Chapter
Clips
A client reported a dozen of their wind turbines were infected with malware, as each turbine had its own computer connected to it, which controls parts of the turbine and monitors performance.
18:33 - 20:23 (01:49)
Summary
A client reported a dozen of their wind turbines were infected with malware, as each turbine had its own computer connected to it, which controls parts of the turbine and monitors performance. A network investigation was carried out by an expert on site to identify the system's vulnerabilities.
ChapterThe Intersection of Wind Energy and Cryptocurrency Mining
EpisodeEp 22: Mini-Stories: Vol 1
PodcastDarknet Diaries
The adversary was using crypto-jacking software to mine cryptocurrencies on Windows systems they maintained and updated regularly.
20:23 - 23:49 (03:26)
Summary
The adversary was using crypto-jacking software to mine cryptocurrencies on Windows systems they maintained and updated regularly. Despite efforts to advocate for removal, the business owners decided to allow the activity with additional monitoring.
ChapterThe Intersection of Wind Energy and Cryptocurrency Mining
EpisodeEp 22: Mini-Stories: Vol 1
PodcastDarknet Diaries
A recent case study showed that cyber attacks on wind turbines were not significantly impacting energy production, but were evidently designed to be low and slow to avoid detection.
23:51 - 25:53 (02:01)
Summary
A recent case study showed that cyber attacks on wind turbines were not significantly impacting energy production, but were evidently designed to be low and slow to avoid detection.