7KLVFDPHDIHZZHHNVDIWHUWKH&\EHUVHFXULW\DQG,QIUDVWUXFWXUH6HFXULW\
$JHQF\&,6$ZLWKLQWKH'+6ZDUQHGDERXWD³UHFHQWULVHLQPDOLFLRXVF\EHU
DFWLYLW\ ́IURP,UDQ7KH86UHSRUWHGO\KLW,UDQZLWKF\EHUDWWDFNVLQ-XQH
DIWHUDQ,UDQLDQLQWHOOLJHQFHJURXSDWWDFNHGRLOWDQNHUVDQGGURQHVLQWKH6WUDLW
RI+RUPX]
“Iranian regime actors and proxies are increasingly using destructive ‘wiper’
DWWDFNVORRNLQJWRGRPXFKPRUHWKDQMXVWVWHDOGDWDDQGPRQH\7KHVHH̆RUWV
are often enabled through common tactics like spear phishing, password
VSUD\LQJDQGFUHGHQWLDOVWẊQJ ́VDLG&,6$'LUHFWRU&KULVWRSKHU&
.UHEV³:KDWPLJKWVWDUWDVDQDFFRXQWFRPSURPLVHZKHUH\RXWKLQN\RX
PLJKWMXVWORVHGDWDFDQTXLFNO\EHFRPHDVLWXDWLRQZKHUH\RX¶YHORVW\RXU
ZKROHQHWZRUN ́
US INSECURITIES
&RPSOLFDWLQJPDWWHUVLVWKHVWDWHRI86LQIUDVWUXFWXUH:HNQRZDERXWWKH
potholes and crumbling bridges, but what about the gadgets and software
powering critical systems?
“Most of the devices that run the world’s infrastructure were never designed to
EHVHFXUH ́0LFKDHO65RJHUVIRUPHU16$'LUHFWRUDQG&RPPDQGHURI86
&\EHU&RPPDQGZURWHLQD-XO\RSHG³7KHZRUOG¶VFULWLFDOLQIUDVWUXFWXUHUXQV
on dozens of obscure and old protocols, many of which are proprietary to a
VPDOOQXPEHURIPDQXIDFWXUHUVDQGGL̇FXOWWRSDUVH ́
0RUHRYHUWKHPLOLWDU\LVVWLOOVFUDPEOLQJWRDVVHPEOHDQGVWD̆XSQHZF\EHU
DQGHOHFWURQLFZDUIDUHXQLWV7ZRUHFHQWO\DFWLYDWHG$UP\XQLWV²WKHWK
&\EHU:DUIDUH6XSSRUW%DWWDOLRQEDVHGRXWRI)RUWRUGRQHRUJLDDQGWKH
,QWHOOLJHQFH&\EHU(OHFWURQLF:DUIDUHDQG6SDFH,&(:6XQLW²JRWXSDQG
UXQQLQJDWDQDFFHOHUDWHGSDFHDQGDUHFXUUHQWO\XQGHUVWD̆HGDFFRUGLQJWRDQ
$XJXVWRYHUQPHQW$FFRXQWDELOLW\2̇FH$2UHSRUW
$VRI0DUFKWKHWKKDG¿OOHGRQO\RIDXWKRUL]HGSRVLWLRQVIRU
¿VFDO\HDU,&(:6KDG¿OOHGRISRVLWLRQVLQSDUWEHFDXVHWKH
Army is having trouble convincing possible recruits to work for the military
LQVWHDGRIWDNLQJFXVK\6LOLFRQ9DOOH\SRVLWLRQV