Hackers Have Bombs To Kill!

Today’s advanced Cyber-Attackers have now reached a point where they tried to trigger a deadly explosion. This explosion was supposed to be in a petrochemical plant present in Saudi Arabia in August as reported by the New York Times.

The investigators on this news refuse to identify who the culprit attacker was but individuals interviewed concordantly claimed that this blast would have brought about a huge catastrophe.

These cyber-attackers planned on triggering a blast but ended up bringing down the system instead, causing it to shut down.  This cyber-attack could easily bring about other similar attacks around the globe and was said to have been backed up by a government, according to the report from insiders.

The hackers were not only refined but had assets and a lot of time, indicating that they had great and strong supporters. More than a dozen people involved in this investigation together with the cyber-security experts have asked to remain anonymous for keeping this event under wraps and confidential.

The New Your Times Said that the sources objected to naming not only the company managing the plant but also the suspected country behind the hackers. However, security experts did not remain quiet and told the newspaper that Iran, China, Israel, the United States and Russia have the audacity to launch such an attack.

This is another cyber-security attack on Saudi Arabia after ‘Shamoon’ which was the disc-wiping virus, and still, Saudi Arabia has not commented on this event yet. The US intelligence claimed ‘Shamoon’ to be the work of Saudi Arab’s rival Iran.

Shamoon attacked Saudi Aramco which is the biggest oil company in the world, and this was believed to be the most horrifying cyber-attack yet. However, August Attack was much more dangerous and could be aimed to send a political message.

Saudi Arabia was also attacked by a Malware in November that targeted Government computers breaching their cyber-security.

Source: TahawulTech

Related posts

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

ZenHammer Memory Attack Exploits Rowhammer Against AMD CPUs