Editing Article Page
Title
Content
<div id='article-page'><div id='article-content' data-media-url='//news-app-staging.s3.amazonaws.com' data-base-url='//news-app-staging.herokuapp.com' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/A.wav' data-capture-url='//staging.analytics.lingraphica.com/events/capture_news' data-article-title='Cyberattack Shuts Down Major US Fuel Pipeline' data-article-id='5634'><script src='//news-app-staging.herokuapp.com/javascripts/getscripts.js'></script><link rel='stylesheet' href='//news-app-staging.herokuapp.com/stylesheets/article.css' type='text/css' /><div class='article'><p><span data-start-time='0' data-end-time='12104'>A major U.S. fuel pipeline remains largely shut down Monday after a cyberattack caused service to be suspended.</span> <span data-start-time='12104' data-end-time='26333'>The incident, reported Friday, led to the shutdown of a main fuel line operated by Colonial Pipeline, a company based in Georgia. </span> <span data-start-time='26333' data-end-time='35042'>The pipeline carries gasoline and other fuel from Texas to the U.S. Northeast. </span> <span data-start-time='35042' data-end-time='45542'>The company says it supplies about 45 percent of all the fuel used on the U.S. East Coast.</span> <span data-start-time='45542' data-end-time='56583'>Some are considering the cyberattack the most damaging so far against important U.S. infrastructure.</span> <span data-start-time='56583' data-end-time='67500'>Colonial said Monday it hopes to have most of its fuel transportation system running again by the end of the week. </span> <span data-start-time='67500' data-end-time='83563'>The company is in the process of restarting its network, which transports over 2.5 million barrels of gasoline, diesel and jet fuel each day.</span> <span data-start-time='83563' data-end-time='89625'>The company says it was hit by a ransomware attack. </span> <span data-start-time='89625' data-end-time='104354'>In such attacks, online attackers infect the computer systems of organizations and hijack information in a way that leaves it unreadable. </span> <span data-start-time='104354' data-end-time='114021'>The attacker then demands payment in exchange for returning the information to a readable state.</span> <span data-start-time='114021' data-end-time='119688'>Law enforcement agencies are investigating the incident. </span> <span data-start-time='119688' data-end-time='131375'>The Federal Bureau of Investigation (FBI) said Monday the attack was carried out by a criminal group known as DarkSide.</span> <span data-start-time='131375' data-end-time='145396'>A news release issued Monday in the name of DarkSide stated its purpose, but did not name Colonial Pipeline, Reuters news agency reported. </span> <span data-start-time='145396' data-end-time='154646'>“Our goal is to make money, and not creating problems for society,” the group said.</span> <span data-start-time='154646' data-end-time='172000'>Cybersecurity experts who have studied DarkSide say the group appears to be made up of experienced cybercriminals who aim to get as much money as they can from their targets.</span> <span data-start-time='172000' data-end-time='184708'>They're very new but they're very organized, said Lior Div, chief of Cybereason, a security company based in Boston.</span> <span data-start-time='184708' data-end-time='195021'>DarkSide claims it does not attack hospitals, nursing homes or educational or government targets. </span> <span data-start-time='195021' data-end-time='201229'>It says it donates part of the money it receives to charity. </span> </p></div><div class='control-buttons-sticky' style='display:none;'><div class='control-buttons'><button title='Back' class='back' disabled='disabled'></button><button title='Play' class='play' disabled='disabled'></button><button title='Pause' class='pause' style='display:none;'></button><button title='Forward' class='forward' disabled='disabled'></button><button class='finished-reading' style='display:none;'>Done</button></div></div></div><div id='article-media'><div id='media-image'><img src='https://news-app-production.s3.amazonaws.com/articles/5068/A.jpeg'/></div></div><div id='question-content' style='display:none;'><div class='vocabulary_question question-container' data-question-id=17404 data-hint-location='0' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/what_is_a_cyberattack.wav'>What is a cyberattack?</div><div class='choices' data-correct-choice='An attempt to gain illegal access to a computer or computer system for the purpose of causing damage or harm'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/an_attempt_to_gain_entirely_legal_access_to_a_computer_or_network.wav'><span>An attempt to gain entirely legal access to a computer or network</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/a_fictional_event_in_scifi_movies.wav'><span>A fictional event in sci-fi movies</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/an_attempt_to_gain_illegal_access_to_a_computer_or_computer_system_for_the_purpose_of_causing_damage_or_harm.wav'><span>An attempt to gain illegal access to a computer or computer system for the purpose of causing damage or harm</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/to_involuntarily_take_uncontrolled_deep_audible_breaths.wav'><span>To involuntarily take uncontrolled deep audible breaths</span></div></div></div><div class='multiple_choice_question question-container' data-question-id=17405 data-hint-location='83563' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/what_type_of_cyberattack_did_the_attackers_use.wav'>What type of cyberattack did the attackers use?</div><div class='choices' data-correct-choice='ransomware'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/ransomware.wav'><span>ransomware</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/phishing.wav'><span>phishing</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/maninthemiddle_attack.wav'><span>man-in-the-middle attack</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/sneak_attack.wav'><span>sneak attack</span></div></div></div><div class='sentence_completion_question question-container' data-question-id=17406 data-hint-location='26333' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/the_pipeline_carries__blank__and_other_fuel_from_texas_to_the_us_northeast_.wav'>The pipeline carries <span class='blank'>gasoline</span> and other fuel from Texas to the U.S. Northeast. </div><div class='choices' data-correct-choice='gasoline'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/gasoline.wav'><span>gasoline</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/water.wav'><span>water</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/gatorade.wav'><span>Gatorade</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/5068/coal.wav'><span>coal</span></div></div></div><div class='question-buttons'><button class='skip-button'></button><button class='hint-button'></button><button class='speak-button'></button></div></div></div>
Sound name
https://news-app-production.s3.amazonaws.com/articles/5068/A.wav
Show
|
Back