{"id":57827,"date":"2017-01-09T00:00:00","date_gmt":"2017-01-08T22:00:00","guid":{"rendered":"https:\/\/richardvanhooijdonk.com\/blog\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/"},"modified":"2019-08-01T19:39:32","modified_gmt":"2019-08-01T17:39:32","slug":"terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/","title":{"rendered":"Terror of the SCADA and IoT: coordinated attacks on critical infrastructure"},"content":{"rendered":"<ul class=\"bold-list\">\n<li>Ageing systems are a security nightmare<\/li>\n<li>Hacked water treatment plants could infect millions of people<\/li>\n<li>Even connected medical devices are potential weapons<\/li>\n<li>As more and more medical devices are connected, the danger grows increasingly acute<\/li>\n<\/ul>\n<p>Communicating freely, smart devices joined by the IoT promise great things. For instance, they allow Supervisory Control and Data Acquisition (SCADA). A SCADA system enables its users to monitor complex data streams and regulate the sources of that data to maximise efficiency. You can find SCADA systems in everything from hydroelectric plants and water treatment facilities to hospitals.<\/p>\n<p>It\u2019s the command and control features of SCADA systems that make them attractive for critical infrastructure. Because you can measure, say, flow rates in a water treatment facility and adjust them in real time, or regulate and control power output in a nuclear plant, SCADA systems are ubiquitous and important. But they\u2019re also frighteningly vulnerable. As Tom Simonite <a href=\"https:\/\/www.technologyreview.com\/s\/546251\/nsa-hacking-chief-internet-of-things-security-keeps-me-up-at-night\/\"> reports<\/a> in the MIT Security Review, those most in the know are the most concerned. Experts worry that the hyper-connectivity of the IoT-linked SCADA offers an easy target for malicious software and hackers. This is no small problem, and it\u2019s not unlikely that we\u2019ll see coordinated, simultaneous attacks on critical infrastructure in the future.<\/p>\n<h2>Ageing systems are a security nightmare<\/h2>\n<p>In March 2016, Eduard Kovacs <a href=\"http:\/\/www.securityweek.com\/attackers-alter-water-treatment-systems-utility-hack-report\">reports<\/a> in Security week, relatively unsophisticated hackers were discovered by Verizon to have penetrated the SCADA systems of a water utility. Taking advantage of the utility\u2019s antiquated hardware, first acquired in 1988, the hackers moved from customer and payment information to industrial control systems after discovering that \u201cthe internal IP address and admin credentials\u201d were stored on the server. They were then able to adjust the flow rate and chemical treatment of the water. Fortunately, human monitors at the utility noticed before damage was done.<\/p>\n<p>But as Kovacs warns, \u201c\u2026the attackers likely had little knowledge of how the flow control system worked. The attack could have had far more serious consequences if hackers had more time and more knowledge of the targeted industrial control systems (ICS).\u201d Had they been more sophisticated, and had the monitors been automated and digital, they could have tricked the plant into pumping tainted water without anyone being the wiser. These ageing systems are a security nightmare, and terrorists in the know are measuring the potential for a crippling attack.<\/p>\n<p>A recent example of this kind of vulnerability came late in 2015, when a team of hackers disabled a power plant in Ukraine and plunged 80,000 residents into darkness. Writing for Wired, Kim Zetter <a href=\"https:\/\/www.wired.com\/2016\/01\/everything-we-know-about-ukraines-power-plant-hack\/\">notes<\/a> that the attackers were clever enough to \u2018freeze\u2019 the screens of monitoring stations to trick them into thinking everything was normal. It\u2019s this kind of clever, savvy attack that has security experts losing sleep. These outdated security systems are like ticking bombs. The high cost of upgrading entire systems has kept old tech in place long past its \u2018best by\u2019 date. High tech terrorists find it easy to crack security last upgraded in 1988.<\/p>\n<figure id=\"attachment_32307\" aria-describedby=\"caption-attachment-32307\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-32307 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/power-outage-hacking.jpg\" alt=\"A yellow shock warning sign overlaid over powerlines\" width=\"800\" height=\"418\" \/><figcaption id=\"caption-attachment-32307\" class=\"wp-caption-text\">A recent example of this kind of vulnerability came late in 2015, when a team of hackers disabled a power plant in Ukraine and plunged 80,000 residents into darkness.<\/figcaption><\/figure>\n<h2>Hacked water treatment plants could infect millions of people<\/h2>\n<p>If these murderers gain access to a water treatment facility, their goal won\u2019t be to steal information about bill payers but rather to ensure that the water goes untreated for as long as possible. This may sound benign, but it\u2019s a disaster of epic proportion. For instance, 8.7 million people depend on just five water treatment plants in London. If terrorists were able to compromise the SCADA systems in just one of them, allowing untreated water to mix with the clean outflow while tricking the monitors into thinking everything was normal, they could infect millions of people with everything from typhoid to hepatitis A to Giardia lamblia. Everyone, including emergency workers, physicians, and nurses would be infected. The hospital system would be overwhelmed with the sick, and we would expect thousands, if not tens of thousands, of the young, old, and already ill to die. This is nothing less than sophisticated biological warfare. Rob Joyce from the National Security Agency says: \u201cSCADA security is something that keeps me up at night.\u201d Very similar sentiments come from Nicholas Weaver at the International Computer Science Institute. He says: \u201cI don\u2019t do SCADA research because I like to sleep at night.\u201d<\/p>\n<p>We\u2019re completely unprepared and this is cause for worry.<\/p>\n<p> <iframe title=\"Check Point Security Demo for Industrial Control Systems\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/-JS_J_nSoBA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe> <\/p>\n<h2>Even connected medical devices are potential weapons<\/h2>\n<p>Advances in medical technology are giving people longer, fuller lives. For instance, diabetics can now be fitted with a continuous glucose monitor and an insulin pump that adjusts to fluctuations in blood sugar, mimicking the action of a healthy pancreas. Heart patients can now have pacemakers attached to Bluetooth enabled devices that measure and manage their heart rate. Much like the command and control systems for critical infrastructure, these medical devices are like SCADA for the body, connected via the Internet to physicians who monitor, assess, and treat their patients remotely. And in the most advanced medical centres of the next decade, patients\u2019 monitors will be wirelessly connected via a central hub, allowing nurses and physicians real-time access to vital signs and treatment options.<\/p>\n<p>The terrorists of the future are paying attention, and the consequences are almost too frightening to consider. When a doctor can increase the drip rate on an intravenous bag or administer a dose of morphine, so too can a determined hacker. <a href=\"https:\/\/www.wired.com\/2015\/06\/hackers-can-send-fatal-doses-hospital-drug-pumps\/\">According<\/a> to Kim Zetter at Wired, a well-known \u2018white hat\u2019 hacker and security expert started doubting the security of intravenous pumps during a recent hospital stay. Though the hardware systems allowing access to the pump for updates and the firmware that runs the device are \u2018separate\u2019 systems, they are connected by a serial cable. This connection allows a hacker to access the pump\u2019s settings. Rios discovered that not only could a determined hacker change the amount of insulin (or antibiotic, or chemotherapy, or morphine, etc.) that the pump was delivering, but someone with the right skills could also trick the device\u2019s display into reporting the normal dosage. What Billy Rios found was troubling, and comes as no surprise given what we know about other SCADA vulnerabilities and the recent attack on the Ukrainian power plant.<\/p>\n<h2>As more and more medical devices are connected, the danger grows increasingly acute<\/h2>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/keynote\/the-future-of-cybercrime-and-terrorism\/\">The terrorists of the future<\/a> won\u2019t just seize control of SCADA systems, they\u2019ll also trick the monitors into believing that it hasn\u2019t happened. This will vastly increase the time to discovery and allow terrorists to do more damage than they otherwise might. Kaspersky Lab confirmed the same vulnerabilities in hospitals that Verizon discovered in water treatment facilities: they routinely use unsupported, legacy operating systems like Windows XP. It wouldn\u2019t take much for sophisticated terrorists to gain access to these devices, delivering high doses of radiation, for instance, from X-ray equipment. As more and more medical devices are connected, the danger grows increasingly acute.<\/span><\/p>\n<p>The greatest danger we see is that terrorists of the future might launch sophisticated, simultaneous assaults on critical infrastructure. By compromising water treatment, power, and hospitals simultaneously, they could sicken millions, overwhelming the system. By joining this biological attack with broad power outages and hospital hacks, they could kill hundreds of thousands of people.<\/p>\n<p>Inspired by this article? Download our free e-book \u201cTerror tech \u2013 the future on fire\u201d, containing 80 pages of mind blowing facts, quotes, expert opinions, videos and case studies about the future of terrorism.<\/p>\n<p><a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/ebooks\/terrortech-future-fire\/\"><img decoding=\"async\" class=\"alignnone size-full wp-image-17786\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/terrortech_en.png\" alt=\"Terror Tech The future on fire\" width=\"760\" height=\"415\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ageing systems are a security nightmare Hacked water treatment plants could infect millions of people Even connected medical devices are potential weapons As more and more medical devices are connected, the danger grows increasingly acute Communicating freely, smart devices joined by the IoT promise great things. For instance, they allow Supervisory Control and Data Acquisition [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":45086,"parent":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[2885],"tags":[4289,4290,3729,4715],"article-type":[],"trends":[],"class_list":["post-57827","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","tag-attacks","tag-infrastructure","tag-iot","tag-iot-en-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Terror of the SCADA and IoT: coordinated attacks on critical infrastructure - Richard van Hooijdonk Blog<\/title>\n<meta name=\"description\" content=\"The Greatest Threat Today Is Terrorists Launching Sophisticated, Simultaneous Assaults On Critical Infrastructure. &amp;#x2705 Learn About The Future Of Terrorism.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Terror of the SCADA and IoT: coordinated attacks on critical infrastructure - Richard van Hooijdonk Blog\" \/>\n<meta property=\"og:description\" content=\"The Greatest Threat Today Is Terrorists Launching Sophisticated, Simultaneous Assaults On Critical Infrastructure. &amp;#x2705 Learn About The Future Of Terrorism.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Richard van Hooijdonk Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-08T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-01T17:39:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-547592083.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\\\/\"},\"author\":{\"name\":\"Hein\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\"},\"headline\":\"Terror of the SCADA and IoT: coordinated attacks on critical infrastructure\",\"datePublished\":\"2017-01-08T22:00:00+00:00\",\"dateModified\":\"2019-08-01T17:39:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\\\/\"},\"wordCount\":1288,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock-547592083.jpg\",\"keywords\":[\"attacks\",\"infrastructure\",\"iot\",\"iot\"],\"articleSection\":[\"Cybercrime\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\\\/\",\"name\":\"Terror of the SCADA and IoT: coordinated attacks on critical infrastructure - Richard van Hooijdonk Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock-547592083.jpg\",\"datePublished\":\"2017-01-08T22:00:00+00:00\",\"dateModified\":\"2019-08-01T17:39:32+00:00\",\"description\":\"The Greatest Threat Today Is Terrorists Launching Sophisticated, Simultaneous Assaults On Critical Infrastructure. &#x2705 Learn About The Future Of Terrorism.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock-547592083.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock-547592083.jpg\",\"width\":800,\"height\":526,\"caption\":\"A hacker in a hoodie typing on a laptop, with lines of code in the background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/keynotespreker-trendwatcher-en-futurist\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Terror of the SCADA and IoT: coordinated attacks on critical infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"name\":\"Richard van Hooijdonk Blog\",\"description\":\"Keynote speaker, trendwatcher and futurist\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\",\"name\":\"Richard van Hooijdonk BV\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"width\":100,\"height\":72,\"caption\":\"Richard van Hooijdonk BV\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\",\"name\":\"Hein\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"caption\":\"Hein\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Terror of the SCADA and IoT: coordinated attacks on critical infrastructure - Richard van Hooijdonk Blog","description":"The Greatest Threat Today Is Terrorists Launching Sophisticated, Simultaneous Assaults On Critical Infrastructure. &#x2705 Learn About The Future Of Terrorism.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Terror of the SCADA and IoT: coordinated attacks on critical infrastructure - Richard van Hooijdonk Blog","og_description":"The Greatest Threat Today Is Terrorists Launching Sophisticated, Simultaneous Assaults On Critical Infrastructure. &#x2705 Learn About The Future Of Terrorism.","og_url":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/","og_site_name":"Richard van Hooijdonk Blog","article_published_time":"2017-01-08T22:00:00+00:00","article_modified_time":"2019-08-01T17:39:32+00:00","og_image":[{"width":800,"height":526,"url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-547592083.jpg","type":"image\/jpeg"}],"author":"Hein","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hein","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/#article","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/"},"author":{"name":"Hein","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37"},"headline":"Terror of the SCADA and IoT: coordinated attacks on critical infrastructure","datePublished":"2017-01-08T22:00:00+00:00","dateModified":"2019-08-01T17:39:32+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/"},"wordCount":1288,"publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-547592083.jpg","keywords":["attacks","infrastructure","iot","iot"],"articleSection":["Cybercrime"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/","url":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/","name":"Terror of the SCADA and IoT: coordinated attacks on critical infrastructure - Richard van Hooijdonk Blog","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-547592083.jpg","datePublished":"2017-01-08T22:00:00+00:00","dateModified":"2019-08-01T17:39:32+00:00","description":"The Greatest Threat Today Is Terrorists Launching Sophisticated, Simultaneous Assaults On Critical Infrastructure. &#x2705 Learn About The Future Of Terrorism.","breadcrumb":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/#primaryimage","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-547592083.jpg","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-547592083.jpg","width":800,"height":526,"caption":"A hacker in a hoodie typing on a laptop, with lines of code in the background"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/terror-of-the-scada-and-iot-coordinated-attacks-on-critical-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.richardvanhooijdonk.com\/en\/keynotespreker-trendwatcher-en-futurist\/"},{"@type":"ListItem","position":2,"name":"Terror of the SCADA and IoT: coordinated attacks on critical infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/blog.richardvanhooijdonk.com\/#website","url":"https:\/\/blog.richardvanhooijdonk.com\/","name":"Richard van Hooijdonk Blog","description":"Keynote speaker, trendwatcher and futurist","publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.richardvanhooijdonk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization","name":"Richard van Hooijdonk BV","url":"https:\/\/blog.richardvanhooijdonk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","width":100,"height":72,"caption":"Richard van Hooijdonk BV"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37","name":"Hein","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","caption":"Hein"}}]}},"_links":{"self":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/57827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/comments?post=57827"}],"version-history":[{"count":0,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/57827\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media\/45086"}],"wp:attachment":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media?parent=57827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/categories?post=57827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/tags?post=57827"},{"taxonomy":"article-type","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/article-type?post=57827"},{"taxonomy":"trends","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/trends?post=57827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}