Article 43

 

Thursday, April 14, 2022

Bad Moon Rising Part 85 - Infrastructure Cyber-Threat III

image electric grid scada

Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials.
- Bad Moon Rising Part 36

China is now flexing its post-Olympic power with an aggressive new cyberespionage campaign, targeting government, military and civilians with equal force. If you use Windows, the Chinese Communist Party to knows how to hack into your laptop. If you have friends and associates in China, theyre reading your e-mails.
- Bad Moon Rising Part 44

US Fed Warns Hackers Have Developed Tool Targeting Industrial Control Systems
A warning was issued on the grounds that certain advanced persistent threat actors have developed custom-made tools to gain full system access to multiple ICS and SCADA devices.

By Dashveenjit Kaur
Tech HQ
April 14, 2022

A warning was issued on the grounds that certain advanced persistent threat actors have developed custom-made tools to gain full system access to multiple ICS and SCADA devices.

· Known as PIPEDREAM, the malware toolkit is said to be the most versatile tool ever made to target industrial control systems like power grids and oil refineries

· The DOE, CISA, NSA, and the FBI are all urging critical infrastructure organizations, especially energy sector organizations, to implement the detection and mitigation recommendations provided to detect potential malicious APT activity and harden their ICS/SCADA devices

Industrial control systems (ICS) are essential for the steady functioning of critical infrastructures such as the energy and water grid or the manufacturing sector. Therefore, when an attack is launched on ICS, the consequences are often far-reaching, just like then a ransomware attack TARGETED COLONIAL PIPELINE INC in the US mid-last year.

THAT ATTACK brought the entire facility to a complete halt for a few days which then inevitably caused an ACUTE FUEL SHORTAGE, while prices soared through the roof. It is unfortunate though that threat actors are increasingly shifting their focus from information technology (IT) to what ICS is often referred to as OPERATIONAL TECHNOLOGY (OT).

This puts the CRITICAL INDUSTRIAL INFRASTRUCTURE OWNED BY THE STATE AND PRIVATE ENTITIES AT HIGH RISK of destructive cyberattacks that can cause severe economic damage. Predictably, governments across the world can only urge private entities to toughen their CRITICAL INFRASTRUCTURE DEFENSES - while taking steps to improve national cyberspace security.

Hence why in the US, the Department of Energy (DOE) alongside the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) released a joint Cybersecurity Advisory (CSA) yesterday to warn critical infrastructure owners of a tool developed by hackers to TARGET ICS like power grids and oil refineries.

“DOE, CISA, NSA, and the FBI warn that certain advanced persistent threat (APT) actors have exhibited the capability to gain full system access to multiple ICS/supervisory control and data acquisition (SCADA) devices,” the statement reads.

The tools, according to the officials, enable the threat actors to scan for, compromise, and control affected devices once they have established initial access to the OT network. “Additionally, the actors can compromise Windows-based engineering workstations, which may be present in INFORMATION TECHNOLOGY OR OT ENVIRONMENTS, using an exploit that compromises an ASRock motherboard driver with known vulnerabilities,” they said.

By compromising and maintaining full system access to ICS/SCADA devices, DOE, CISA, NSA, and the FBI said APT actors could elevate privileges, move laterally within an OT environment, and disrupt critical devices or functions. Therefore, the CSA urges critical infrastructure organizations, especially energy sector organizations, to implement the detection and mitigation recommendations provided to detect potential malicious APT activity and harden their ICS/SCADA devices.

SOURCE

Posted by Elvis on 04/14/22 •
Section Bad Moon Rising
View (0) comment(s) or add a new one
Printable viewLink to this article
Home
Page 1 of 1 pages

Statistics

Total page hits 12003155
Page rendered in 0.5552 seconds
43 queries executed
Debug mode is off
Total Entries: 3445
Total Comments: 339
Most Recent Entry: 10/05/2022 10:32 am
Most Recent Comment on: 09/26/2021 05:03 pm
Total Logged in members: 0
Total guests: 6
Total anonymous users: 1
The most visitors ever was 172 on 12/25/2019 07:40 am

Current Logged-in Members: 


Email Us

Home

Members:
Login | Register
Resumes | Members

In memory of the layed off workers of AT&T

Today's Diversion

If you find a path with no obstacles, it probably doesn't lead anywhere. - Henry Wadsworth Longfellow

Search


Advanced Search

Sections

Calendar

October 2022
S M T W T F S
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31          

Must Read

Most recent entries

RSS Feeds

CNN Top Stories

ARS Technica

External Links

Elvis Favorites

BLS and FRED Pages

Reference

Other Links

All Posts

Archives

RSS


Creative Commons License


Support Bloggers' Rights