TRITON attackers detected at another critical infrastructure facility

The attackers who were first spotted wielding the custom TRITON framework have targeted another critical infrastructure facility, FireEye researchers have revealed on Wednesday. Although, since they seem to have been active since at least 2014, its qui… Continue reading TRITON attackers detected at another critical infrastructure facility

90% of OT organizations are cyberattack victims, yet visibility into OT systems is still limited

90% of OT organizations stated their environments had been damaged by at least one cyberattack over the past two years, with 62% experiencing two or more attacks. These are the results of the Tenable “Cybersecurity in Operational Technology: 7 In… Continue reading 90% of OT organizations are cyberattack victims, yet visibility into OT systems is still limited

Main threat source to industrial computers? Mass-distributed malware

Malicious cyber activities on Industrial Control System (ICS) computers are considered an extremely dangerous threat as they could potentially cause material losses and production downtime in the operation of industrial facilities. Attack workflow In 2… Continue reading Main threat source to industrial computers? Mass-distributed malware

Denial of Service vulnerability discovered in Triconex TriStation Software Suite Emulator

Applied Risk ICS Security Consultant Tom Westenberg discovered a DoS vulnerability in an emulated version of the Triconex TriStation Software Suite. Triconex is a Schneider Electric brand which supplies systems and products in regards to critical contr… Continue reading Denial of Service vulnerability discovered in Triconex TriStation Software Suite Emulator

Exploitation of vulnerabilities in Moxa industrial switches could disrupt communication between ICS components

Positive Technologies experts Ivan Boyko, Vyacheslav Moskvin, and Sergey Fedonin have discovered multiple vulnerabilities in Moxa industrial switches in the EDS-405A, EDS-408A, EDS-510A, and IKS-G6824A series. These switches are used to build industria… Continue reading Exploitation of vulnerabilities in Moxa industrial switches could disrupt communication between ICS components

Rockwell Automation industrial energy meter vulnerable to public exploits

A low-skilled, remote attacker could use publicly available exploits to gain access to and mess with a power monitor by Rockwell Automation that is used by energy companies worldwide, ICS-CERT warns. All versions of Rockwell Automation’s Allen-Br… Continue reading Rockwell Automation industrial energy meter vulnerable to public exploits

Robert M. Lee’s & Jeff Hass’ Little Bobby Comics: ‘ICS’

via the respected information security capabilities of Robert M. Lee & the superb illustration talents of Jeff Hass at Little Bobby Comics.
Permalink
The post Robert M. Lee’s & Jeff Hass’ Little Bobby … Continue reading Robert M. Lee’s & Jeff Hass’ Little Bobby Comics: ‘ICS’

A new taxonomy for SCADA attacks

Attacks aimed at SCADA networks are still much rarer than those targeting IT networks, but the number is slowly rising. And, according to Radiflow CTO Yehonatan Kfir, there’s no time like the present to start using a consistent, evidence-based ta… Continue reading A new taxonomy for SCADA attacks

Strategies for expertly protecting industrial control systems

Andrew Ginter is the Vice President of Industrial Security at Waterfall Security Solutions. We sat down with him to learn more about his new book, Secure Operations Technology, a collection of affordable and practical approaches that thoroughly defeat … Continue reading Strategies for expertly protecting industrial control systems