Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 15 submissions in the queue.
posted by on Monday January 02 2017, @10:12PM   Printer-friendly
from the poor-sources-of-information dept.

Glenn Greenwald reports via The Intercept

The Washington Post on Friday [December 30] reported a genuinely alarming event: Russian hackers have penetrated the U.S. power system through an electrical grid in Vermont. The Post headline conveyed the seriousness of the threat:
[Russian hackers penetrated U.S. electricity grid through a utility in Vermont, officials say]

The first sentence of the article directly linked this cyberattack to alleged Russian hacking of the email accounts of the DNC and John Podesta--what is now routinely referred to as "Russian hacking of our election"--by referencing the code name revealed on Wednesday by the Obama administration when it announced sanctions on Russian officials: "A code associated with the Russian hacking operation dubbed Grizzly Steppe by the Obama administration has been detected within the system of a Vermont utility, according to U.S. officials."

The Post article contained grave statements from Vermont officials of the type politicians love to issue after a terrorist attack to show they are tough and in control.

[...] The article went on and on in that vein, with all the standard tactics used by the U.S. media for such stories: quoting anonymous national security officials, reviewing past acts of Russian treachery, and drawing the scariest possible conclusions ("'The question remains: Are they in other systems and what was the intent?' a U.S. official said").

The media reactions, as Alex Pfeiffer documents, were exactly what one would expect: hysterical, alarmist proclamations of Putin's menacing evil.

[...] The Post's story also predictably and very rapidly infected other large media outlets. Reuters thus told its readers around the world: "A malware code associated with Russian hackers has reportedly been detected within the system of a Vermont electric utility."

What's the problem here? It did not happen.

There was no "penetration of the U.S. electricity grid". The truth was undramatic and banal. Burlington Electric, after receiving a Homeland Security notice sent to all U.S. utility companies about the malware code found in the DNC system, searched all its computers and found the code in a single laptop that was not connected to the electric grid.

Apparently, the Post did not even bother to contact the company before running its wildly sensationalistic claims, so Burlington Electric had to issue its own statement to the Burlington Free Press, which debunked the Post's central claim (emphasis in original): "We detected the malware in a single Burlington Electric Department laptop not connected to our organization's grid systems."


Original Submission #1Original Submission #2

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Insightful) by Ezber Bozmak on Tuesday January 03 2017, @12:18AM

    by Ezber Bozmak (764) on Tuesday January 03 2017, @12:18AM (#448712)

    FWIW here's my take:

    (1) Malware targeting infrastructre is a threat in general. So much infrastructure is internet connected that even generic malware/ransomware type stuff is a serious problem that we should be putting a lot more work into mitigating. If it takes a couple of scare-mongering stories to get more resourced brought to bear on the problem, then that's really quite a small price to pay.

    (2) If there were air-gap jumping malware involved that fact would be more than sufficient to indicate a state-sponsored attack because that's not the kind of low-hanging fruit regular criminals go after. I have yet to see anyone who would know for sure say anything about air-gap jumping malware here.

    (3) I suspect it was just generic malware that a tech discovered during a sweep that was ordered in response to the DNC hacking fallout. When it was reported up the management chain the severity got magnified at each step because of holiday boredom and news hype of DNC hacking, etc. The less technically inclined the person in the chain, the more the threat was magnified. Nothing malicious or really even craven, just people being people doing a version of the "telephone game."

    After it was reported in the press the original technical people at the bottom of the chain raised a fuss about the inaccuracies and the utility issued a more sober press release.

    Starting Score:    1  point
    Moderation   +1  
       Insightful=1, Total=1
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3