Skip to main content

tv   Shift  Deutsche Welle  February 25, 2023 6:15pm-6:31pm CET

6:15 pm
in species of bees and night, ye may st ts at the little go in tatum for mexico's leader abbey less whose only wishes will her, terminally ill father not to die better than to love his prosper you up to die shiranda w coming up next is our take shy shift is more d, w dot com and on social media to that they don't use. i'm doward rate in berlin. thanks for watching, stating that i wish i could have done more the save. you discover stories that me just a click away. find out best documentary on youtube. oh, really?
6:16 pm
mm hm. morning. see the world as you've never seen it before. describe now t d w documentary. these places in europe or smashing all the records, stepped into a bold adventure. it's the treasure map for modern globetrotters. discover some of you to record breaking sites on your back too. and now also in book form with phone calls, shopping traffic, nothing works without digital networks. unfortunately, our systems are poorly equipped against hackers. how can you protect critical infrastructure against cyber attacks? that's our topic on shift today. ah heck, a ceiling data, installing malware, even shutting down and tie
6:17 pm
a cities hardly a day goes by without a cyber attack being reported somewhere in the world. experts, one critical infrastructure must be protected. what does that mean exactly? traditionally, such critical infrastructure is built to run autonomy. lee hospitals, for example, have emergency generators to maintain life support systems during a power outage. but in the last 2 decades, much of this infrastructure has been connected to the internet to function. they need access to servers, and these are located all over the world. it's an invisible network of digital systems that is developed over the years, elements of critical infrastructure unconnected even across borders. this means individual components increasingly depend on one another. a wind farm and germany is connected to u. s. satellites. for example, if the satellites fail, the wind turbines come to a standstill. ah,
6:18 pm
what's particularly alarming critical infrastructure is not only threatened by individual cyber criminals, state institutions can also be behind the attacks. there were also cyber attacks during the 1st days of the war and ukraine. literally, as russian tanks rolling over the border into ukraine. we also saw digital components to the attack, including an attack on a satellite network. one that's even used by weight turbines, in germany. any disruption to be invisible, digital connections can result in a domino effect. this can put the critical infrastructure of an entire society at risk. cyber attacks usually don't make a grand entrance. them a quiet and inconspicuous a careless click in an email on a website can open the door to heck us companies and even government institutions can be affect it in the background into, to gain access to further service in the network. only once these hackers take over
6:19 pm
a large part of the digital structure, they strike openly. this is possible because the digital networks are so large and old methods of cyber security, i'm no longer effective. classic model would be almost like a chassis, with a mo, everything inside would be precious and everything outside would be malicious. this is a mode of the doesn't work in the post covered age where we are connecting from everywhere . the question is no more willing to take her get in because every one knows in a take a, we'll get it. you have to protect yourself. finding out when someone gets in and the best cases finding it out very on a very early stage. but why do at tech center easily succeed in hacking networks? almost every company now has cyber security experts. and they are constantly installing you anti virus software all firewalls. but even the best security measures fil, again and again, because of the same problem, people i t experts i've been eclipse,
6:20 pm
tough the story of the day when hackers shut down the systems in the administration . she supervisors. sabina creeps is the chief digital officer and the county of am had bits of felt, an area between berlin and light safe home to around a 160000 people. in the summer of 2021, the counties administration fell victim to a cyber attack. this visit would be, it was early in the morning at 6 30 am the 1st call reached the i t department that someone turned on the computer and said nothing's working here right now. yeah, files are encrypting it vatton home. i was working from home and got a call at taking the time when i went in, we still assume we have an attack now that will be solved in a very short time. it's inadequate and that i everything will be resolved within the next few days. oh, treatises compatible, but mall cool started coming in employees from all over the
6:21 pm
district complained that their computers had stopped working. the i t expert team such the system and came across a ransom note because i'm happy to set you up as well as that that's i think they were addressing us personally. and cuz someone had clearly spent time in preparing this attacked. and that's when they knew this wasn't just another cyber attack. this time it was really serious. because since at 2nd, when the computer, if the i t administrator with all the rights encrypted itself, that's when we knew we had a problem. the hackers were part of a group called pay all grief. they demanded $500000.00 euros as a ransom paid and the crypto currency manero. the i t manager at the time, oliver humph. explains why the district decided not to pay obama said of an i was going over time, we had to ask ourselves,
6:22 pm
it was okay if we pay the ransom now because we really good key them. oh, we knew they had been in our system. oh, but who's to they didn't put some back doors to attack again and encrypt again. but how did the heck us get into the system? in the benefit example, it is no longer possible to fully find out because whether its the road traffic authority or the registry office, people everywhere looked with network computing systems to can access without anyone noticing their various tricks and methods. at the beginning of a cyber attack, intruders try to gain access to the computer network. they use various methods. currently so called fishing a most of the most successful trick to access systems. one click on a supposedly secure attachment or link will install malware on a computer. intruders can then still passwords and access codes. often, they disguised themselves as trusted contacts, and nor people into revealing their log in data. this type of credential theft
6:23 pm
relies on other people's good faith poorly secured servers that haven't been updated with the latest security updates can be an easy way into the network for hackers. once inside, the intruders can spend weeks or even months looking for important information. to look for data so valuable that people would pay money to get it back when they find what they're looking for. they encrypt the data and send a message to their victims, offering a decryption key in return for a ransom. victims are left for 2 options to pay up and trust that they get their data back or to refuse and hope that they can recover some of the hijacked data. and that's not all. the hackers often threatened with double extortion. they don't
6:24 pm
on encrypt the data of their victims, but also publish sensitive information on the dock web. if no random this page at the end of 2022 sensitive data from a major, austria and health insurance company ended up on the dock web. personal information was released about policyholders, who were treated for substance abuse stds or abortions. the heck us want to pressure the insurance company to pay, put a secured service of large companies can become a threat to individual customers. and this was an, an i faded case for cyber security analyst. karen ellis, sorry. it's a booming industry. and it's an industry that has managers, planners, developers, criminal groups, took advantage of the call with demick, and the changes to all of our lives, to attack health care institutions, public institutions, local authorities, critical infrastructure around the world is at the mercy of these cyber attacks. and hackers look for the targets where they expect the greatest profit most in
6:25 pm
north america and western europe. but also other regions are hit by these well coordinated attacks. in 2019 attackers broke into the network of india's largest nuclear power station. in 2021, an attack on a pipeline provider led to panic, buying and gas shortages in the u. s. and in 2022. hackers paralyzed the computer systems of the government of costa rica. each of these incidents had impact locally in the country or the region where it happened. however, should an adversary a cyber attack group decide to launch several attacks at the same time simultaneously in many different countries around the low. the impact to that would be potentially devastating. can a cyber attack, excess shut down an anti a nation? as a result of digitization and recent years,
6:26 pm
some parts of infrastructure have undergone massive changes. and many things can no longer be done without digital systems. now back to our case from germany, how exactly did the attack impact the critical infrastructure? as mentioned elsewhere, you don't see from the outside is that the software? if the offices is connected within our i t infrastructure, put one does nothing works anymore. no cash register software, no alarm system. in the small county in the middle of germany, the public infrastructure failed completely. all authorities responsible for around 160000 people had to close. the citizens were worried, elemental attack they forwarded. hipa wonder can the office stump out welfare, alimony, or benefits for the elderly? and i think he follows the science. only very slowly did it become clear what impact the cyber attack had on both the population and the administration. alameda, still it looks like it's a hell of a lot of elevator. we've lost all e mails and the last 20 years,
6:27 pm
they're all gone and we'll never get them back reading we're little. but how do i explain that to my colleagues and employees? sorry, everything's gone home because many use their e mail system as a filing system and an archive system to store all the emails there are that you made such by young to oh, making forget click. the situation was so messy that the district declared a state of emergency that normally only happens during natural disasters like huge floods, but not because of a cyber attack. ah, that way the armed forces could send their cyber experts to help the authorities regain control of the network. ethan's fans that really helped us because at the time our i t team did not have enough manpower about the fine. it still took weeks until the authorities were slowly operating. again this had a massive impact on the people in the region. the full car dealership, for example, couldn't register any new vehicles for
6:28 pm
a period of 4 weeks as the authorities in question weren't able to work. and without license plates, cars couldn't be delivered to new owners. sales came to a halt, a bitter loss for the company. ah, ah, once is indeed that quarter, we made a loss of approximately $750000.00 euros, follow it up on and all it took the county about a year to repair all the systems, not to mention the financial damage. the threat of cyber crime is growing. that's why we need to know more about everything that's interconnected in our society. have you ever been affected by a cyber attack? let us know on youtube or d, w dot com. that's it from me to day. see again, next time, bye. ah ah
6:29 pm
ah, hello and welcome to the 77 percent. in this edition, we're going to talk about love relationship. and of course, great. we also wanted to find out what people to each other and what makes relationships, why he loved me, be me. and i listen here with the 77 percent on d. w. what making the headlines and what's behind d. w. news africa. the show that was the issues shaping the continent. life is slowly getting back to normally on the streets to give you enough report on the inside our correspondence on the ground reporting from across the continent. all of
6:30 pm
the trends doesn't matter to you. in 60 minutes on d, w. d w's crime fighters are back with africa is the most successful radio drama series continues. remember, all episodes are available online. course you can share and this goes on d, w, africa's facebook page and other social media platforms, crime fighters, tune in now or hello and welcome to the 77 percent. my name is edith kimani and i'm coming to you from the hot of no ruby in the special edition of the 77 percent. we're going to talk about love relationships and of course hot break. we'll find out what attracts me.

26 Views

info Stream Only

Uploaded by TV Archive on