Industrial Security


  • Insecure by design: What you need to know about defending critical infrastructure

    March 7, 2018

    Patching security vulnerabilities in industrial control systems (ICS) is useless in most cases and actively harmful in others, ICS security expert and former NSA analyst Robert M. Lee of Dragos told the US Senate in written testimony last Thursday. The “patch, patch, patch” mantra has become a blind tenet of faith in the IT security realm, but ...

  • Insights on industrial vulnerability: How secure is your OT infrastructure?

    February 26, 2018

    IT (Information Technology) and OT (Operational Technology) have traditionally had fairly separate roles within an organisation. However, with the emergence of the Industrial Internet and the integration of complex physical machinery with networked sensors and software, the lines between the two teams are blurring. While greater connectivity and integration is beneficial for smart analytics, control and ...

  • Plague of the Cyber RATs: How a toxic computer code delivered by ‘Remote Access Trojans’ is an invisible army able to take over a petrochemical plant

    February 17, 2018

    On a broiling day last August, managers of a huge petrochemical plant in Saudi Arabia discovered to their horror that it had been attacked. The consequences could have been catastrophic: the invaders had seized command of its computerised control-and-safety system, and had the power to damage it severely. The attackers carried no guns, explosives, or conventional weapons. Yet ...

  • Water Utility in Europe Hit by Cryptocurrency Malware Mining Attack

    February 7, 2018

    Unauthorized crytocurrency mining attacks, sometimes referred to as “cryptojacking” have found a new target – operational technology used in critical industrial infrastructure. Security firm Radiflow, discovered that cryptocurrency mining malware was found in the network of a water utility provider in Europe. The attack is the first public discovery of an unauthorized cryptocurrency miner impacting industrial ...

  • Industrial cyber security continues to be poor, warns report

    February 1, 2018

    It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks. Discover how cyber security expertise can help businesses in the Middle East navigate digital transformations and ...

  • Trisis has the security world spooked, stumped and searching for answers

    January 18, 2018

    More than four months have passed since a novel, highly sophisticated piece of malware forced an important oil and gas facility in the Middle East to suddenly shut down, but cybersecurity analysts still don’t know who wrote the code. Since last August, multiple teams of researchers in the public and private sectors have been examining what the ...

  • Now Meltdown patches are making industrial control systems lurch

    January 15, 2018

    Patches for the Meltdown vulnerability are causing stability issues in industrial control systems. SCADA vendor Wonderware admitted that Redmond’s Meltdown patch made its Historian product wobble. “Microsoft update KB4056896 (or parallel patches for other Operating System) causes instability for Wonderware Historian and the inability to access DA/OI Servers through the SMC,” an advisory on Wonderware’s support site explains. Read ...

  • Mobile SCADA application landscape less secure than in 2015

    January 11, 2018

    The latest research suggests, within just two years, the security situation for SCADA has got worse to the tune of an average increase of 1.6 vulnerabilities per application tested. IOActive and Embedi security researchers looked at the security of mobile SCADA apps back in 2015 and security was not brilliant. They have now repeated that research, ...

  • Cybersecurity for Upstream Operations

    January 3, 2018

    Optimizing the design, function, and benefits of the logical cyber-representation of physical asset environments, whether for wells being drilled or produced, pipelines, or treatment facilities, is an evolving trend for the oil and gas industry to gain operational efficiency. The analysis described shows that operational efficiency and cybersecurity compromise is essential for business success when ...

  • TRITON Malware Targeting Critical Infrastructure Could Cause Physical Damage

    December 15, 2017

    Security researchers have uncovered another nasty piece of malware designed specifically to target industrial control systems (ICS) with a potential to cause health and life-threatening accidents. Dubbed Triton, also known as Trisis, the ICS malware has been designed to target Triconex Safety Instrumented System (SIS) controllers made by Schneider Electric—an autonomous control system that independently monitors ...

  • Hackers Can Steal Data From Air-Gapped Industrial Networks via PLCs

    December 6, 2017

    Researchers have discovered a method that hackers could use to stealthily exfiltrate data from air-gapped industrial networks by manipulating the radio frequency (RF) signal emitted by programmable logic controllers (PLCs). Attackers may be able to plant a piece of malware on an isolated network, including via compromised update mechanisms or infected USB drives, but using that ...

  • A cybersecurity checklist for industrial, mining or oil and gas systems

    November 26, 2017

    Mining and oil and gas companies not only face threats from cybercriminals hoping to gain financially but may also be targeted by “hacktivists” who want to make a political or environmental point, says Yogen Appalraju, EY Canada’s cybersecurity leader. He said companies can ward off such attacks but the checklist they must follow is long and ...

  • Call to Arms on Cybersecurity for Industrial Control

    November 3, 2017

    Since last spring, U.S. Department of Homeland Security warnings to manufacturers and infrastructure owners about industrial control systems’ vulnerabilities to cyberattack have grown increasingly dire. In October, those warnings were recast as stark realities when DHS and the FBI issued a joint technical alert confirming ICS cyberattacks against manufacturers as well as energy, nuclear, and water utilities. ...

  • Kongsberg receives first DNV GL cyber security type approval for its K-IMS system

    November 3, 2017

    As the shipping industry digitalizes, vessels are becoming sophisticated hubs of connected systems and sensors that generate and exchange data both onboard and back to shore. This connectivity increases the need for cyber security and for ways of verifying the cyber safety of installed systems, DNV GL said in its press release. “At Kongsberg we have ...

  • Taking Steps towards Secure Manufacturing

    October 31, 2017

    In 2016, an independent study recognized the manufacturing industry as the second most attacked industry. While the healthcare sector is still the most frequently attacked, attacks on manufacturing come as no surprise since it’s an expansive industry that includes the automotive, textile, electronic and other subgroups that manufacture a multitude of different products. Motivations behind manufacturing attacks Based on previous ...

  • US-CERT study predicts machine learning, transport systems to become security risks

    October 19, 2017

    The Carnegie-Mellon University’s Software Engineering Institute has nominated transport systems, machine learning, and smart robots as needing better cyber-security risk and threat analysis. That advice comes in the institute’s third Emerging Technology Domains Risk Survey, a project it has handled for the US Department of Homeland Security’s US-CERT since 2015. The surveys are cumulative, meaning any ...

  • IT at sea makes data too easy to see: Ships are basically big floating security nightmares

    October 13, 2017

    If there’s anything worse than container security, it would appear to be container ship security. Ken Munro, a researcher for UK-based Pen Test Partners, has been exploring maritime satellite communication systems used to keep ships connected while at sea. His findings don’t inspire much confidence. Munro, in a blog post today recounting his research, describes ships as floating ...

  • Siemens Update Addresses Critical Vulnerability Found in Measuring Device

    October 9, 2017

    Siemens recently issued an update that addresses a vulnerability found in one of their measuring devices that could potentially allow an attacker to bypass built-in authentication measures and take control of the machine. Discovered by researcher Maxim Rupp, CVE-2017-9944affects the 7KT PAC1200 smart meter, a multichannel measuring device that allows users to monitor their energy consumption via easily installed ...

  • Siemens Patches Improper Access Vulnerability in Ruggedcom Protocol

    September 29, 2017

    Industrial manufacturer Siemens is encouraging users running devices that use its Ruggedcom Discovery Protocol (RCDP) to apply firmware updates this week. The updates resolve a serious and remotely exploitable vulnerability that could let an attacker carry out administrative actions. The issue, an improper access control vulnerability, could allow users of networks adjacent to targeted devices to ...

  • Dragonfly 2.0: Hacking Group Infiltrated European and US Power Facilities

    September 7, 2017

    The notorious hacking group that has been in operation since at least 2011 has re-emerged and is still interested in targeting the United States and European companies in the energy sector. Yes, I am talking about the ‘Dragonfly,’ a well-resourced, Eastern European hacking group responsible for sophisticated cyber-espionage campaigns against the critical infrastructure of energy companies in different ...