US Gas: The $12 Million Gas Leak Hack – Invisible or Inevitable?

Description

$12M. Two Days. One Click.

On February 18, 2020, the Russian “Wizard Spider” group used a simple phishing link to steal credentials and breach a U.S. gas pipeline facility. With remote access exposed and firewalls misconfigured, malware jumped from IT to OT, encrypted critical systems, and shut down operations for two days — costing $12 million in downtime and recovery.

No zero-day. No advanced exploit. Just stolen credentials and unrestricted lateral movement.

In this video, we break down how it happened — and how BlastWave’s network cloaking, passwordless MFA, and microsegmentation would have made stolen credentials useless, blocked lateral movement, and kept OT systems invisible to attackers.

Learn how BlastWave could have prevented this — and 22 other real-world attacks — in our new Hackopedia.

Don’t let your network become the next case study.