Cybersecurity

If ransomware can shut the US energy 'jugular', what might it do to you? The head of Homeland Security talks to Radio Davos

ransomware: A bagged nozzle at a pump notifies motorists that it no longer has fuel after a cyberattack crippled the biggest fuel pipeline in the country, run by Colonial Pipeline, in Chapel Hill, North Carolina, U.S. May 12, 2021.  REUTERS/Jonathan Drake     TPX IMAGES OF THE DAY - RC2GEN9BAZ2Z

A bagged nozzle at a pump notifies motorists that it no longer has fuel after a cyberattack crippled the biggest fuel pipeline in the country, run by Colonial Pipeline, in Chapel Hill, North Carolina. Image: REUTERS/Jonathan Drake

Robin Pomeroy
Podcast Editor, World Economic Forum
Loading...
  • Colonial Pipeline attack shut down vast chunk of US oil distribution.
  • Incident laid bare vulnerability of public services to ransomware hackers.
  • Radio Davos examines what ransomware is and how it works.
  • The latest episode also features an exclusive interview with head of US Homeland Security.

At 5.30 in the morning of 7 May, an employee of a company called Colonial Pipeline found a ransom note from hackers on a work computer. By the end of the day, the pipeline that provides roughly 45% of fuel to the East Coast of the United States was shut down and soon people were panic-buying gasoline because of fears how long the stoppage would last.

The pipeline is open again now, but not before the company paid $4.4 million in ransom.

Have you read?

Ransomware is a big, international criminal enterprise, but what exactly is it and what can be done to stop it?

Radio Davos hears from two experts from the World Economic Forum's Centre for Cybersecurity and from Alejandro Mayorkas, U.S. Secretary of Homeland Security.

Alejandro Mayorkas, U.S. Secretary of Homeland Security
Alejandro Mayorkas, U.S. Secretary of Homeland Security Image: WEF/screengrab
Loading...

For more information on the Centre for Cybersecurity, click here. And from Homeland Security, here.

Loading...

Useful news stories:

Meet the Leader episode mentioned in this episode:

Loading...

Find all our podcasts here.

Join the World Economic Forum Podcast Club on Facebook.

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Stay up to date:

Cybersecurity

Related topics:
CybersecurityResilience, Peace and Security
Share:
The Big Picture
Explore and monitor how Cybersecurity is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

3 key factors to make your cybersecurity training a success

Rob Rashotte

October 30, 2024

We must reduce complexity to ensure strong cybersecurity. Here's why

About us

Engage with us

  • Sign in
  • Partner with us
  • Become a member
  • Sign up for our press releases
  • Subscribe to our newsletters
  • Contact us

Quick links

Language editions

Privacy Policy & Terms of Service

Sitemap

© 2024 World Economic Forum