PIPEDREAM Malware against Industrial Control Systems

Another nation-state malware, Russian in origin:

In the early stages of the war in Ukraine in 2022, PIPEDREAM, a known malware was quietly on the brink of wiping out a handful of critical U.S. electric and liquid natural gas sites. PIPEDREAM is an attack toolkit with unmatched and unprecedented capabilities developed for use against industrial control systems (ICSs).

The malware was built to manipulate the network communication protocols used by programmable logic controllers (PLCs) leveraged by two critical producers of PLCs for ICSs within the critical infrastructure sector, Schneider Electric and OMRON…

Continue reading PIPEDREAM Malware against Industrial Control Systems

Exposing the Internet-Connected Infrastructure of a Spam Domains Portfolio – An OSINT Analysis – A PDF Paper

This content is for members only. Visit the site and log in/register to read.
Continue reading Exposing the Internet-Connected Infrastructure of a Spam Domains Portfolio – An OSINT Analysis – A PDF Paper

Exposing the Internet-Connected Infrastructure of a Sample Portfolio of Cracks and Keygens Domains – An OSINT Analysis – A PDF Paper

This content is for members only. Visit the site and log in/register to read.
Continue reading Exposing the Internet-Connected Infrastructure of a Sample Portfolio of Cracks and Keygens Domains – An OSINT Analysis – A PDF Paper

Exposing the Internet-Connected Infrastructure of a FBI Most Wanted Cybercriminal – Aleksei Belan – An OSINT Analysis – A PDF Paper

This content is for members only. Visit the site and log in/register to read.
Continue reading Exposing the Internet-Connected Infrastructure of a FBI Most Wanted Cybercriminal – Aleksei Belan – An OSINT Analysis – A PDF Paper

Exposing the Internet-Connected Infrastructure of the DNC Targeted Phishing Campaign – An OSINT Analysis – A PDF Paper

This content is for members only. Visit the site and log in/register to read.
Continue reading Exposing the Internet-Connected Infrastructure of the DNC Targeted Phishing Campaign – An OSINT Analysis – A PDF Paper

Exposing the Internet-Connected Infrastructure Behind the Rogue and Fake NordVPN Web Site Malware Campaign – An OSINT Analysis – A PDF Paper

This content is for members only. Visit the site and log in/register to read.
Continue reading Exposing the Internet-Connected Infrastructure Behind the Rogue and Fake NordVPN Web Site Malware Campaign – An OSINT Analysis – A PDF Paper

Exposing the Internet-Connected Infrastructure of the Cybercriminals Behind the Flashpoint Intel Web Site Compromise – An OSINT Analysis – A PDF Paper

This content is for members only. Visit the site and log in/register to read.
Continue reading Exposing the Internet-Connected Infrastructure of the Cybercriminals Behind the Flashpoint Intel Web Site Compromise – An OSINT Analysis – A PDF Paper

Exposing the Internet-Connected Infrastructure of the Cybercriminals Behind the Recent Github Rogue and Malware Embedded Malicious Repositories Malware Campaign – An OSINT Analysis – A PDF Paper

This content is for members only. Visit the site and log in/register to read.
Continue reading Exposing the Internet-Connected Infrastructure of the Cybercriminals Behind the Recent Github Rogue and Malware Embedded Malicious Repositories Malware Campaign – An OSINT Analysis – A PDF Paper

Profiling the Internet Connected Infrastructure of the Individuals on the U.S Sanctions List – An OSINT Analysis – A PDF Paper

This content is for members only. Visit the site and log in/register to read.
Continue reading Profiling the Internet Connected Infrastructure of the Individuals on the U.S Sanctions List – An OSINT Analysis – A PDF Paper

Cyberwar Lessons from the War in Ukraine

The Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the current war in Ukraine: “The Cyber Defense Assistance Imperative ­ Lessons from Ukraine.”

Its conclusion:

Cyber defense assistance in Ukraine is working. The Ukrainian government and Ukrainian critical infrastructure organizations have better defended themselves and achieved higher levels of resiliency due to the efforts of CDAC and many others. But this is not the end of the road—the ability to provide cyber defense assistance will be important in the future. As a result, it is timely to assess how to provide organized, effective cyber defense assistance to safeguard the post-war order from potential aggressors…

Continue reading Cyberwar Lessons from the War in Ukraine