoped their attack would dent America\u2019s complacent faith in order and in the technology and political authority that undergirded it. As a bonus, their services would be in even greater demand.<\/p>\n<section class=\"fns fns-desktop\">\n<div id=\"fn-10\">\n<p>10. Hackers are often identified by the malware they use: One group is known as Sandworm, because references to the sci-fi series \u2018Dune,\u2019 which features giant desert worms, were embedded in its code.<\/p>\n<\/div>\n<div id=\"fn-11\">\n<p>11. The hacker world divides into white hats, who are the good guys, and black hats, who are out to cause havoc or for personal gain.<\/p>\n<\/div>\n<div id=\"fn-12\">\n<p>12. According to the FBI, those hit by cyberattacks\u00a0<a href=\"http:\/\/www.latimes.com\/nation\/la-na-0407-cyber-hospital-20160407-story.html\" target=\"_blank\" rel=\"noopener\">have paid<\/a> more than $200 million in ransoms so far this year, compared with just $25 million in all of 2015.<\/p>\n<\/div>\n<div id=\"fn-13\">\n<p>13. Earlier this year, Congress was the target of a string of ransomware attacks.<\/p>\n<\/div>\n<div id=\"fn-14\">\n<p>14. An Italian company called\u00a0<a href=\"http:\/\/www.hackingteam.it\/\" target=\"_blank\" rel=\"noopener\">Hacking Team<\/a> has been criticized for offering hacking services to dozens of countries, many with poor human-rights records.<\/p>\n<\/div>\n<div id=\"fn-15\">\n<p>15. Andr\u00e9s Sep\u00falveda, a Colombian hacker, recently told Bloomberg that he had helped rig elections in nine different Latin American countries, including by installing malware on campaign routers to spy on digital and phone communications.<\/p>\n<\/div>\n<div id=\"fn-16\">\n<p>16. Last year, a researcher claimed he had hacked into a plane\u2019s seat-back entertainment system and could then access the cockpit controls on a Boeing jet flying from Denver to Chicago. Boeing has said this is impossible.<\/p>\n<\/div>\n<div id=\"fn-17\">\n<p>17. In 2014, a company tracking medical devices at more than 60 hospitals found malware in every hospital. Last year, another researcher was able to manipulate several drug-infusion pumps so he could, potentially, deliver a fatal dosage of medication.<\/p>\n<\/div>\n<\/section>\n<p>No one had pulled off an attack of this magnitude, but it was possible to piece together a plan from various hacks that had been executed before, which, taken together, were a sort of open-source blueprint available to anyone with an interest in remote-control terrorism (and the time and manpower it required). This group was small, relatively speaking, and benign, relatively speaking. ISIS, for instance, might have a more pronounced bloodlust but not (yet) the technical capabilities; Chinese or Russian hacking operations would have many more resources and a much more sophisticated strategy that could bring even more targets, <span class=\"fn\">like nuclear-power plants,18<\/span> into play.<\/p>\n<section class=\"fns fns-desktop\">\n<div id=\"fn-18\">\n<p>18. It took several years for hackers allegedly working for the U.S. and Israel to develop Stuxnet, a computer worm that disabled an Iranian nuclear reactor in 2010.<\/p>\n<\/div>\n<\/section>\n<p>These hackers decided to start with cars. The team\u2019s members found a particular automaker\u2019s flagship SUV <span class=\"fn\">especially hackable,19<\/span> bought one to test their work (to help fund the operation, they had pulled from the millions they had made in several attacks against financial institutions, including a recent hack of the<span class=\"fn\">Central Bank of Bolivia20<\/span>), and, within a month, could shut off the ignition, turn off the brakes, and cause the steering wheel to jerk to the left.<\/p>\n<section class=\"fns fns-desktop\">\n<div id=\"fn-19\">\n<p>19. In 2015, for an article in\u00a0<a href=\"https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/\" target=\"_blank\" rel=\"noopener\"><em>Wired<\/em><\/a>, two hackers in St. Louis took control of a Jeep traveling 75 mph, sprayed wiper fluid so the driver couldn\u2019t see, then cut the transmission.<\/p>\n<\/div>\n<div id=\"fn-20\" class=\"\">\n<p>20. In February, hackers stole the credentials of several employees in the Bangladeshi Central Bank<a href=\"http:\/\/www.reuters.com\/article\/us-usa-fed-bangladesh-malware-idUSKCN0WD1EV\" target=\"_blank\" rel=\"noopener\">using malware<\/a> that tracked keystrokes as the employees entered passwords and were then able to transfer $81 million into private accounts. (They might have stolen more had they not misspelled the word \u201cfoundation\u201d in one of the transfers, triggering an alarm.) The underlying system of financial transactions, known as SWIFT, has since come under scrutiny after similar attempted attacks at other banks.<\/p>\n<p>Read the Remainder at <strong><a href=\"http:\/\/nymag.com\/daily\/intelligencer\/2016\/06\/the-hack-that-could-take-down-nyc.html\">NY Mag<\/a><\/strong><\/p>\n<\/div>\n<\/section>\n<div class=\"ooyala-player\"><\/div>\n<p style=\"text-align:center;\">\n","protected":false},"excerpt":{"rendered":"<p>A scenario that could happen based on what already has. &nbsp; On December 4, 2017,\u00a0at a little before nine in the morning, an executive at Goldman Sachs was swiping through the day\u2019s market report in the backseat of a hired SUV heading south on the West Side Highway when his car suddenly swerved to the&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[74,1317,4126,883,4479,4333,1132,65,3712,10],"tags":[12395,4178,223,12396,2841,12397,12398,1805],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/16542"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=16542"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/16542\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=16542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=16542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=16542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}