{"id":12889,"date":"2018-09-16T13:51:27","date_gmt":"2018-09-16T13:51:27","guid":{"rendered":"http:\/\/b2103f7a-149b-47c0-8350-81e3ed81a817"},"modified":"2018-09-16T13:51:27","modified_gmt":"2018-09-16T13:51:27","slug":"critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/","title":{"rendered":"Critical infrastructure will have to operate if there&#8217;s malware on it or not"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2016\/07\/20\/3826fe33-7c35-4e0a-aadb-5891b7889904\/46076de54ea33d8b4824784259ec0b30\/istock-internet-of-things.jpg\" class=\"\" alt=\"istock-internet-of-things.jpg\"\/><\/span><span class=\"credit\">Getty Images\/iStockphoto<\/span><\/p>\n<p>As threats and cyber-attacks on critical infrastructure are expected to intensify in the near future, cyber-security experts believe that companies and government agencies should be prepared to operate networks even if there&#8217;s malware or a threat actor on the network or not.<\/p>\n<p>The idea is that cyber-attacks should not cause downtime of any form, and networks should be designed in a way that an attacker&#8217;s presence does not affect the network&#8217;s availability for end users.<\/p>\n<p>Experts who believe in this approach are Major General Robert Wheeler, retired US Air Force, and former Deputy Chief Information Officer for Command, Control, Communications and Computers (C4) and Information Infrastructure Capabilities (DCIO for C4IIC), US Air Force.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/state-department-shamed-for-poor-adoption-of-multi-factor-authentication\/\" target=\"_blank\">State Department shamed for poor adoption of multi-factor authentication<\/a><\/strong><\/p>\n<p>The Major General expressed this viewpoint in a <a href=\"https:\/\/virsec.com\/virsec-security-expert-series-features-cybersecurity-leaders-debuts-with-maj-gen-robert-wheeler-usaf-ret-on-protecting-critical-infrastructure-from-cyberattacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">webinar<\/a> organized this past week by California-based cyber-security firm Virsec.<\/p>\n<p>&#8220;That&#8217;s where we have to go,&#8221; Maj. Gen. Wheeler said. &#8220;Many of the networks of our lives, whether it&#8217;s critical infrastructure or whether it&#8217;s going to be networks in the future, in smart cities, they&#8217;re going to have to operate whether it&#8217;s malware or in or not.&#8221;<\/p>\n<p>&#8220;That&#8217;s a different concept,&#8221; Maj. Gen. Wheeler added, referring to the fact that most networks weren&#8217;t even designed with security in mind, let alone to working with threat actors present on them all the time.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>&#8220;We had networks that were designed to move data around to be helpful, so we played all the quirks that were required at that particular time. [The networks] weren&#8217;t designed to protect you from cyber-security [threats], and as soon as we thought there was a bad guy in it, we shut it down. It was that simple,&#8221; he said.<\/p>\n<p>&#8220;You can&#8217;t do that anymore. They are critical to our command and control, they are critical to our common operating picture, they are critical to the control of different systems within there.<\/p>\n<p>&#8220;So given that particular aspect, we have to operate on this. We have to operate; whether it&#8217;s a critical infrastructure, whether it&#8217;s an election, [&#8230;] or a bank, we can&#8217;t shut their doors for two weeks why they try to figure it out. They&#8217;re gonna have to operate with a bad guy on the network,&#8221; he added.<\/p>\n<p>&#8220;How are they gonna do that? They have to isolate it, they only have to execute those execution pieces that are part of their operation and they&#8217;re not gonna be able to rely on perimeter defense,&#8221; the Maj. General added.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/data-breaches-affect-stock-performance-in-the-long-run-study-finds\/\" target=\"_blank\">Data breaches affect stock performance in the long run, study finds<\/a><\/strong><\/p>\n<p>But Maj. General Wheeler also touched on what attackers are doing when they break into these networks, while also expressing some fears of how the attacks are evolving and what type of damage these cyber-attacks could cause in the future.<\/p>\n<p>&#8220;They used to be kind of obtrusive in the past, smash-and-grab, as I call them. Like in a store where you go and grab all the jewelry, and go. That was always kind of what they were doing, grabbing all the data.<\/p>\n<p>&#8220;Now, they&#8217;re spending a lot more time observing, spending time in there digging deep, having multiple backdoors, [&#8230;] and having it that even if you&#8217;re aware what happened it&#8217;s very difficult for you to actually figure out how to stop them. That&#8217;s one that bothers me,&#8221; the Maj. General said.<\/p>\n<p>&#8220;The other one is more of a data attack,&#8221; he added, &#8220;and I don&#8217;t mean a data attack cause they&#8217;re exfiling the data, or stealing intellectual property, but changing the data.<\/p>\n<p>&#8220;So, if you&#8217;re a bank or something, and you&#8217;re worried about something, and somebody is trying to get back at you, one of the ways they&#8217;ll do that, obviously, is to continuously change the bank account numbers, and scramble them.<\/p>\n<p>&#8220;Those kind of things, where you change the data, scare me,&#8221; Maj. General Wheeler adds. &#8220;I think you&#8217;re going to see that, and not only in banks but in all sorts of things.&#8221;<\/p>\n<p>&#8220;In the future, when it comes to big data, as big data becomes more and more important, scrambling the information coming from sensors is a really new technique to get the answer [result] that you want.<\/p>\n<p>&#8220;And that&#8217;s a problem. It&#8217;s not a traditional attack, but it&#8217;s one that&#8217;s extremely sophisticated and has the ability to make some high changes. Whether it&#8217;s the elections, which scares me to death, whether it&#8217;s actual evidence-based, whether it&#8217;s climate, whether it&#8217;s some kind of other large pandemic issue, and these kind of things can cause massive damage at one point.&#8221;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/apple-amazon-google-others-called-to-testify-on-consumer-privacy-protections\/\" target=\"_blank\">Apple, Amazon, Google, others called to testify on consumer privacy protections<\/a><\/strong><\/p>\n<p>Asked by <em>ZDNet<\/em> what he regarded as the biggest problem to securing these critical infrastructure networks, the Maj. General replied.<\/p>\n<p>&#8220;The biggest challenge is that there is a general lack of understanding of the threat across the government. For many, if they can&#8217;t see it, and if they haven&#8217;t been directly affected yet, it doesn&#8217;t exist,&#8221; the Maj. General told <em>ZDNet<\/em> via email.<\/p>\n<p>&#8220;Before we can improve our tools and training, or adopt meaningful legislation, we must bridge this fundamental knowledge gap.<\/p>\n<p>&#8220;We also need to establish stronger standards (through organizations like NIST), a rapid response group and a set of policies that can deal with other countries\/entities that attack our infrastructure.&#8221;<\/p>\n<p>&#8220;The attacks in the Ukraine have certainly raised concern for those managing critical infrastructure across industries,[<a href=\"https:\/\/www.wired.com\/story\/russian-hackers-attack-ukraine\/\" target=\"_blank\" rel=\"noopener noreferrer\">1<\/a>, <a href=\"https:\/\/www.npr.org\/2017\/06\/22\/533951389\/experts-suspect-russia-is-using-ukraine-as-a-cyberwar-testing-ground\" target=\"_blank\" rel=\"noopener noreferrer\">2<\/a>]&#8221; Gen. Wheeler added. &#8220;We are seeing increased investment in security technology, but there&#8217;s a long way to go. The is a big gap between IT and OT (operational technology) in terms of security. Most of our critical systems were built with the idea that they are air-gapped &#8211; not connected to the outside world and therefore inherently secure. In practice, air-gaps are an anachronism and are increasingly bypassed by advanced attacks.&#8221;<\/p>\n<p>All in all, the idea that Maj. Gen. Wheeler is trying to get across is that attacks on critical infrastructure networks are bound to happen at one point or another, as threat actors are starting to comprehend the type of damages they could cause by attacking these weak points in every nation&#8217;s defenses, weak points that have been increasingly exposed online in the past two decades.<\/p>\n<p>Changes are needed in the way these networks are being built, managed, and protected so an attacker should never have the ability to trigger a downtime.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Retired US Air Force cyber-security expert shares his thoughts on the future of critical infrastructure security.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":12890,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-12889","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Critical infrastructure will have to operate if there&#039;s malware on it or not 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical infrastructure will have to operate if there&#039;s malware on it or not 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-16T13:51:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"511\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Critical infrastructure will have to operate if there&#8217;s malware on it or not\",\"datePublished\":\"2018-09-16T13:51:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\\\/\"},\"wordCount\":1119,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\\\/\",\"name\":\"Critical infrastructure will have to operate if there's malware on it or not 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not.jpg\",\"datePublished\":\"2018-09-16T13:51:27+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not.jpg\",\"width\":770,\"height\":511},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical infrastructure will have to operate if there&#8217;s malware on it or not\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical infrastructure will have to operate if there's malware on it or not 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/","og_locale":"en_US","og_type":"article","og_title":"Critical infrastructure will have to operate if there's malware on it or not 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-09-16T13:51:27+00:00","og_image":[{"width":770,"height":511,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Critical infrastructure will have to operate if there&#8217;s malware on it or not","datePublished":"2018-09-16T13:51:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/"},"wordCount":1119,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/","url":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/","name":"Critical infrastructure will have to operate if there's malware on it or not 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not.jpg","datePublished":"2018-09-16T13:51:27+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not.jpg","width":770,"height":511},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastructure-will-have-to-operate-if-theres-malware-on-it-or-not\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Critical infrastructure will have to operate if there&#8217;s malware on it or not"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/12889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=12889"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/12889\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/12890"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=12889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=12889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=12889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}