PEM: Remote Forensic Acquisition of PLC Memory in Industrial Control Systems

https://youtu.be/_pPxk5eTH_Y

Winner of the Best Paper Award at DFRWS-EU 2022, Nauman Zubair proposes a new memory acquisition framework to remotely acquire a programmable logic controller (PLC)’s volatile memory while the PLC is controlling a phys… Continue reading PEM: Remote Forensic Acquisition of PLC Memory in Industrial Control Systems

ISaPWN – research on the security of ISaGRAF Runtime

This report includes an analysis of the ISaGRAF framework, its architecture, the IXL and SNCP protocols and the description of several vulnerabilities the Kaspersky ICS CERT team had identified. Continue reading ISaPWN – research on the security of ISaGRAF Runtime

Evaluation of cyber activities and the threat landscape in Ukraine

With this article, our core aim is to share a threat landscape overview, which Kaspersky cybersecurity researchers are observing in relation to the conflict, with the wider international community and thus to contribute to broader ongoing cyber-stability discussions of threat-related insights. Continue reading Evaluation of cyber activities and the threat landscape in Ukraine

DFRWS-EU 2022: The Future of Digital Forensics Is Now

Moving digital forensics forward in terms of methods and frameworks, as well as organizational and cross-cultural collaboration, was an overarching theme of this year’s European Union edition of the Digital Forensics Research Workshop (DFRWS). 

Continue reading DFRWS-EU 2022: The Future of Digital Forensics Is Now

Threat landscape for industrial automation systems, H2 2021

By 2021 everyone got used to pandemic limitations – industrial organization employees and IT security professionals and threat actors. If we compare the numbers from 2020 and 2021, we see that 2021 looks more stable, particularly in H2. Continue reading Threat landscape for industrial automation systems, H2 2021

Behavioral-Based Forensics and Investigation Approach for Analyzing Attacks on Water Plants Using GANs

Hello. My name is Nataliia Neshenko. I am a PhD candidate in Florida Atlantic University College of Engineering & Computer Science working with Professor Fuhrt and in collaboration with Professor Bou-Harb from the University of Texas in San A… Continue reading Behavioral-Based Forensics and Investigation Approach for Analyzing Attacks on Water Plants Using GANs

Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks

Kaspersky ICS CERT has uncovered a number of spyware campaigns targeting industrial enterprises. Continue reading Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks

PseudoManuscrypt: a mass-scale spyware attack campaign

Kaspersky ICS CERT experts identified malware whose loader has some similarities to the Manuscrypt malware, which is part of the Lazarus APT group’s arsenal. Continue reading PseudoManuscrypt: a mass-scale spyware attack campaign

Threats to ICS and industrial enterprises in 2022

In recent years, we have observed various trends in the changing threat landscape for industrial enterprises. We can say with high confidence that many of these trends will not only continue, but gain new traction in the coming year. Continue reading Threats to ICS and industrial enterprises in 2022