In 2012, Saudi Aramco was hit with the most destructive virus ever. Thousands and thousands of computers were destroyed. Herculean efforts were made to restore them to operational status again. But who would do such an attack? Very special thanks goes to Chris Kubecka for sharing her story. She is author of the book Down the Rabbit Hole An OSINT Journey, and Hack The World With OSINT (due out soon). This episode was sponsored by Eero. A solution to blanket your home in WiFi. Visit https://eero.com/darknet and use promo code "darknet". This episode is also sponsored by Cover. Visit cover.com/darknet to get insured today. Learn more about your ad choices. Visit podcastchoices.com/adchoices
The podcast discusses the 2012 cyber attack on oil and gas company, Sate Ramco, and highlights the vulnerability of industrial control systems. An advertisement for DRADA, a compliance software, is also included in the transcript.
A cyberattack on Saudi Aramco in 2012, believed to be carried out by Iran, crippled the company's computer systems and destroyed data. The attackers gained access to administrative privileges to the company's network, leaving a skeleton crew of Western staff without keys to the kingdom.
Saudi Aramco disconnected itself from the internet when the Wiper virus attacked their systems, causing them to lose their master boot record, rendering Windows DNS, Windows DHCP, and other systems unusable. They feared the virus would spread to more systems and take out oil production.
The podcast discusses the career trajectory of a security consultant who began as a programmer and gradually moved on to consulting and leading security teams for various companies.
Following a cyber attack on Saudi Aramco in 2012, the company bought up the world supply of hard drives, causing a rise in prices worldwide. A typhoon hitting Asia simultaneously halted production for some hard drive facilities, exacerbating the issue.
Former military spies were able to breach Saudi Aramco and gain access to the CEO's password and email accounts due to weak security systems left by a contractor on the network.
The lack of open communication between nations regarding cyber capabilities and conduct is hindering progress in cybersecurity. Countries like Saudi Arabia are now developing their own government-run organizations to protect against cyberattacks and following the lead of larger players such as the US.
The speaker discusses the significance of having printed playbooks and coded contact information cards in case of emergency situations to maintain sanity and provide a quick response. These tools can also be used to gather personal and private information on companies and governments leaving their data open to the public.