- Utilities, Energy Sector Attacked Mainly Via IT, Not ICS
November 1, 2018
Stealing administrative credentials to carry out months-long spy campaigns is a top threat.
While industrial control systems (ICS) are the most talked-about when it comes to cyberattacks against energy and utilities firms, most attacks actually take aim at the enterprise IT networks used by these organizations, rather than critical infrastructure itself.
The Vectra 2018 Spotlight Report on Energy and ...
- New Stuxnet Variant Allegedly Struck Iran
October 31, 2018
A malware similar in nature to Stuxnet but more aggressive and sophisticated allegedly hit the infrastructure and strategic networks in Iran.
Details about the supposed new attack are superficial at the moment, as there are no details about the supposed attack, the damage it caused or its targets.
A report on Wednesday from Israeli evening news bulletin ...
- Critical Infrastructure & Supply Chain Remain Highly Vulnerable to Attacks
October 24, 2018
This week, the National Cyber Security Alliance (NCSA) reminds us that, “our day-to-day life depends on the country’s 16 sectors of critical infrastructure, which supply food, water, financial services, public health, communications and power along with other networks and systems. A disruption to this system, which is operated via the internet, can have significant and even catastrophic ...
- In County Crippled by Hurricane, Water Utility Targeted in Ransomware Attack
October 15, 2018
The Emotet Trojan is behind a crippling ransomware attack that hit the Onslow Water and Sewer Authority.
A “critical water utility” has been targeted in a recent ransomware attack, significantly impeding its ability to provide service in the week after Hurricane Florence hit the East Coast of the U.S.
The Onslow Water and Sewer Authority (ONWASA) said ...
- Critical infrastructure will have to operate if there’s malware on it or not
September 16, 2018
As threats and cyber-attacks on critical infrastructure are expected to intensify in the near future, cyber-security experts believe that companies and government agencies should be prepared to operate networks even if there’s malware or a threat actor on the network or not.
The idea is that cyber-attacks should not cause downtime of any form, and networks should be designed in a way ...
- OilRig APT Continues Its Ongoing Malware Evolution
September 13, 2018
The Iran-linked APT appears to be in a state of continuous tool development, analogous to the DevOps efforts seen in the legitimate software world.
OilRig, an APT group believed to have ties to Iran, has been spotted in yet another campaign in the Middle East – this time targeting victims within an undisclosed government using an ...
- Russian domestic security service launch new dedicated center to counter cyberattacks
September 11, 2018
Russia’s Federal Security Service, the FSB, now has a separate coordination center created in order to prevent, detect and counter cyberattacks on critical infrastructure facilities as well as repair damage from such attacks.
The new agency is officially titled ‘National Coordination Center for Computer Incidents’ and it will be headed by Andrey Ivashko who is also ...
- A critical security flaw in popular industrial software put power plants at risk
May 2, 2018
A severe vulnerability in a widely used industrial control software could have been used to disrupt and shut down power plants and other critical infrastructure.
Researchers at security firm Tenable found the flaw in the popular Schneider Electric software, used across the manufacturing and power industries, which if exploited could have allowed a skilled attacker to ...
- A Lack Of Cybersecurity Funding And Expertise Threatens U.S. Infrastructure
April 23, 2018
As our physical infrastructure becomes increasingly digitalized, it also becomes increasingly vulnerable to cyber attack. Russian hackers, for example, have been trying to compromise U.S. electrical infrastructure for years, and successfully cut off power to hundreds of thousands of people throughout Ukraine in 2015 and again in 2016. Beyond our energy infrastructure, traffic signals are also susceptible to being hijacked, ...
- Global experts gather at SCTX18 to fight war on terror
April 3, 2018
3rd April 2018 – Since the breakup of the caliphate in Syria, the terrorist threat has evolved as extremists now remain in their home countries and look to launch attacks from inside their borders. This has presented those tasked with protecting nations, businesses and the public with new challenges as security forces constantly fight to stay one ...
- US slaps new sanctions on Russia over NotPetya cyberattack, election meddling
March 15, 2018
The White House has introduced a new round of sanctions on Russia, accusing the government of launching “the most destructive and costly cyberattack in history.”
In a statement, the US Treasury said it has targeted 19 individuals and five entities for their parts in conducting “destabilizing activities,” including interfering with the US elections in 2016 to their ...
- Cyberattacks Put Russian Fingers on the Switch at Power Plants, U.S. Says
March 15, 2018
The Trump administration accused Russia on Thursday of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.
United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt ...
- Plague of the Cyber RATs: How a toxic computer code delivered by ‘Remote Access Trojans’ is an invisible army able to take over a petrochemical plant
February 17, 2018
On a broiling day last August, managers of a huge petrochemical plant in Saudi Arabia discovered to their horror that it had been attacked. The consequences could have been catastrophic: the invaders had seized command of its computerised control-and-safety system, and had the power to damage it severely.
The attackers carried no guns, explosives, or conventional weapons. Yet ...
- Utilities ill-equipped to face increasingly disparate cybersecurity threat
January 31, 2018
All utilities organizations surveyed in the latest EY Power and Utilities Global Information Security Survey 2017-18 (GISS): Why wait for a cyber catastrophe to prepare for a cyber attack?, say that their cybersecurity function does not meet their needs. The survey also finds that 58% of sector respondents anticipate difficulties in monitoring the perimeter of their ...
- GCHQ ‘Over-Achieved’ its Development of Offensive Cyber Capabilities
December 21, 2017
A new report from the Intelligence and Security Committee claims that the GCHQ has substantially increased its hacking abilities over the past few years. So much so that the Committee claims the spy organisation has “over-achieved”.
How much is over-achieved? Apparently the agency has doubled the number of offensive cyber-capabilities, including the ability to attack other countries’ communications, ...
- CS4CA USA set to double in size for 2018
December 4, 2017
In a major step for the Cyber Security for Critical Assets Summit series, Qatalyst Global are very proud to announce that the 2018 USA edition will double in size and feature two distinct work streams, focusing on corporate IT and operational technology respectively. For all the talk of convergence, the two remain distinct fields, and ...
- The Critical Manufacturing Cyber Security Summit comes to Europe
December 4, 2017
After two sold-out editions in Chicago in 2016 and 2017, Qatalyst Global will be bringing the ManuSec Summit to Germany next year. We’ll be in Munich, the industrial heartland of Europe, with a blend of high-level, strategic discussion and practical, hands-on advice that participants will take back to their organisations.
Behind this exciting expansion is Cecilia ...
- Feds warn energy, aviation companies of hacking threats
October 22, 2017
Hackers have been targeting the nuclear, energy, aviation, water and critical manufacturing industries since May, according to Reuters. It’s even serious enough for Homeland Security and the FBI to email firms most at risk of attacks, warning them that a group of cyberspies had already succeeded in infiltrating some of their peers’ networks, including at least one ...
- Cyberespionage Group Steps Up Campaigns Against Japanese Firms
October 14, 2017
Researchers are learning more about the cyberespionage group Bronze Butler. While the gang has been targeting Japanese heavy industry since 2012, not much is known about the group’s current modus operandi.
In a report released Thursday by the Counter Threat Unit at SecureWorks, a subsidiary of Dell Technologies, researchers paint the most complete picture yet of ...
- Cyber alert – EU ministers test responses in first computer war game
September 7, 2017
European Union defence ministers tested their ability to respond to a potential attack by computer hackers in their first cyber war game on Thursday, based on a simulated attack on one of the bloc’s military missions abroad.
In the simulation, hackers sabotaged the EU’s naval mission in the Mediterranean and launched a campaign on social media ...
- UK organisations could face huge fines for cyber security failures
August 8, 2017
British organisations could face fines of up to £17m, or 4% of global turnover, if they fail to take measures to prevent cyber-attacks that could result in major disruption to services such as transport, health or electricity networks.
But the proposals, which are being considered as part of a government consultation launched on Tuesday, say that ...
- Global ransomware attacks on the rise: Europol
July 25, 2017
Global ransomware attacks soared by over 11 percent in the 12 months to March, Europol reported Tuesday, but specialist tools developed with its partners had helped unlock some 28,000 encrypted devices.
“Ransomware has soared since 2012, with criminals lured by the promise of profit and ease of implementation,” the European police agency said in a statement.
- Duma passes bill on protection of Russian state data networks
July 12, 2017
Russia’s lower house has approved a bill that defines which of the country’s informational infrastructure is to be considered critical, while setting a maximum sentence of 10 years imprisonment for hackers that attack it.
In the final draft of the bill published on the State Duma’s website, critical informational infrastructure is defined as data systems and ...