Power outages, bank runs, changed financial data: Here are the 'cyber 9/11' scenarios that really worry the experts

  • It may be impossible to hedge against the next major cyberattack, but there are some lessons from recent history and some clues from the private sector on what may be the next devastating cyberattack.
  • Many experts have warned for years about an impending "cyber 9/11," and despite a nearly endless list of scenarios, there are a few that are more likely than others.
  • Attacks that spill into the physical world, those that cause a financial sector "contagion" or attacks on data integrity -- rather than theft or destruction -- are top-of-mind, frightening scenarios for experts.
Published 9:12 AM ET Sun, 18 Nov 2018 Updated 5:27 PM ET Sun, 18 Nov 2018

REUTERS/David Mdzinarishvili

For years, government security specialists have predicted the inevitable "cyber 9/11," an event originating as a digital attack that spills over into other aspects of society, causing widespread harm to people and the global financial sector.

Former NSA head Admiral Michael Rogers told CNBC last month that "nothing is beyond the pale of possibility" for cyberattacks.

Fear sells. So it can be hard to know what experts really fear might happen, versus hype meant to market a new cybersecurity product or service, or drum up attention on social media.

But there are some nightmare scenarios that have precedent. These are the scenarios that truly concern independent cybersecurity experts.

They fall into three common themes: physical attacks that shut off or damage some aspect of critical services, financial attacks that spin out of control and lead to bank runs, and hackers changing data in a way that erodes trust in the economy and critical institutions.

Knocking out basic services

Cyberattacks that cause major disruption to public services have happened many times in the real world.

Some of them are very old news, in fact. But it's easy to imagine how a similar attack could shut down basic services, like electricity or water, that affect millions of people.

In 2000, a disgruntled sewage treatment plant worker in Queensland, Australia hacked into his employer's industrial control system to unleash torrents of raw sewage onto public grounds, flooding the city's local Hyatt hotel. The perpetrator was sentenced to two years for the attack.

In 2007, the country of Estonia was subject to widespread outages in its entire telecommunications network, following a cyberattack stemming from a dispute with Russia over a military statue. The incident was so damaging, it led to a decision to place the North Atlantic Treaty Organization's Cyber Security organization in Tallinn, the country's capital.

In 2015, Ukraine's power grid had massive outages after a cyberattack — which some officials have attributed to Russia — two days before Christmas, during a cold snap. Around a quarter-million residents were left without power, but the outages only lasted a few hours before government agencies were able to restore service.

Major cyberattacks aimed at taking down official services don't need to be strictly nation-state sponsored or terrorist-backed. They can be strictly criminal in nature, or come from a malevolent backer under the guise of a criminal attack.

The NotPetya cyberattacks of June 2017, known by the name of the criminal ransomware-inspired computer virus behind it, were notorious for the real-world harm they caused to companies. In Germany, consumer goods-maker Reckitt Benckiser halted shipments of numerous products. Ships belonging to logistics giant Maersk were at a standstill, and the company later said it took a $300 million hit from the attack. In the U.S., a facility owned by Merck that makes the HPV vaccine Gardasil was shut down to such a big extent, the company had to borrow hundreds of millions of dollars worth of back-up vaccines stockpiled by the Center for Disease Control.

Power outages or water supply corruption are the most worrisome to Peter Beshar, general counsel for risk management firm Marsh & McLennan. Loss of electricity, he said, is just one piece of the greater risk for physical security stemming from a cyberattack.

"Utilities are one vital resource. But it's not just power, water is another type of utility. If all of a sudden, the quality of drinking water is called into question, and then manufacturers who rely on using untainted water for making drugs or food is called into question. That is a potential crisis," he said.

A financial-sector attack that triggers a run

Financial regulators often talk about the risk of "contagion" as a result of an attack on banks or institutions like the New York Stock Exchange. The fear is that a cyberattack could send customers rushing to banks in a panic to pull out funds.

"When you have significant impact to financial systems and people can't get to their money, they can cause just as much duress to the system as a major network outage," said Jacqui McNamara, head of cyber security services at Australia's largest telecom, Telstra, at an Oct. 23 cybersecurity conference in Australia.

These scenarios are both possible and alarming enough that companies and private-sector organizations have spun up some huge projects to protect against them.

"Imagine a cross-cutting attack that just ripples through the financial sector," said Beshar. "If consumers couldn't get cash out of ATM machines, if credit cards weren't functioning, that would be very problematic."

One of those initiatives, Sheltered Harbor, is a not-for-profit subsidiary of the Financial Services Information Sharing and Analysis Center. It's got about 70 participants, including big names like Citi, Morgan Stanley and Goldman Sachs.

The purpose is to ensure banks can pull up the right information about customer accounts and still reconcile transactions in the face of a catastrophic cyberattack. The initiative is especially focused on an event that significantly destroys data, or takes critical systems out of service for an extended period of time.

For banks that are a part of Sheltered Harbor, the organization provides standards designed to back up the financial data they generate each day. This would give banks a way to restore data that's lost in any attack.

Changing data so it's wrong

Criminals or nation-states could also change data, like financial information on balance sheets or commands going into an industrial machine, instead of merely stealing it or deleting it.

That's a big concern for Dmitry Samartsev, CEO of BI.ZONE, a Russian cybersecurity coordination organization for the country's banks.

"The worst case scenario is when [cybercriminals] are making several attacks at one time," he said at the Oct. 23 conference.

For instance, an attacker might launch a simple denial-of-service assault on a corporation, shutting down its web site other services, then combine that with a slew of fake news on social media meant to imply major institutions are going to be out of service. The result could be panic.

There's some precedent here, too. In 2015, BNY Mellon had a technical glitch that mispriced some securities. That jammed up the algorithms that are used for executing automated trades, and the result was a swift 1,000-point drop in the Dow.

A hacker took over the Twitter account of the Associated Press in 2013, tweeting "Breaking: Two Explosions in the White House and Barack Obama is injured." The stock market instantly fell 143 points.

Tom Kellermann, a former top cybersecurity officer for the World Bank and chief cybersecurity officer of security firm Carbon Black, agreed that he's most afraid of data being altered, instead of stolen or lost.

"Integrity of data is key. If you lose your ability to trust the information that is coming out of the financial sector, that is when things can turn dark and very quickly," he said.


https://www.cnbc.com/2018/11/18/cyber-911-scenarios-power-outages-b...

Views: 628

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Michelle Reichert favorited Burbia's video
7 hours ago
cheeki kea posted a video

NEW DOCUMENTARY - Dissent Into Madness

TRANSCRIPT AND SOURCES: https://www.corbettreport.com/dissent-into-madness/What if the delusions of the dissidents are in fact real? What if their paranoid f...
12 hours ago
cheeki kea commented on Doc Vega's blog post Alligator Creek and a Japanese Massacre
"Japan served themselves up no favours by inching out into the South Pacific as they soon found out.…"
13 hours ago
cheeki kea commented on Doc Vega's blog post Was a Planned Civil War Averted?
"Their plans did not work out because we are the news now, and the old news is the enemy. "
14 hours ago
Doc Vega posted a blog post

Alligator Creek and a Japanese Massacre

The year is 1942 just a few months after the Pearl Harbor disaster. Despite losses suffered by the…See More
yesterday
Doc Vega commented on Burbia's video
Thumbnail

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

"With all due respect this guy comes off as a drunken asshole and he didn't even  know who…"
Monday
Doc Vega posted a blog post

Was a Planned Civil War Averted?

We are living in sadly historic times where good and evil are in battle all the time. Not that this…See More
Sunday
Sandy posted a photo
Sunday
Less Prone posted a video

President Trump addresses U.N. General Assembly - FULL SPEECH

President Donald Trump speaks at the United Nations General Assembly in New York City.Full video here: https://www.c-span.org/event/white-house-event/preside...
Sunday
Burbia posted a video

2 MIN AGO: Western Provinces MAJOR New WEXIT Announcement - Canada EXPLODES!

In a stunning turn of events, Western provinces just made a major new WEXIT announcement — and it’s shaking the foundations of Canadian unity. Is Western sep...
Saturday
Doc Vega posted a blog post

How You Provoke a Civil War

In the world of counter intelligence which is simply one aspect of many pertaining to asymmetrical…See More
Friday
Burbia commented on Burbia's video
Thumbnail

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

"I don't follow as much with Josh Reeves than I use to. He seems to be a documentary producing…"
Sep 25
Burbia posted a video

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

DONATE-paypal-dayglow76@yahoo.comCashapp-reevesradioVenmo-Josh-Reeves-61FILMS AND AUDIOBOOKS DOWNLOAD STORE-https://store.payloadz.com/results/242828-josh-re...
Sep 25
Doc Vega posted blog posts
Sep 25
tjdavis posted a video

CHARLIE KIRK VIDEO THAT KEEPS GETTING REMOVED OFF OF SEVERAL PLATFORMS

I had not planned to share this publicly, but I believe Advar, who spoke with Charlie Kirk while I was very ill, would have wanted me to. After my interview ...
Sep 25
pohonemas33 team commented on Chris of the family Masters's photo
Thumbnail

Gold-Coast-Message

"untuk bermain slot, kamu cukup kunjungi situs kacang99 pasti langsung gacor"
Sep 24
Doc Vega posted blog posts
Sep 24
Burbia posted a blog post

Former President Trump?

When was this article written? It is attributed to Victor Davis Hanson. He is a Fellow at Hoover…See More
Sep 22
Doc Vega posted a blog post

Don’t Go Hunting For Bigfoot

It is October 19, 2019 at 5:46 AM. This will be the last time any visual evidence of Mark is seen…See More
Sep 22
tjdavis posted a video

Most Corrupt Series: Elizabeth Warren | Forgotten History

Elizabeth Warren has built her reputation as a "reformer", but her political career has also drawn sharp criticism. Questions have been raised about her fina...
Sep 19

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted