Blended Threat
   HOME

TheInfoList



OR:

A blended threat (also known as a blended attack) is a
software exploit An exploit (from the English verb ''to exploit'', meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a software bug, bug or vulnerability (computer scienc ...
that involves a combination of attacks against different
vulnerabilities Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." A window of vulnerability (WOV) is a time frame within which defensive measures are diminished, com ...
. Blended threats can be any software that exploits techniques to attack and propagate threats, for example
worms Worms may refer to: *Worm, an invertebrate animal with a tube-like body and no limbs Places *Worms, Germany Worms () is a city in Rhineland-Palatinate, Germany, situated on the Upper Rhine about south-southwest of Frankfurt am Main. It had ...
,
trojan horses The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, ...
, and
computer virus A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a compu ...
es.


Description

Complex threats consist of two or more attacks, such as multiple attacks of the same kind. Examples of complex threats include a series of coordinated physical hostilities, such as the Paris terrorist attacks in 2015 or a combination of threats such as a
cyberattack A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted ...
and a distinct physical attack, which may be coordinated. In more recent years , cyber attacks have demonstrated increased ability to impact physical systems, such as
Stuxnet Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition ( SCADA) systems and is believed to be responsible for causing su ...
, Triton or Trisis malware, and have caused
ransomware Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, ...
attacks such as
WannaCry The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bi ...
and Netwalker By recognizing computer system threats occur from potential physical hazards, the term "blended threat" has also been defined as a natural, accidental, or purposeful physical or virtual danger that has the potential for crossover impacts or to harm life, information, operations, environment, and property. This is an adaptation based on terminology from the 2010
US Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terr ...
's Risk Lexicon. Illustrating how rapidly and dangerously this can play out, Sarah Coble (writing in Infosecurity Mag on 12 June 2020 reported, that "the life of Jessica Hatch, a Houston business owner, was “threatened after cyber-criminals hacked into her company’s social media account and posted racist messages". The founder and CEO of Infinity Diagnostics Center said that her company’s Instagram account was compromised… by an unknown malicious hacker. After gaining access to the account, the threat actor uploaded multiple stories designed to paint Hatch and her business as racist.” In this post "Blended Threats: Protests! Hacking? Death Threats!?!", Gate 15 highlighted that risk management processes need to account for our complex and blended threat environment. On 6 September 2020, the Argentina's official immigration agency, Dirección Nacional de Migraciones, suffered a Netwalker ransomware attack that temporarily halted border crossing into and out of the country. Blended threats, in the form of a cyber attack, have evolved to cause a loss of life. On 10 September 2020, German authorities say a hacker attack caused the failure of IT systems at the University Hospital Düsseldorf (UKD) Duesseldorf, and a woman who needed urgent admission died after she had to be taken to another city for treatment. According to
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers ''The Observer'' and ''The Guardian Weekly'', ''The Guardian'' is part of the Gu ...
, in a worst-case scenario, crackers could potentially carry out "cyber-physical attacks by turning
satellite antenna A satellite dish is a dish-shaped type of parabolic antenna designed to receive or transmit information by radio waves to or from a communication satellite. The term most commonly means a dish which receives direct-broadcast satellite television ...
s into weapons that can operate like
microwave oven A microwave oven (commonly referred to as a microwave) is an electric oven that heats and cooks food by exposing it to electromagnetic radiation in the microwave frequency range. This induces polar molecules in the food to rotate and produce t ...
s." On September 10, 2019 the Cyber Threat Alliance (CTA) released a new joint analysis product titled "The Illicit Cryptocurrency Threat" that said illicit cryptocurrency mining had overtaken ransomware as the biggest cyber threat to businesses. The CTA said mining attacks had become one of the most common attacks their client's encounter. Blended threats may also compromise
healthcare system Health care or healthcare is the improvement of health via the prevention, diagnosis, treatment, amelioration or cure of disease, illness, injury, and other physical and mental impairments in people. Health care is delivered by health profess ...
s, many of which need an Internet connection to operate, as do numerous other medical devices such as
pacemaker An artificial cardiac pacemaker (or artificial pacemaker, so as not to be confused with the natural cardiac pacemaker) or pacemaker is a medical device that generates electrical impulses delivered by electrodes to the chambers of the heart eith ...
s, making the latter part of the
Internet of Things The Internet of things (IoT) describes physical objects (or groups of such objects) with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other comm ...
(IoT) a growing network of connected devices, which are potentially vulnerable to a cyber attack. By 2020, threats had already been reported in medical devices. Recently, a crucial flaw in 500,000 pacemakers that could expose users to an attack had been discovered. Additionally, security researchers revealed a chain of vulnerabilities in one brand of pacemaker that an attacker could exploit to control implanted pacemakers remotely and cause physical harm to patients. On July 16, 2019 a mother delivered her baby at the Springhill Medical Center in Mobile Alabama. The mother, Kidd, wasn’t informed Springhill was struggling with a cyberattack when she went in to deliver her daughter, and doctors and nurses then missed a number of key tests that would have shown that the umbilical cord was wrapped around the baby's neck, leading to brain damage and death nine months later. On February 5, 2021 unidentified cyber actors accessed the supervisory control and data acquisition (SCADA) system of a drinking water treatment plant in
Oldsmar, Florida Oldsmar is a city in Pinellas County, Florida, United States. As of the 2010 census, the city had a population of 13,591. The Oldsmar name dates to April 12, 1916 when automobile pioneer Ransom E. Olds purchased of land by the northern part of Ta ...
. Once the system was accessed, the intruders manipulated the level of sodium hydroxide, also known as lye or caustic soda, from a setting of 100 parts per mission to 11,100 parts per million. At high levels, sodium hydroxide can severely damage human tissue. It is the main ingredient in liquid drain cleaners, but at low levels is used to control water acidity and remove metals from drinking water. On May 7, 2021
Colonial Pipeline The Colonial Pipeline is the largest pipeline system for refined oil products in the U.S.oil pipeline Pipeline transport is the long-distance transportation of a liquid or gas through a system of pipes—a pipeline—typically to a market area for consumption. The latest data from 2014 gives a total of slightly less than of pipeline in 120 countr ...
system that originates in
Houston, Texas Houston (; ) is the most populous city in Texas, the most populous city in the Southern United States, the fourth-most populous city in the United States, and the sixth-most populous city in North America, with a population of 2,304,580 in ...
, and carries
gasoline Gasoline (; ) or petrol (; ) (see ) is a transparent, petroleum-derived flammable liquid that is used primarily as a fuel in most spark-ignited internal combustion engines (also known as petrol engines). It consists mostly of organic co ...
and
jet fuel Jet fuel or aviation turbine fuel (ATF, also abbreviated avtur) is a type of aviation fuel designed for use in aircraft powered by gas-turbine engines. It is colorless to straw-colored in appearance. The most commonly used fuels for commercial a ...
mainly to the
Southeastern United States The Southeastern United States, also referred to as the American Southeast or simply the Southeast, is a geographical region of the United States. It is located broadly on the eastern portion of the southern United States and the southern por ...
, suffered a
ransomware Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, ...
cyberattack A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted ...
that impacted computerized equipment managing the pipeline. The ransomware attack crippled delivery of about 3 million
barrels A barrel or cask is a hollow cylindrical container with a bulging center, longer than it is wide. They are traditionally made of wooden staves and bound by wooden or metal hoops. The word vat is often used for large containers for liquids, u ...
of fuel per day between Texas and New York. The attack caused fuel shortages up and down the East Coast of the United States. On May 30, 2021 meat supplier JBS suffered a ransomware attack. All JBS-owned beef facilities in the United States were rendered temporarily inoperative. The attack caused a spillover effect into the farming and restaurant industries. On September 21, 2021 Iowa-based provider of agriculture services NEW Cooperative Inc. was hit by a ransomware attack forcing it to take its systems offline. The BlackMatter group that is behind the attack has put forth a $5.9 million ransom demand. NEW Cooperative Inc., a farming cooperative, said the attack could significantly impact the public supply of grain, pork, and chicken if it cannot bring its systems back online. On October 26, 2021 Schreiber Foods, a Wisconsin based milk distributor, was victimized by hackers demanding a rumored $2.5 million ransom to unlock their computer systems. Wisconsin milk handlers and haulers reported getting calls from Schreiber on Saturday (Oct. 23) saying that the company’s computer systems were down and that their plants couldn’t take the milk that had been contracted to go there. Haulers and schedulers were forced to find alternate homes for milk. On April 28, 2022 St. Vincent Hospital’s in Worcester in Massachusetts was the victim of a cyberattack which sent wait times in the emergency room skyrocketing, with some patients saying they were unable to see a doctor. St. Vincent Hospital’s statement reads: “Tenet, our parent company, experienced a cybersecurity incident last week and responded with extensive protection protocols to safeguard its systems and prevent further unauthorized activity. During the temporary disruption, Saint Vincent Hospital continued to care for our community utilizing established backup processes. At this time, our critical applications have been restored and we are resuming normal operations. In parallel, Tenet launched an investigation, which is ongoing, and is taking additional measures to protect patient, employee and other data. We are grateful to our physicians, nurses and staff for continuing to provide safe, quality patient care while we work to address this matter.” The Aviation sector has also been affected by disruptions due to cyber attacks. Flights with popular Indian budget airline SpiceJet were disrupted by the cyber attack on May 25 2022. It is unclear which ransomware operation may have attacked SpiceJet, and no details have been shared as to the extent of damage it may have caused. On September 8, 202
Ponemon Institute
a Washington, D.C., think tank, interviewed more than 600 information technology professionals across more than 100 health care facilities. Its findings are some of the most concrete evidence to date that the steady drumbeat of hackers attacking American medical centers leads to patients’ receiving worse care and being more likely to die. According Brett Callow, an analyst at the ransomware company Emsisoftto, there have been at least 12 ransomware attacks on health care facilities in the U.S. this year, but because some health care companies represent multiple locations, those attacks accounted for 56 different facilities, he said. On December 3, 2022 two power substations in North Carolina were damaged by gunfire. The subsequent power outages left at least 40,000 customers without electricity and rendered wastewater pumps out of order across the area. A curfew was instated and schools were closed.


See also

*
Timeline of computer viruses and worms A timeline is a display of a list of events in chronological order. It is typically a graphic design showing a long bar labelled with dates paralleling it, and usually contemporaneous events. Timelines can use any suitable scale representin ...
*
Comparison of computer viruses The compilation of a unified list of computer viruses is made difficult because of naming. To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software ...
*
List of trojan horses A ''list'' is any set of items in a row. List or lists may also refer to: People * List (surname) Organizations * List College, an undergraduate division of the Jewish Theological Seminary of America * SC Germania List, German rugby union ...


References

{{reflist


External links


McAfee whitepaper on blended threats
https://web.archive.org/web/20060505030819/http://www.mcafee.com/common/media/mcafeeb2b/us/products/pdf/wp_us_blended_threats.pdf] Computer security exploits Types of malware