Kaspersky ICS CERT (English) (English) https://ics-cert.kaspersky.com/feed/ https://ics-cert.kaspersky.com/wp-content/uploads/sites/28/2021/10/kaspersky-ics-cert-logo-2021-facebook.png Kaspersky ICS CERT https://ics-cert.kaspersky.com/wp-content/uploads/sites/28/2021/10/kaspersky-ics-cert-logo-2021-facebook.png APT and financial attacks on industrial organizations in Q4 2025 https://ics-cert.kaspersky.com/publications/reports/2026/03/06/apt-and-financial-attacks-on-industrial-organizations-in-q4-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2026/03/06/apt-and-financial-attacks-on-industrial-organizations-in-q4-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Scenarios in which cyberattacks used to search for and select targets during military conflicts, cyberespionage campaign orchestrated and executed by AI – the quarter was rich in interesting details of incidents.

]]>
Fri, 06 Mar 2026 14:07:00 +0000
Cyberattacks on automobile manufacturers, taxi fleets, and logistics providers: The risks to automotive infrastructure in 2026 https://ics-cert.kaspersky.com/publications/blog/2026/02/19/risks-for-the-automotive-industry-in-2026/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2026/02/19/risks-for-the-automotive-industry-in-2026/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A cyberthreat forecast by Kaspersky experts.

]]>
Thu, 19 Feb 2026 16:00:00 +0000
Recommendations https://ics-cert.kaspersky.com/publications/reports/2026/02/05/recommendations/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2026/02/05/recommendations/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Baseline security controls and practices that help defend against diverse cyberthreats across multiple stages of an attack, and controls crucial for protecting against particular types of cyberthreats.

]]>
Thu, 05 Feb 2026 14:30:00 +0000
Threat landscape for industrial automation systems. Africa, Q3 2025 https://ics-cert.kaspersky.com/publications/reports/2025/12/25/threat-landscape-for-industrial-automation-systems-africa-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/12/25/threat-landscape-for-industrial-automation-systems-africa-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The permanent leader in the percentage of ICS computers on which spyware were blocked.

]]>
Thu, 25 Dec 2025 09:00:00 +0000
Threat landscape for industrial automation systems. Middle East, Q3 2025 https://ics-cert.kaspersky.com/publications/reports/2025/12/24/threat-landscape-for-industrial-automation-systems-middle-east-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/12/24/threat-landscape-for-industrial-automation-systems-middle-east-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The ransomware rate in the region remains consistently high, nearly twice the global average.

]]>
Wed, 24 Dec 2025 09:01:00 +0000
Threat landscape for industrial automation systems. Asia, Q3 2025 https://ics-cert.kaspersky.com/publications/reports/2025/12/24/threat-landscape-for-industrial-automation-systems-asia-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/12/24/threat-landscape-for-industrial-automation-systems-asia-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main East Asia saw a sharp increase in the percentage of ICS computers on which malicious scripts and phishing pages were blocked. The review of key cybersecurity issues in Asian regions.

]]>
Wed, 24 Dec 2025 09:00:00 +0000
Threat landscape for industrial automation systems. Australia and New Zealand, Q3 2025 https://ics-cert.kaspersky.com/publications/reports/2025/12/23/threat-landscape-for-industrial-automation-systems-australia-and-new-zealand-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/12/23/threat-landscape-for-industrial-automation-systems-australia-and-new-zealand-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This quarter, Australia and New Zealand rank first in growth of the email client threat indicator.

]]>
Tue, 23 Dec 2025 09:01:00 +0000
Threat landscape for industrial automation systems. South and North America (Canada), Q3 2025 https://ics-cert.kaspersky.com/publications/reports/2025/12/23/threat-landscape-for-industrial-automation-systems-south-and-north-america-canada-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/12/23/threat-landscape-for-industrial-automation-systems-south-and-north-america-canada-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This quarter, South America leads both in the percentage of ICS computers on which malicious documents were blocked and in growth of this indicator. The review of key cybersecurity issues in the regions.

]]>
Tue, 23 Dec 2025 09:00:00 +0000
Threat landscape for industrial automation systems. Europe, Q3 2025 https://ics-cert.kaspersky.com/publications/reports/2025/12/22/threat-landscape-for-industrial-automation-systems-europe-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/12/22/threat-landscape-for-industrial-automation-systems-europe-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Miners are still a major problem for Northern Europe. The review of key cybersecurity issues in European regions.

]]>
Mon, 22 Dec 2025 09:01:00 +0000
Threat landscape for industrial automation systems. Russia, Q3 2025 https://ics-cert.kaspersky.com/publications/reports/2025/12/22/threat-landscape-for-industrial-automation-systems-russia-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/12/22/threat-landscape-for-industrial-automation-systems-russia-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This quarter, the percentage of ICS computers on which spyware and ransomware were blocked increased significantly in the region.

]]>
Mon, 22 Dec 2025 09:00:00 +0000
A brief overview of the main incidents in industrial cybersecurity. Q3 2025 https://ics-cert.kaspersky.com/publications/reports/2025/12/18/a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/12/18/a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The attack on Jaguar Land Rover affected about 5,000 organizations, as well as more than 100 other incidents, including some significant occurred in the transport and logistics sector.

]]>
Thu, 18 Dec 2025 09:00:00 +0000
Threat landscape for industrial automation systems. Q3 2025 https://ics-cert.kaspersky.com/publications/reports/2025/12/11/threat-landscape-for-industrial-automation-systems-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/12/11/threat-landscape-for-industrial-automation-systems-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The malicious scripts and phishing pages led the threat categories in terms of both the percentage of ICS computers on which this threat was blocked and the growth rate.

]]>
Thu, 11 Dec 2025 09:00:00 +0000
APT and financial attacks on industrial organizations in Q3 2025 https://ics-cert.kaspersky.com/publications/reports/2025/12/01/apt-and-financial-attacks-on-industrial-organizations-in-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/12/01/apt-and-financial-attacks-on-industrial-organizations-in-q3-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Using of AI, trusted relationships and historical security problems of traditional OS – there are some interesting details of attacks on industrial enterprises.

]]>
Mon, 01 Dec 2025 13:07:00 +0000
God Mode On: Researchers run Doom on a vehicle’s head unit after remotely attacking its modem https://ics-cert.kaspersky.com/publications/reports/2025/11/20/god-mode-on-researchers-run-doom-on-a-vehicles-head-unit-after-remotely-attacking-its-modem/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/11/20/god-mode-on-researchers-run-doom-on-a-vehicles-head-unit-after-remotely-attacking-its-modem/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Exploiting a vulnerability identified in a modem installed in the head units of some vehicles enabled Kaspersky ICS CERT experts to gain complete control of the system.

]]>
Thu, 20 Nov 2025 11:00:00 +0000
“Security researchers are the main factor motivating automakers to invest in protecting their products” https://ics-cert.kaspersky.com/publications/blog/2025/10/30/security-researchers-are-the-main-factor-motivating-automakers-to-invest-in-protecting-their-products/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2025/10/30/security-researchers-are-the-main-factor-motivating-automakers-to-invest-in-protecting-their-products/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Industrial system vulnerability research experts discuss threats associated with over-the-air data transmission technologies, attack vectors targeting electric vehicles specifically, the evolution of transportation systems from a cybersecurity perspective, and the role of artificial intelligence in ensuring cybersecurity.

]]>
Thu, 30 Oct 2025 09:00:00 +0000
A brief overview of the main incidents in industrial cybersecurity. Q2 2025 https://ics-cert.kaspersky.com/publications/reports/2025/10/09/a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/10/09/a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main More than 130 incidents were publicly confirmed by victims. Among them are not only high-profiled technology corporations and enterprises, but also the lake dam.

]]>
Thu, 09 Oct 2025 09:00:00 +0000
Threat landscape for industrial automation systems. Europe, Q2 2025 https://ics-cert.kaspersky.com/publications/reports/2025/09/23/threat-landscape-for-industrial-automation-systems-europe-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/09/23/threat-landscape-for-industrial-automation-systems-europe-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In Southern and Eastern Europe, the risk of targeted attacks is high – there are high levels of email threats (phishing) and spyware. The review of key cybersecurity issues in European regions.

]]>
Tue, 23 Sep 2025 09:00:00 +0000
Threat landscape for industrial automation systems. Russia, Q2 2025 https://ics-cert.kaspersky.com/publications/reports/2025/09/23/threat-landscape-for-industrial-automation-systems-russia-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/09/23/threat-landscape-for-industrial-automation-systems-russia-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The region where the main threat source is the internet and the percentage of ICS computers on which miners in the form of executable files for Windows were blocked is usually high.

]]>
Tue, 23 Sep 2025 08:00:00 +0000
Threat landscape for industrial automation systems. Middle East, Q2 2025 https://ics-cert.kaspersky.com/publications/reports/2025/09/22/threat-landscape-for-industrial-automation-systems-middle-east-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/09/22/threat-landscape-for-industrial-automation-systems-middle-east-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The region with high risk of targeted attacks against the technological infrastructures of industrial enterprises

]]>
Mon, 22 Sep 2025 11:00:00 +0000
Threat landscape for industrial automation systems. South and North America (Canada), Q2 2025 https://ics-cert.kaspersky.com/publications/reports/2025/09/22/threat-landscape-for-industrial-automation-systems-south-and-north-america-canada-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/09/22/threat-landscape-for-industrial-automation-systems-south-and-north-america-canada-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The percentage of threats from email clients increased significantly in South America, and from the internet – in North America (Canada). The review of key cybersecurity issues in these regions.

]]>
Mon, 22 Sep 2025 09:00:00 +0000
Threat landscape for industrial automation systems. Australia and New Zealand, Q2 2025 https://ics-cert.kaspersky.com/publications/reports/2025/09/19/threat-landscape-for-industrial-automation-systems-australia-and-new-zealand-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/09/19/threat-landscape-for-industrial-automation-systems-australia-and-new-zealand-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The region ranks first in terms of the percentage of ICS computers on which malicious objects were blocked increase.

]]>
Fri, 19 Sep 2025 12:00:00 +0000
Threat landscape for industrial automation systems. Asia, Q2 2025 https://ics-cert.kaspersky.com/publications/reports/2025/09/19/threat-landscape-for-industrial-automation-systems-asia-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/09/19/threat-landscape-for-industrial-automation-systems-asia-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main South-East Asia ranks first in the world in terms of the percentage of ICS computers on which viruses and malware for AutoCAD were blocked. The review of key cybersecurity issues in Asian regions.

]]>
Fri, 19 Sep 2025 09:00:00 +0000
Threat landscape for industrial automation systems. Africa, Q2 2025 https://ics-cert.kaspersky.com/publications/reports/2025/09/18/threat-landscape-for-industrial-automation-systems-africa-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/09/18/threat-landscape-for-industrial-automation-systems-africa-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The leader in the percentage of ICS computers on which malicious objects were blocked for many years. The region with low cybersecurity maturity of industrial organizations.

]]>
Thu, 18 Sep 2025 09:00:00 +0000
Detective investigation of APT and rare virus specimens: Kaspersky ICS CERT experts to present new research at KICC https://ics-cert.kaspersky.com/events/2025/09/17/detective-investigation-of-apt-and-rare-virus-specimens-kaspersky-ics-cert-experts-to-present-new-research-at-kicc/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2025/09/17/detective-investigation-of-apt-and-rare-virus-specimens-kaspersky-ics-cert-experts-to-present-new-research-at-kicc/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The Kaspersky Industrial Cybersecurity Conference, one of the leading international events in the field of industrial cybersecurity, takes place from September 23 to 25.

]]>
Wed, 17 Sep 2025 11:54:00 +0000
Threat landscape for industrial automation systems. Q2 2025 https://ics-cert.kaspersky.com/publications/reports/2025/09/11/threat-landscape-for-industrial-automation-systems-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/09/11/threat-landscape-for-industrial-automation-systems-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The percentage of ICS computers on which denylisted internet resources were blocked increased in all regions. This growth is associated with the addition of direct links to malicious code hosted on popular public websites and file services.

]]>
Thu, 11 Sep 2025 10:28:00 +0000
Dynamics of external and internal threats to industrial control systems. Q2 2025 https://ics-cert.kaspersky.com/publications/reports/2025/09/10/dynamics-of-external-and-internal-threats-to-industrial-control-systems-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/09/10/dynamics-of-external-and-internal-threats-to-industrial-control-systems-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A segmentation of the attacked ICS computers into categories based on the malware blocked and the sources of its entry which helps to understand the ICS threat landscape better and identify the factors that affect it.

]]>
Wed, 10 Sep 2025 12:21:00 +0000
APT and financial attacks on industrial organizations in Q2 2025 https://ics-cert.kaspersky.com/publications/reports/2025/09/04/apt-and-financial-attacks-on-industrial-organizations-in-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/09/04/apt-and-financial-attacks-on-industrial-organizations-in-q2-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Spreading from a compromised organization to its peers with hijacked emails, using the ClickFix social engineering method – non-trivial tactics and techniques were reported this quarter.

]]>
Thu, 04 Sep 2025 14:00:00 +0000
Modern vehicle cybersecurity trends https://ics-cert.kaspersky.com/publications/reports/2025/08/21/modern-vehicle-cybersecurity-trends/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/08/21/modern-vehicle-cybersecurity-trends/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Why cyberattacks on vehicles have not yet become a widespread phenomenon, what are the consequences of turning a car into a gadget and which ones are at risk

]]>
Thu, 21 Aug 2025 09:00:00 +0000
Faults in digital avionics systems threaten flight safety https://ics-cert.kaspersky.com/publications/reports/2025/07/17/faults-in-digital-avionics-systems-threaten-flight-safety/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/07/17/faults-in-digital-avionics-systems-threaten-flight-safety/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky experts analyze aviation incidents and accidents caused by failures of digital avionics systems and warn of potential cyberattack risks

]]>
Thu, 17 Jul 2025 09:00:00 +0000
A brief overview of the main incidents in industrial cybersecurity. Q1 2025 https://ics-cert.kaspersky.com/publications/reports/2025/06/26/a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity-q1-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/06/26/a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity-q1-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The attack on Kuala Lumpur airport, which knocked out many of its information systems for 10 hours, plus over 100 more incidents.

]]>
Thu, 26 Jun 2025 09:00:00 +0000
APT and financial attacks on industrial organizations in Q1 2025 https://ics-cert.kaspersky.com/publications/reports/2025/06/19/apt-and-financial-attackson-industrial-organizations-in-q1-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/06/19/apt-and-financial-attackson-industrial-organizations-in-q1-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Using polyglot files, involving the 7-Zip vulnerability and the 0-click vulnerability in MS Windows – there are some interesting details of attacks on industrial enterprises disclosed at this quarter.

]]>
Thu, 19 Jun 2025 09:00:00 +0000
Threat landscape for industrial automation systems. Regions, Q1 2025 https://ics-cert.kaspersky.com/publications/reports/2025/06/10/threat-landscape-for-industrial-automation-systems-regions-q1-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/06/10/threat-landscape-for-industrial-automation-systems-regions-q1-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The internet ranks first among threat sources in all regions. The problem is particularly relevant to Africa, South-East Asia, South Asia and Russia.

]]>
Tue, 10 Jun 2025 09:00:00 +0000
TTPs of Cyber Partisans activity aimed at espionage and disruption https://ics-cert.kaspersky.com/publications/reports/2025/06/05/ttps-of-cyber-partisans-activity-aimed-at-espionage-and-disruption/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/06/05/ttps-of-cyber-partisans-activity-aimed-at-espionage-and-disruption/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky ICS CERT experts managed to find and analyze the malware and utilities most probably used by the actors. The key finding was a previously unknown backdoor.

]]>
Thu, 05 Jun 2025 10:33:00 +0000
Threat landscape for industrial automation systems. Q1 2025 https://ics-cert.kaspersky.com/publications/reports/2025/05/15/threat-landscape-for-industrial-automation-systems-q1-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/05/15/threat-landscape-for-industrial-automation-systems-q1-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The percentage of ICS computers on which various types of malware spread via the internet and email were blocked increased for the first time in two years.

]]>
Thu, 15 May 2025 09:00:00 +0000
“Security by design helps you stay one step ahead” https://ics-cert.kaspersky.com/publications/blog/2025/04/15/security-by-design-helps-you-stay-one-step-ahead/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2025/04/15/security-by-design-helps-you-stay-one-step-ahead/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky expert discusses the challenges of assessing the security of industrial facilities and the role of the professional community in their protection, the reasons behind security issues in rapidly evolving industries, and the impact of digitalization on society.

]]>
Tue, 15 Apr 2025 09:00:00 +0000
A brief overview of the main incidents in industrial cybersecurity. Q4 2024 https://ics-cert.kaspersky.com/publications/reports/2025/04/08/q4-2024-a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/04/08/q4-2024-a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main More than 100 companies publicly reported cyberattacks. Two of them announced their insolvency after the incident. In two other cases, two ransomware gangs simultaneously claimed responsibility for the same hack.

]]>
Tue, 08 Apr 2025 09:00:00 +0000
APT and financial attacks on industrial organizations in Q4 2024 https://ics-cert.kaspersky.com/publications/reports/2025/03/25/apt-and-financial-attacks-on-industrial-organizations-in-q4-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/03/25/apt-and-financial-attacks-on-industrial-organizations-in-q4-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Abusing of Telegram to spy and put pressure on their victims’ employees, notifying the victims by printing messages on printers connected to a compromised network – we publish interesting details of attacks on industrial enterprises disclosed at this quarter.

]]>
Tue, 25 Mar 2025 09:00:00 +0000
Threat landscape for industrial automation systems. Regions, Q4 2024 https://ics-cert.kaspersky.com/publications/reports/2025/03/17/threat-landscape-for-industrial-automation-systems-regions-q4-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/03/17/threat-landscape-for-industrial-automation-systems-regions-q4-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The percentage of ICS computers on which malicious objects were blocked increased in eight regions. Regionally, the percentage ranged from 10.6% in Northern Europe to 31.0% in Africa.

]]>
Mon, 17 Mar 2025 09:01:00 +0000
Threat landscape for industrial automation systems. Q4 2024 https://ics-cert.kaspersky.com/publications/reports/2025/03/17/threat-landscape-for-industrial-automation-systems-q4-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/03/17/threat-landscape-for-industrial-automation-systems-q4-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The percentage of ICS computers on which malicious scripts and phishing pages as well as ransomware were blocked continued to increase.

]]>
Mon, 17 Mar 2025 09:00:00 +0000
Operation SalmonSlalom https://ics-cert.kaspersky.com/publications/reports/2025/02/24/fatalrat-attacks-in-apac-backdoor-delivered-via-an-overly-long-infection-chain-to-chinese-speaking-targets/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/02/24/fatalrat-attacks-in-apac-backdoor-delivered-via-an-overly-long-infection-chain-to-chinese-speaking-targets/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky discovered a new attack targeting industrial organizations in APAC

]]>
Sun, 23 Feb 2025 21:00:00 +0000
Q3 2024 – a brief overview of the main incidents in industrial cybersecurity https://ics-cert.kaspersky.com/publications/reports/2025/02/19/q3-2024-a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/02/19/q3-2024-a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Many large companies, including some well-known brands, affected by cyberattacks. An unusually high number of victims were in critical sectors such as utilities and power and energy.

]]>
Wed, 19 Feb 2025 09:00:00 +0000
Threat predictions for industrial enterprises 2025 https://ics-cert.kaspersky.com/publications/reports/2025/01/29/threat-predictions-for-industrial-enterprises-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2025/01/29/threat-predictions-for-industrial-enterprises-2025/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky ICS CERT analyzes industrial threat trends and makes forecasts on how the industrial threat landscape will look in 2025.

]]>
Wed, 29 Jan 2025 10:00:00 +0000
APT and financial attacks on industrial organizations in Q3 2024 https://ics-cert.kaspersky.com/publications/reports/2024/12/26/apt-and-financial-attackson-industrial-organizationsin-q3-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/12/26/apt-and-financial-attackson-industrial-organizationsin-q3-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main During the quarter, a number of research papers and technical advisories were published detailing attacks that either targeted or affected organizations in the industrial sector. From our perspective, the following are likely to be the most interesting for researchers and useful for cybersecurity practitioners

]]>
Thu, 26 Dec 2024 09:00:00 +0000
Threat landscape for industrial automation systems. Regions, Q3 2024 https://ics-cert.kaspersky.com/publications/reports/2024/12/25/threat-landscape-for-industrial-automation-systems-regions-q3-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/12/25/threat-landscape-for-industrial-automation-systems-regions-q3-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The percentage of ICS computers on which malicious objects were blocked decreased from the second quarter to 22%. But the figure increased in Africa, South Asia, South-East Asia, the Middle East, Latin America, and East Asia. Regionally, the percentage ranged from 9.7% in Northern Europe to 31.5% in Africa.

]]>
Wed, 25 Dec 2024 09:01:00 +0000
Threat landscape for industrial automation systems. Q3 2024 https://ics-cert.kaspersky.com/publications/reports/2024/12/25/threat-landscape-for-industrial-automation-systems-q3-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/12/25/threat-landscape-for-industrial-automation-systems-q3-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The percentage of ICS computers on which malicious objects were blocked decreased by 1.5 pp from the second quarter to 22%. The biometrics sector led the surveyed industries in terms of this parameter.

]]>
Wed, 25 Dec 2024 09:00:00 +0000
Threat landscape for industrial automation systems. Regions, Q2 2024 https://ics-cert.kaspersky.com/publications/reports/2024/11/21/threat-landscape-for-industrial-automation-systems-regions-q2-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/11/21/threat-landscape-for-industrial-automation-systems-regions-q2-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The global percentage of ICS computers on which malicious objects were blocked decreased from Q1 2024 to 23.5%. But the figure increased in four regions. Regionally, the percentage ranged from 11.3% in Northern Europe to 30% in Africa.

]]>
Thu, 21 Nov 2024 09:00:00 +0000
Q2 2024 – a brief overview of the main incidents in industrial cybersecurity https://ics-cert.kaspersky.com/publications/reports/2024/11/08/q2-2024-a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/11/08/q2-2024-a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A total of 35 incidents were confirmed by victims. Half of the attacks reportedly resulted in the denial of IT systems and the denial of operations. There is a case of a company that was unable to recover from the impact of a cyberattack and decided to cease operations.

]]>
Fri, 08 Nov 2024 09:00:00 +0000
APT and financial attacks on industrial organizations in Q2 2024 https://ics-cert.kaspersky.com/publications/reports/2024/10/03/apt-and-financial-attacks-on-industrial-organizations-in-q2-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/10/03/apt-and-financial-attacks-on-industrial-organizations-in-q2-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This summary provides an overview of the reports of APT and financial attacks on industrial enterprises that were disclosed in Q2 2024, as well as the related activities of groups that have been observed attacking industrial organizations and critical infrastructure facilities.

]]>
Thu, 03 Oct 2024 09:00:00 +0000
Threat landscape for industrial automation systems. Q2 2024 https://ics-cert.kaspersky.com/publications/reports/2024/09/26/threat-landscape-for-industrial-automation-systems-q2-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/09/26/threat-landscape-for-industrial-automation-systems-q2-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In the second quarter of 2024, the percentage of ICS computers on which malicious objects were blocked decreased by 0.9 pp from the previous quarter to 23.5%. Compared to the second quarter of 2023, the percentage decreased by 3.3 pp.

]]>
Thu, 26 Sep 2024 08:00:00 +0000
Cinterion EHS5 3G UMTS/HSPA Module Research https://ics-cert.kaspersky.com/publications/reports/2024/06/13/cinterion-ehs5-3g-umts-hspa-module-research/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/06/13/cinterion-ehs5-3g-umts-hspa-module-research/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In the course of the modem security analysis, we found seven locally exploited vulnerabilities and one remotely exploited vulnerability. The combination of these vulnerabilities could allow an attacker to completely get control over the modem.

]]>
Thu, 13 Jun 2024 10:00:00 +0000
APT and financial attacks on industrial organizations in Q1 2024 https://ics-cert.kaspersky.com/publications/reports/2024/06/10/apt-and-financial-attacks-on-industrial-organizations-in-q1-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/06/10/apt-and-financial-attacks-on-industrial-organizations-in-q1-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This summary provides an overview of the reports of APT and financial attacks on industrial enterprises, as well as the related activities of groups that have been observed attacking industrial organizations and critical infrastructure facilities.

]]>
Mon, 10 Jun 2024 10:00:00 +0000
Q1 2024 – a brief overview of the main incidents in industrial cybersecurity https://ics-cert.kaspersky.com/publications/reports/2024/06/03/q1-2024-a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/06/03/q1-2024-a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A total of 30 incidents were confirmed by victims. 37% of victims reported denial of operations or product shipment caused by the incident. Almost half of all incidents resulted in disruption of the victims’ public digital services.

]]>
Mon, 03 Jun 2024 10:00:00 +0000
Threat landscape for industrial automation systems. Q1 2024 https://ics-cert.kaspersky.com/publications/reports/2024/05/27/threat-landscape-for-industrial-automation-systems-q1-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/05/27/threat-landscape-for-industrial-automation-systems-q1-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In the first quarter of 2024, the percentage of ICS computers on which malicious objects were blocked decreased by 0.3 pp from the previous quarter to 21.4%. Compared to the first quarter of 2023, the percentage decreased by 1.3 pp.

]]>
Mon, 27 May 2024 10:01:00 +0000
Threat landscape for industrial automation systems. Regions, Q1 2024 https://ics-cert.kaspersky.com/publications/reports/2024/05/27/threat-landscape-for-industrial-automation-systems-regions-q1-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/05/27/threat-landscape-for-industrial-automation-systems-regions-q1-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The percentage of ICS computers on which malicious objects were blocked during the quarter varied regionally from 34.2% in Africa to 11.5% in Northern Europe. Africa and South-East Asia saw their percentages increase from the previous quarter.

]]>
Mon, 27 May 2024 10:00:00 +0000
H2 2023 – a brief overview of main incidents in industrial cybersecurity https://ics-cert.kaspersky.com/publications/reports/2024/04/11/h2-2023-a-brief-overview-of-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/04/11/h2-2023-a-brief-overview-of-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In this overview, we discuss cybercriminal and hacktivist attacks on industrial organizations.

]]>
Thu, 11 Apr 2024 10:00:00 +0000
APT and financial attacks on industrial organizations in H2 2023 https://ics-cert.kaspersky.com/publications/reports/2024/04/02/apt-and-financial-attacks-on-industrial-organizations-in-h2-2023/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/04/02/apt-and-financial-attacks-on-industrial-organizations-in-h2-2023/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An overview of reports of APT and financial attacks on industrial enterprises, as well as related activities of groups that have been observed attacking industrial organizations and critical infrastructure facilities

]]>
Tue, 02 Apr 2024 10:00:00 +0000
Industrial cybersecurity in 2024: trends and forecasts presented by Evgeny Goncharov, head of Kaspersky’s ICS CERT https://ics-cert.kaspersky.com/events/2024/03/26/industrial-cybersecurity-in-2024-trends-and-forecasts-presented-by-evgeny-goncharov-head-of-kasperskys-ics-cert/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2024/03/26/industrial-cybersecurity-in-2024-trends-and-forecasts-presented-by-evgeny-goncharov-head-of-kasperskys-ics-cert/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main As the industrial landscape evolves, so do the threats that accompany it. While many industrial threats may be developing slowly from year to year, subtle changes are reaching a critical mass, poised to reshape the cybersecurity landscape in the near future.

]]>
Tue, 26 Mar 2024 09:39:50 +0000
Threat landscape for industrial automation systems. Statistics for H2 2023 https://ics-cert.kaspersky.com/publications/reports/2024/03/19/threat-landscape-for-industrial-automation-systems-statistics-for-h2-2023/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/03/19/threat-landscape-for-industrial-automation-systems-statistics-for-h2-2023/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The statistical data presented in the report was received from ICS computers protected by Kaspersky products that Kaspersky ICS CERT categorizes as part of the industrial infrastructure at organizations.

]]>
Tue, 19 Mar 2024 10:00:00 +0000
Cybersecurity in the automotive industry: Ensuring compliance with UNECE regulations https://ics-cert.kaspersky.com/publications/reports/2024/02/07/cybersecurity-in-the-automotive-industry-ensuring-compliance-with-unece-regulations/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/02/07/cybersecurity-in-the-automotive-industry-ensuring-compliance-with-unece-regulations/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main What UN Regulations 155 and 156 require from vehicle manufacturers in reality, and how to ensure compliance with requirements and prepare for certification if necessary

]]>
Wed, 07 Feb 2024 10:00:00 +0000
ICS and OT threat predictions for 2024 https://ics-cert.kaspersky.com/publications/reports/2024/01/31/ics-and-ot-threat-predictions-for-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2024/01/31/ics-and-ot-threat-predictions-for-2024/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Most of the described trends have been observed before. However, some of them have reached a critical mass of creeping changes, which could lead to a qualitative shift in the threat landscape

]]>
Wed, 31 Jan 2024 10:00:00 +0000
Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information Through Environmental Variables https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-212-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-through-environmental-variables/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-212-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-through-environmental-variables/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A CWE-526: Exposure of Sensitive Information Through Environmental Variables vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to get access to a sensitive data on the targeted system.

]]>
Thu, 09 Nov 2023 09:30:05 +0000
Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information to an Unauthorized Actor https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-193-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-193-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to get access to a sensitive data on the targeted system.

]]>
Thu, 09 Nov 2023 09:29:54 +0000
Telit Cinterion (Thales/Gemalto) modules. Buffer Copy without Checking Size of Input vulnerability https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists in Telit Cinterion EHS5/6/8 that could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system by sending a specially crafted SMS message.

]]>
Wed, 08 Nov 2023 13:10:26 +0000
Telit Cinterion (Thales/Gemalto) modules. Improper Privilege Management vulnerability https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-216-telit-cinterion-thales-gemalto-modules-improper-privilege-management-vulnerability/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-216-telit-cinterion-thales-gemalto-modules-improper-privilege-management-vulnerability/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A CWE-269: Improper Privilege Management vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to elevate privileges to “manufacturer” level on the targeted system.

]]>
Wed, 08 Nov 2023 13:10:19 +0000
Telit Cinterion (Thales/Gemalto) modules. Relative Path Traversal https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-211-telit-cinterion-thales-gemalto-modules-relative-path-traversal/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-211-telit-cinterion-thales-gemalto-modules-relative-path-traversal/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A CWE-23: Relative Path Traversal vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to escape from virtual directories and get read/write access to protected files on the targeted system.

]]>
Wed, 08 Nov 2023 13:10:11 +0000
Telit Cinterion (Thales/Gemalto) modules. Exposure of Sensitive Information to an Unauthorized Actor vulnerability https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-210-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor-vulnerability/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-210-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor-vulnerability/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to disclose hidden virtual paths and file names on the targeted system.

]]>
Wed, 08 Nov 2023 13:10:03 +0000
Telit Cinterion (Thales/Gemalto) modules. Files or Directories Accessible to External Parties vulnerability https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-194-telit-cinterion-thales-gemalto-modules-files-or-directories-accessible-to-external-parties-vulnerability/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-194-telit-cinterion-thales-gemalto-modules-files-or-directories-accessible-to-external-parties-vulnerability/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to obtain a read/write access to any files and directories on the targeted system, including hidden files and directories.

]]>
Wed, 08 Nov 2023 13:09:51 +0000
Updated MATA attacks industrial companies in Eastern Europe https://ics-cert.kaspersky.com/publications/reports/2023/10/18/updated-mata-attacks-industrial-companies-in-eastern-europe/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2023/10/18/updated-mata-attacks-industrial-companies-in-eastern-europe/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky experts discovered several detections of malware from the MATA cluster, previously attributed to the Lazarus group, compromising defense contractor companies in Eastern Europe.

]]>
Wed, 18 Oct 2023 10:00:00 +0000
H1 2023 – a brief overview of main incidents in industrial cybersecurity https://ics-cert.kaspersky.com/publications/reports/2023/10/05/h1-2023-a-brief-overview-of-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2023/10/05/h1-2023-a-brief-overview-of-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In this overview, we discuss cybercriminal and hacktivist attacks on industrial organizations.

]]>
Thu, 05 Oct 2023 08:00:00 +0000
APT and financial attacks on industrial organizations in H1 2023 https://ics-cert.kaspersky.com/publications/reports/2023/09/25/apt-and-financial-attacks-on-industrial-organizations-in-h1-2023/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2023/09/25/apt-and-financial-attacks-on-industrial-organizations-in-h1-2023/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An overview of reports of APT and financial attacks on industrial enterprises, as well as related activities of groups that have been observed attacking industrial organizations and critical infrastructure facilities

]]>
Mon, 25 Sep 2023 08:00:00 +0000
Threat landscape for industrial automation systems. Statistics for H1 2023 https://ics-cert.kaspersky.com/publications/reports/2023/09/13/threat-landscape-for-industrial-automation-systems-statistics-for-h1-2023/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2023/09/13/threat-landscape-for-industrial-automation-systems-statistics-for-h1-2023/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The statistical data presented in the report was received from ICS computers protected by Kaspersky products that Kaspersky ICS CERT categorizes as part of the industrial infrastructure at organizations.

]]>
Wed, 13 Sep 2023 09:00:00 +0000
Common TTPs of attacks against industrial organizations. Implants for uploading data https://ics-cert.kaspersky.com/publications/reports/2023/08/10/common-ttps-of-attacks-against-industrial-organizations-implants-for-uploading-data/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2023/08/10/common-ttps-of-attacks-against-industrial-organizations-implants-for-uploading-data/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In this part we present information on the four types of implants and two tools used during the last (third) stage of the attacks discovered.

]]>
Thu, 10 Aug 2023 08:00:00 +0000
Common TTPs of attacks against industrial organizations. Implants for gathering data https://ics-cert.kaspersky.com/publications/reports/2023/07/31/common-ttps-of-attacks-against-industrial-organizations-implants-for-gathering-data/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2023/07/31/common-ttps-of-attacks-against-industrial-organizations-implants-for-gathering-data/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This part of the research is devoted to second stage malware used to gather data on infected systems of industrial organizations.

]]>
Mon, 31 Jul 2023 08:00:00 +0000
Common TTPs of attacks against industrial organizations. Implants for remote access https://ics-cert.kaspersky.com/publications/reports/2023/07/20/common-ttps-of-attacks-against-industrial-organizations-implants-for-remote-access/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2023/07/20/common-ttps-of-attacks-against-industrial-organizations-implants-for-remote-access/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In this article (which is the first part of the report) we analyze common TTPs of implants used by threat actors to establish a persistent remote access channel into the infrastructure of industrial organizations.

]]>
Thu, 20 Jul 2023 08:00:00 +0000
Why APTs are so successful – stories from IR trenches https://ics-cert.kaspersky.com/publications/blog/2023/05/30/why-apts-are-so-successful-stories-from-ir-trenches/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2023/05/30/why-apts-are-so-successful-stories-from-ir-trenches/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main During IR, while trying to figure out what went wrong, we’ve found numerous issues

]]>
Tue, 30 May 2023 08:00:00 +0000
APT attacks on industrial organizations in H2 2022 https://ics-cert.kaspersky.com/publications/reports/2023/03/24/apt-attacks-on-industrial-organizations-in-h2-2022/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2023/03/24/apt-attacks-on-industrial-organizations-in-h2-2022/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This summary provides an overview of APT attacks on industrial enterprises and activity of groups that have been observed attacking industrial organizations and critical infrastructure facilities.

]]>
Fri, 24 Mar 2023 07:00:00 +0000
H2 2022 – brief overview of main incidents in industrial cybersecurity https://ics-cert.kaspersky.com/publications/reports/2023/03/15/h2-2022-brief-overview-of-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2023/03/15/h2-2022-brief-overview-of-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In this overview, we discuss cybercriminal and hacktivist attacks on industrial organizations.

]]>
Wed, 15 Mar 2023 16:00:00 +0000
Threat landscape for industrial automation systems. Statistics for H2 2022 https://ics-cert.kaspersky.com/publications/reports/2023/03/06/threat-landscape-for-industrial-automation-systems-statistics-for-h2-2022/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2023/03/06/threat-landscape-for-industrial-automation-systems-statistics-for-h2-2022/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The statistical data presented in the report was received from ICS computers protected by Kaspersky products that Kaspersky ICS CERT categorizes as part of the industrial infrastructure at organizations.

]]>
Mon, 06 Mar 2023 10:00:00 +0000
Unusual penetration techniques – in the wild and in Red Team research https://ics-cert.kaspersky.com/publications/blog/2022/12/12/unusual-penetration-techniques-in-the-wild-and-in-red-team-research/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2022/12/12/unusual-penetration-techniques-in-the-wild-and-in-red-team-research/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main I would like to talk about some of the tricks and methods I have seen used to gain that all important initial access to remote systems. Specifically, the unexpected and unusual.

]]>
Mon, 12 Dec 2022 13:07:17 +0000
ICS cyberthreats in 2023 – what to expect https://ics-cert.kaspersky.com/publications/reports/2022/11/22/ics-cyberthreats-in-2023-what-to-expect/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2022/11/22/ics-cyberthreats-in-2023-what-to-expect/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Cybersecurity incidents were plentiful in 2022, causing many problems for industrial infrastructure owners and operators. Below we share some of our thoughts on potential developments of 2023, though we cannot claim to be providing either a complete picture or a high degree of precision.

]]>
Tue, 22 Nov 2022 08:00:00 +0000
Digital twins and ensuring the cybersecurity of enterprises. Oil and gas industry https://ics-cert.kaspersky.com/publications/reports/2022/10/20/digital-twins-and-ensuring-the-cybersecurity-of-enterprises-oil-and-gas-industry/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2022/10/20/digital-twins-and-ensuring-the-cybersecurity-of-enterprises-oil-and-gas-industry/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In modern technology-intensive production, IT and large-scale digitalization, and therefore new cybersecurity technologies, are essential to remaining competitive, reducing costs associated with maintaining the existing infrastructure, and increasing net profits.

]]>
Thu, 20 Oct 2022 08:00:00 +0000
WAGO 750 Controllers. Denial of service of the FTP server https://ics-cert.kaspersky.com/advisories/2022/10/12/klcert-22-046-wago-750-controllers-denial-of-service-of-the-ftp-server/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2022/10/12/klcert-22-046-wago-750-controllers-denial-of-service-of-the-ftp-server/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab has discovered a denial-of-service vulnerability in the WAGO 750 controllers.

]]>
Wed, 12 Oct 2022 10:09:32 +0000
The secrets of Schneider Electric’s UMAS protocol https://ics-cert.kaspersky.com/publications/reports/2022/09/29/the-secrets-of-schneider-electrics-umas-protocol/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2022/09/29/the-secrets-of-schneider-electrics-umas-protocol/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The UMAS protocol, in its implementation prior to the version in which the CVE-2021-22779 vulnerability was fixed, had significant shortcomings that had a critical effect on the security of control systems based on Schneider Electric controllers.

]]>
Thu, 29 Sep 2022 08:00:00 +0000
H1 2022 – a brief overview of the main incidents in industrial cybersecurity https://ics-cert.kaspersky.com/publications/reports/2022/09/08/h1-2022-a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2022/09/08/h1-2022-a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Events in the cybersecurity world, including ICS, were intense in H1 2022.

]]>
Thu, 08 Sep 2022 08:01:00 +0000
Threat landscape for industrial automation systems. Statistics for H1 2022 https://ics-cert.kaspersky.com/publications/reports/2022/09/08/threat-landscape-for-industrial-automation-systems-statistics-for-h1-2022/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2022/09/08/threat-landscape-for-industrial-automation-systems-statistics-for-h1-2022/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The statistical data presented in the report was received from ICS computers protected by Kaspersky products that Kaspersky ICS CERT categorizes as part of the industrial infrastructure at organizations.

]]>
Thu, 08 Sep 2022 08:00:00 +0000
Targeted attack on industrial enterprises and public institutions https://ics-cert.kaspersky.com/publications/reports/2022/08/08/targeted-attack-on-industrial-enterprises-and-public-institutions/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2022/08/08/targeted-attack-on-industrial-enterprises-and-public-institutions/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The attackers were able to penetrate dozens of enterprises and even hijack the IT infrastructure of some, taking control of systems used to manage security solutions. The goal of this series of attacks was cyberespionage.

]]>
Mon, 08 Aug 2022 08:00:00 +0000
Dynamic analysis of firmware components in IoT devices https://ics-cert.kaspersky.com/publications/reports/2022/07/06/dynamic-analysis-of-firmware-components-in-iot-devices/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2022/07/06/dynamic-analysis-of-firmware-components-in-iot-devices/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Firmware analysis is an essential part of security research and targeted search for vulnerabilities in IoT products. This article examines conventional methods of dynamic analysis and some less obvious methods.

]]>
Wed, 06 Jul 2022 10:00:00 +0000
Attacks on industrial control systems using ShadowPad https://ics-cert.kaspersky.com/publications/reports/2022/06/27/attacks-on-industrial-control-systems-using-shadowpad/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2022/06/27/attacks-on-industrial-control-systems-using-shadowpad/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A previously unknown Chinese-speaking threat actor attacking telecommunications, manufacturing, and transport organizations in several Asian countries. The group exploits MS Exchange vulnerability to deploy ShadowPad malware and infiltrates building automation systems of one of the victims.

]]>
Mon, 27 Jun 2022 10:00:00 +0000
Draft of the NIST Guide #800-82 – what has changed https://ics-cert.kaspersky.com/publications/blog/2022/05/24/draft-of-the-nist-guide-800-82-what-has-changed/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2022/05/24/draft-of-the-nist-guide-800-82-what-has-changed/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The release of the third version of the Guide to Operational Technology (OT) Security, SP 800-82 Rev. 3, is, without a doubt, a milestone. Is the third version as good as the previous ones? What has changed?

]]>
Tue, 24 May 2022 14:09:57 +0000
ISaPWN – research on the security of ISaGRAF Runtime https://ics-cert.kaspersky.com/publications/reports/2022/05/23/isapwn-research-on-the-security-of-isagraf-runtime/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2022/05/23/isapwn-research-on-the-security-of-isagraf-runtime/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This report includes an analysis of the ISaGRAF framework, its architecture, the IXL and SNCP protocols and the description of several vulnerabilities the Kaspersky ICS CERT team had identified.

]]>
Mon, 23 May 2022 10:00:00 +0000
Schneider Electric EcoStruxure Control Expert / Process Expert, SCADAPack RemoteConnect for x70. Information leak from project file https://ics-cert.kaspersky.com/advisories/2022/05/20/klcert-21-007-schneider-electric-ecostruxure-control-expert-process-expert-scadapack-remoteconnect-for-x70-information-leak-from-project-file/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2022/05/20/klcert-21-007-schneider-electric-ecostruxure-control-expert-process-expert-scadapack-remoteconnect-for-x70-information-leak-from-project-file/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main

]]>
Fri, 20 May 2022 10:56:03 +0000
Schneider Electric Modicon M340/M580 Authentication Bypass by Spoofing https://ics-cert.kaspersky.com/advisories/2022/05/20/klcert-20-061-klcert-20-068-schneider-electric-modicon-m340-m580-authentication-bypass-by-spoofing/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2022/05/20/klcert-20-061-klcert-20-068-schneider-electric-modicon-m340-m580-authentication-bypass-by-spoofing/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main

]]>
Fri, 20 May 2022 10:29:11 +0000
Vulnerability in ICS: assessing the severity https://ics-cert.kaspersky.com/publications/blog/2022/04/20/vulnerability-in-ics-assessing-the-severity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2022/04/20/vulnerability-in-ics-assessing-the-severity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main On the last day of March 2022, Claroty (Team82) published an article on two vulnerabilities they had identified in Rockwell Automation products. We believe that the severity of these vulnerabilities has been significantly exaggerated. At the same time, the most dangerous vulnerability in the same products has remained unnoticed.

]]>
Wed, 20 Apr 2022 12:00:00 +0000
Vulnerabilities in Tekon-Automatics solution: (ir)responsible disclosure and scope of the problem https://ics-cert.kaspersky.com/publications/blog/2022/03/31/vulnerabilities-in-tekon-automatics-solution-irresponsible-disclosure-and-scope-of-the-problem/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2022/03/31/vulnerabilities-in-tekon-automatics-solution-irresponsible-disclosure-and-scope-of-the-problem/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Researcher Jose Bertin described the exploitation of several vulnerabilities in a Tekon-Automatics automation solution. We analyze the real scope of what has happened and offer our take on whether this can be considered ethical vulnerability disclosure.

]]>
Thu, 31 Mar 2022 14:45:27 +0000
Kaspersky’s statement on the FIRST membership suspension https://ics-cert.kaspersky.com/publications/blog/2022/03/28/kasperskys-statement-on-the-first-membership-suspension/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2022/03/28/kasperskys-statement-on-the-first-membership-suspension/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky ICS CERT received a letter from FIRST, notifying that its membership has been temporarily suspended. Kaspersky is disappointed by this decision and believes that it hurts the international community of experts and the cybersecurity industry as a whole.

]]>
Mon, 28 Mar 2022 14:46:25 +0000
Threat landscape for industrial automation systems. Statistics for H2 2021 https://ics-cert.kaspersky.com/publications/reports/2022/03/03/threat-landscape-for-industrial-automation-systems-statistics-for-h2-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2022/03/03/threat-landscape-for-industrial-automation-systems-statistics-for-h2-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The statistical data presented in the report was received from ICS computers protected by Kaspersky products that Kaspersky ICS CERT categorizes as part of the industrial infrastructure at organizations.

]]>
Thu, 03 Mar 2022 10:00:00 +0000
APT attacks on industrial companies in H2 2021 https://ics-cert.kaspersky.com/publications/reports/2022/02/28/apt-attacks-on-industrial-companies-in-h2-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2022/02/28/apt-attacks-on-industrial-companies-in-h2-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This summary provides an overview of APT attacks on industrial enterprises disclosed in H2 2021.

]]>
Mon, 28 Feb 2022 11:00:00 +0000
Bosch AMC2. Missing authentication for critical function https://ics-cert.kaspersky.com/advisories/2022/01/20/klcert-20-038-bosch-amc2-missing-authentication-for-critical-function/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2022/01/20/klcert-20-038-bosch-amc2-missing-authentication-for-critical-function/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An unauthenticated attacker with the ability to communicate with the affected device via a broadcast address can perform administrative operations on it. It is possible to upload firmware and change the device's configuration.

]]>
Thu, 20 Jan 2022 11:25:26 +0000
Bosch AMC2. Information Disclosure due to Hard-coded Cryptographic Key https://ics-cert.kaspersky.com/advisories/2022/01/20/klcert-20-037-bosch-amc2-information-disclosure-due-to-hard-coded-cryptographic-key/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2022/01/20/klcert-20-037-bosch-amc2-information-disclosure-due-to-hard-coded-cryptographic-key/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An attacker can capture and decrypt the communication between the configuration software and the affected devices, since a symmetric encryption algorithm with a fixed key is used to encrypt the communication. An attacker is able to decrypt captured data and encrypt their own crafted data to send to the device.

]]>
Thu, 20 Jan 2022 11:25:09 +0000
Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks https://ics-cert.kaspersky.com/publications/reports/2022/01/19/campaigns-abusing-corporate-trusted-infrastructure-hunt-for-corporate-credentials-on-ics-networks/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2022/01/19/campaigns-abusing-corporate-trusted-infrastructure-hunt-for-corporate-credentials-on-ics-networks/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Targets of spyware attacks in which each malware sample has a limited-scope and a short lifetime include industrial enterprises. Victim organizations’ SMTP services are abused to send phishing emails and collect stolen data.

]]>
Wed, 19 Jan 2022 10:00:00 +0000
Log4Shell at industrial enterprises https://ics-cert.kaspersky.com/publications/reports/2021/12/30/log4shell-at-industrial-enterprises/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2021/12/30/log4shell-at-industrial-enterprises/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Although it is still difficult to say to what extent vulnerable ICS systems are exposed to potential attacks, we hope that, unlike IT infrastructures, most vulnerable OT systems cannot accept inputs coming from untrusted sources.

]]>
Thu, 30 Dec 2021 11:11:00 +0000
TÜV Austria Academy will offer Kaspersky training courses https://ics-cert.kaspersky.com/events/2021/12/22/tuv-austria-academy-will-offer-kaspersky-training-courses/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2021/12/22/tuv-austria-academy-will-offer-kaspersky-training-courses/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The cooperation between Kaspersky and the TÜV Austria Academy focuses on jointly implementing innovative certified training courses for specialists in information technology and industrial systems. The corresponding contract was signed at the end of November.

]]>
Wed, 22 Dec 2021 12:21:43 +0000
PseudoManuscrypt: a mass-scale spyware attack campaign https://ics-cert.kaspersky.com/publications/reports/2021/12/16/pseudomanuscrypt-a-mass-scale-spyware-attack-campaign/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2021/12/16/pseudomanuscrypt-a-mass-scale-spyware-attack-campaign/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky products blocked PseudoManuscrypt on more than 35,000 computers in 195 countries of the world. Targets of attacks include a significant number of industrial and government organizations, including enterprises in the military-industrial complex and research laboratories.

]]>
Thu, 16 Dec 2021 10:00:00 +0000
Kaspersky Industrial Cybersecurity Conference 2021 https://ics-cert.kaspersky.com/events/2021/12/02/kaspersky-industrial-cybersecurity-conference-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2021/12/02/kaspersky-industrial-cybersecurity-conference-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The 9th annual Kaspersky Industrial Cybersecurity Conference took place in Sochi on September 8-10.

]]>
Thu, 02 Dec 2021 11:12:40 +0000
Threats to ICS and industrial enterprises in 2022 as they are foreseen from November 2021 https://ics-cert.kaspersky.com/publications/reports/2021/11/23/threats-to-ics-and-industrial-enterprises-in-2022-as-they-are-foreseen-from-november-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2021/11/23/threats-to-ics-and-industrial-enterprises-in-2022-as-they-are-foreseen-from-november-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In recent years, we have observed various trends in the changing threat landscape for industrial enterprises, most of which have been evolving for some time. We can say with high confidence that many of these trends will not only continue, but gain new traction in the coming year.

]]>
Tue, 23 Nov 2021 10:00:00 +0000
APT attacks on industrial organizations in H1 2021 https://ics-cert.kaspersky.com/publications/reports/2021/10/26/apt-attacks-on-industrial-organizations-in-h1-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2021/10/26/apt-attacks-on-industrial-organizations-in-h1-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This summary provides an overview of APT attacks on industrial enterprises disclosed in H1 2021.

]]>
Tue, 26 Oct 2021 08:00:00 +0000
Threat landscape for industrial automation systems. Statistics for H1 2021 https://ics-cert.kaspersky.com/publications/reports/2021/09/09/threat-landscape-for-industrial-automation-systems-statistics-for-h1-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2021/09/09/threat-landscape-for-industrial-automation-systems-statistics-for-h1-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The statistical data presented in the report was received from ICS computers protected by Kaspersky products that Kaspersky ICS CERT categorizes as part of the industrial infrastructure at organizations.

]]>
Thu, 09 Sep 2021 10:00:00 +0000
Rockwell Automation ISaGRAF Runtime: Information Disclosure due to cleartext storage of passwords in a file and memory https://ics-cert.kaspersky.com/advisories/2021/07/13/klcert-20-026-rockwell-automation-isagraf-runtime-information-disclosure-due-to-cleartext-storage-of-passwords-in-a-file-and-memory/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/07/13/klcert-20-026-rockwell-automation-isagraf-runtime-information-disclosure-due-to-cleartext-storage-of-passwords-in-a-file-and-memory/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main ISaGRAF Runtime stores the password in plaintext in memory and in a file which is located in the same directory with the executable file ISAGRAF.exe.

]]>
Tue, 13 Jul 2021 12:45:15 +0000
Rockwell Automation ISaGRAF Runtime: Information Disclosure due to Hard-coded Cryptographic Key https://ics-cert.kaspersky.com/advisories/2021/07/13/klcert-20-025-rockwell-automation-isagraf-runtime-information-disclosure-due-to-hard-coded-cryptographic-key/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/07/13/klcert-20-025-rockwell-automation-isagraf-runtime-information-disclosure-due-to-hard-coded-cryptographic-key/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A remote attacker is able to decrypt passwords captured during a Man-in-the-Middle attack, because the affected software uses Tiny Encryption Algorithm (TEA) algorithm with fixed keys to encrypt transmitted passwords over ISaGRAF eXchange Layer* protocol.

]]>
Tue, 13 Jul 2021 12:45:14 +0000
Rockwell Automation ISaGRAF Runtime: Code Execution due to Uncontrolled Search Path Element https://ics-cert.kaspersky.com/advisories/2021/07/13/klcert-20-024-rockwell-automation-isagraf-runtime-code-execution-due-to-uncontrolled-search-path-element/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/07/13/klcert-20-024-rockwell-automation-isagraf-runtime-code-execution-due-to-uncontrolled-search-path-element/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An attacker with write privileges in VirtualStore folder can perform arbitrary code execution by placing ".dll" files in affected software directory, because the software loads dynamic libraries in an uncontrolled way.

]]>
Tue, 13 Jul 2021 12:45:13 +0000
Rockwell Automation ISaGRAF Runtime: Information Disclosure due to Cleartext Transmission of Information over IXL protocol https://ics-cert.kaspersky.com/advisories/2021/07/13/klcert-20-023-rockwell-automation-isagraf-runtime-information-disclosure-due-to-cleartext-transmission-of-information-over-ixl-protocol/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/07/13/klcert-20-023-rockwell-automation-isagraf-runtime-information-disclosure-due-to-cleartext-transmission-of-information-over-ixl-protocol/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A remote attacker is able to read and modify captured data during a Man-in-the-Middle attack, because the affected software uses ISaGRAF eXchange Layer* protocol, which is unencrypted by design.

]]>
Tue, 13 Jul 2021 12:45:00 +0000
Rockwell Automation ISaGRAF Runtime: Code Execution due to Relative Path Traversal https://ics-cert.kaspersky.com/advisories/2021/07/13/klcert-20-022-rockwell-automation-isagraf-runtime-code-execution-due-to-relative-path-traversal/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/07/13/klcert-20-022-rockwell-automation-isagraf-runtime-code-execution-due-to-relative-path-traversal/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Some commands used by the ISaGRAF eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible to traverse the ISaGRAF Runtime application’s directory. Scope ⚠ Scope changed: it is possible to break out from the application’s []

]]>
Tue, 13 Jul 2021 12:44:00 +0000
Robert Bosch GmbH CPP HD/MP cameras. Denial of Service via GET HTTP request https://ics-cert.kaspersky.com/advisories/2021/07/02/klcert-21-032-robert-bosch-gmbh-cpp-hd-mp-cameras-denial-of-service-via-get-http-request/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/07/02/klcert-21-032-robert-bosch-gmbh-cpp-hd-mp-cameras-denial-of-service-via-get-http-request/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky ICS CERT discovered a Denial of Service of the device through GET HTTP request to the web server of camera.

]]>
Fri, 02 Jul 2021 12:14:12 +0000
Robert Bosch GmbH CPP HD/MP cameras. Improper Input Validation in Web service application https://ics-cert.kaspersky.com/advisories/2021/07/02/klcert-21-030-robert-bosch-gmbh-cpp-hd-mp-cameras-improper-input-validation-in-web-service-application/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/07/02/klcert-21-030-robert-bosch-gmbh-cpp-hd-mp-cameras-improper-input-validation-in-web-service-application/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky ICS CERT has discovered that the web service of the Robert Bosch GmbH CPP HD/MP cameras does not correctly parse the HTTP protocol. Scope Scope changed

]]>
Fri, 02 Jul 2021 12:14:11 +0000
Robert Bosch GmbH CPP HD/MP cameras. Reflected XSS in a page parameter https://ics-cert.kaspersky.com/advisories/2021/07/02/klcert-21-019-robert-bosch-gmbh-cpp-hd-mp-cameras-reflected-xss-in-a-page-parameter/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/07/02/klcert-21-019-robert-bosch-gmbh-cpp-hd-mp-cameras-reflected-xss-in-a-page-parameter/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky ICS CERT discovered a reflected XSS in a page parameter. Scope Scope changed

]]>
Fri, 02 Jul 2021 12:14:10 +0000
Robert Bosch GmbH CPP HD/MP cameras. Multiple reflected XSS in URI handlers https://ics-cert.kaspersky.com/advisories/2021/07/02/klcert-21-016-robert-bosch-gmbh-cpp-hd-mp-cameras-multiple-reflected-xss-in-uri-handlers/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/07/02/klcert-21-016-robert-bosch-gmbh-cpp-hd-mp-cameras-multiple-reflected-xss-in-uri-handlers/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky ICS CERT discovered multiple reflected XSS in URI handlers. Scope Scope changed

]]>
Fri, 02 Jul 2021 12:14:09 +0000
Robert Bosch GmbH CPP HD/MP cameras. Missing Authentication vulnerability for Critical Functions https://ics-cert.kaspersky.com/advisories/2021/07/02/klcert-21-014-robert-bosch-gmbh-cpp-hd-mp-cameras-missing-authentication-vulnerability-for-critical-functions/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/07/02/klcert-21-014-robert-bosch-gmbh-cpp-hd-mp-cameras-missing-authentication-vulnerability-for-critical-functions/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky ICS CERT has discovered missing authentication vulnerability for execution critical commands by HTTP requests.

]]>
Fri, 02 Jul 2021 12:14:00 +0000
DarkChronicles: the consequences of the Colonial Pipeline attack https://ics-cert.kaspersky.com/publications/reports/2021/05/21/darkchronicles-the-consequences-of-the-colonial-pipeline-attack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2021/05/21/darkchronicles-the-consequences-of-the-colonial-pipeline-attack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This article began as an overview of the Colonial Pipeline incident. However, the events unfolded so rapidly that the scope of the publication has gone beyond a single incident.

]]>
Fri, 21 May 2021 16:41:38 +0000
Moxa NPort IA5000A Series. Cleartext Transmission of Sensitive Information via Moxa Service https://ics-cert.kaspersky.com/advisories/2021/05/11/klcert-20-021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/05/11/klcert-20-021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Cleartext Transmission of Sensitive Information via Moxa Service in NPort IA5000A series serial devices.

]]>
Tue, 11 May 2021 16:45:00 +0000
Moxa NPort IA5000A Series. Using the Telnet service https://ics-cert.kaspersky.com/advisories/2021/05/11/klcert-20-020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/05/11/klcert-20-020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The NPort devices use Telnet as one of the network device management services. Telnet does not support the encryption of client-server communications, making it vulnerable to Man-in-the-Middle attacks.

]]>
Tue, 11 May 2021 16:40:00 +0000
Moxa NPort IA5000A Series. Passwords stored in plaintext https://ics-cert.kaspersky.com/advisories/2021/05/11/klcert-20-019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/05/11/klcert-20-019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The result of exporting a device’s configuration contains the passwords of all users on the system and other sensitive data in the original form if “Pre-shared key” doesn’t set.

]]>
Tue, 11 May 2021 16:33:00 +0000
Moxa NPort IA5000A Series. Broken access control https://ics-cert.kaspersky.com/advisories/2021/05/11/klcert-20-018/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/05/11/klcert-20-018/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main By exploiting the vulnerability, a user with “Read Only” privilege level can send requests via the web console to have the device’s configuration changed. Scope Scope changed: the security of serial devices connected to NPort can be affected

]]>
Tue, 11 May 2021 16:26:00 +0000
Vulnerability in FortiGate VPN servers is exploited in Cring ransomware attacks https://ics-cert.kaspersky.com/publications/reports/2021/04/07/vulnerability-in-fortigate-vpn-servers-is-exploited-in-cring-ransomware-attacks/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2021/04/07/vulnerability-in-fortigate-vpn-servers-is-exploited-in-cring-ransomware-attacks/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An incident investigation conducted by Kaspersky ICS CERT experts at one of the attacked enterprises revealed that attacks of the Cring ransomware exploit a vulnerability in FortiGate VPN servers.

]]>
Wed, 07 Apr 2021 10:00:00 +0000
Good old buffer overflow https://ics-cert.kaspersky.com/publications/blog/2021/03/31/good-old-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2021/03/31/good-old-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main CISA has issued an advisory on a Rockwell Automation MicroLogix 1400 buffer overflow vulnerability

]]>
Wed, 31 Mar 2021 10:35:03 +0000
Network Asset Traversal or NATural disaster: NAT Slipstreaming 2.0 https://ics-cert.kaspersky.com/publications/blog/2021/03/30/network-asset-traversal-or-natural-disaster-nat-slipstreaming-2-0/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2021/03/30/network-asset-traversal-or-natural-disaster-nat-slipstreaming-2-0/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main NAT bypassing techniques recently published by researchers are particularly dangerous for OT networks of industrial enterprises

]]>
Tue, 30 Mar 2021 08:47:32 +0000
APT attacks on industrial companies in 2020 https://ics-cert.kaspersky.com/publications/reports/2021/03/29/apt-attacks-on-industrial-companies-in-2020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2021/03/29/apt-attacks-on-industrial-companies-in-2020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Overview of APT attacks on industrial enterprises information on which was published in 2020.

]]>
Mon, 29 Mar 2021 09:00:00 +0000
Threat landscape for industrial automation systems. Statistics for H2 2020 https://ics-cert.kaspersky.com/publications/reports/2021/03/25/threat-landscape-for-industrial-automation-systems-statistics-for-h2-2020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2021/03/25/threat-landscape-for-industrial-automation-systems-statistics-for-h2-2020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The statistical data presented in the report was received from ICS computers protected by Kaspersky products that Kaspersky ICS CERT categorizes as part of the industrial infrastructure at organizations.

]]>
Thu, 25 Mar 2021 10:00:00 +0000
Threat landscape for the ICS engineering and integration sector. 2020 https://ics-cert.kaspersky.com/publications/reports/2021/03/17/threat-landscape-for-the-ics-engineering-and-integration-sector-2020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2021/03/17/threat-landscape-for-the-ics-engineering-and-integration-sector-2020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The threat landscape for computers in the ICS engineering and integration sector varies depending on a computer’s environment, including its geographical location, ability to access external networks and services, and user behavior.

]]>
Wed, 17 Mar 2021 09:00:00 +0000
More critical vulnerabilities identified in OPC protocol implementations https://ics-cert.kaspersky.com/publications/blog/2021/03/04/more-critical-vulnerabilities-identified-in-opc-protocol-implementations/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2021/03/04/more-critical-vulnerabilities-identified-in-opc-protocol-implementations/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Solutions that use the OPC family of protocols are affected by multiple vulnerabilities that could lead to equipment failure, remote code execution or leaks of critical data

]]>
Thu, 04 Mar 2021 10:02:26 +0000
Authentication bypass in Rockwell Automation Logix controllers https://ics-cert.kaspersky.com/advisories/2021/03/02/klcert-17-029-authentication-bypass-in-rockwell-automation-logix-controllers/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2021/03/02/klcert-17-029-authentication-bypass-in-rockwell-automation-logix-controllers/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Studio 5000 Logix Designer, RSLogix 5000 and Logix controllers use a hardcoded key to verify participants of communication.

]]>
Tue, 02 Mar 2021 10:24:00 +0000
Lazarus targets defense industry with ThreatNeedle https://ics-cert.kaspersky.com/publications/reports/2021/02/25/lazarus-targets-defense-industry-with-threatneedle/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2021/02/25/lazarus-targets-defense-industry-with-threatneedle/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

]]>
Thu, 25 Feb 2021 10:00:00 +0000
Classics: vulnerabilities in web console and third-party components in Pepperl+Fuchs IO-Link-Master gateways https://ics-cert.kaspersky.com/publications/blog/2021/02/09/classics-vulnerabilities-in-web-console-and-third-party-components-in-pepperlfuchs-io-link-master-gateways/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2021/02/09/classics-vulnerabilities-in-web-console-and-third-party-components-in-pepperlfuchs-io-link-master-gateways/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vendor has published an advisory on vulnerabilities in multifunctional gateway devices designed to integrate different types of sensors and PLCs into industrial environments

]]>
Tue, 09 Feb 2021 12:31:44 +0000
Getting back on Treck: more vulnerabilities in the infamous TCP/IP Stack https://ics-cert.kaspersky.com/publications/blog/2021/02/05/getting-back-on-treck-more-vulnerabilities-in-the-infamous-tcp-ip-stack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2021/02/05/getting-back-on-treck-more-vulnerabilities-in-the-infamous-tcp-ip-stack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerabilities have been identified in the IPv6 component in the Treck TCP/IP stack implementation. It is recommended that vendors of IoT devices using that implementation issue security advisories.

]]>
Fri, 05 Feb 2021 10:01:45 +0000
Much ado about the certificate: what one should know about Siemens SCALANCE X switch configuration to avoid MitM https://ics-cert.kaspersky.com/publications/blog/2021/02/02/much-ado-about-the-certificate-what-one-should-know-about-siemens-scalance-x-switch-configuration-to-avoid-mitm/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2021/02/02/much-ado-about-the-certificate-what-one-should-know-about-siemens-scalance-x-switch-configuration-to-avoid-mitm/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Siemens has released a security alert which describes some cases of SCALANCE X-200/X-200IRT/X-300 switches using hardcoded encryption keys, making them prone to man-in-the-middle attacks

]]>
Tue, 02 Feb 2021 11:31:40 +0000
Cryptographic deadly sins and the security of Modicon M100/M200/M221 https://ics-cert.kaspersky.com/publications/blog/2021/01/28/cryptographic-deadly-sins-and-the-security-of-modicon-m100-m200-m221/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2021/01/28/cryptographic-deadly-sins-and-the-security-of-modicon-m100-m200-m221/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Weak implementation of cryptographic data protection allows various types of attacks and enables attackers to identify the key in captured traffic

]]>
Thu, 28 Jan 2021 16:19:16 +0000
From buffer overflow to switchboard setup errors: vulnerabilities in building operation software by Schneider Electric https://ics-cert.kaspersky.com/publications/blog/2021/01/27/from-buffer-overflow-to-switchboard-setup-errors-vulnerabilities-in-building-operation-software-by-schneider-electric/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2021/01/27/from-buffer-overflow-to-switchboard-setup-errors-vulnerabilities-in-building-operation-software-by-schneider-electric/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerabilities in Schneider Electric’s low-voltage distribution system configuration software could enable attackers to upload arbitrary files defining electrical system parameters

]]>
Wed, 27 Jan 2021 10:21:36 +0000
Twentieth for Ripple20: Vulnerability in embedded web server of I/O expansion modules for IoT https://ics-cert.kaspersky.com/publications/blog/2021/01/26/twentieth-for-ripple20-vulnerability-in-embedded-web-server-of-i-o-expansion-modules-for-iot/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2021/01/26/twentieth-for-ripple20-vulnerability-in-embedded-web-server-of-i-o-expansion-modules-for-iot/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Sсhneider Electric has published an advisory on a critical vulnerability in the web server used in TM3 I/O expansion modules

]]>
Tue, 26 Jan 2021 12:32:36 +0000
Critical vulnerability in Schneider Electric HMI configuration software https://ics-cert.kaspersky.com/publications/blog/2021/01/26/critical-vulnerability-in-schneider-electric-hmi-configuration-software/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2021/01/26/critical-vulnerability-in-schneider-electric-hmi-configuration-software/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerability could cause a Windows local user privilege escalation when using EcoStruxure™ Operator Terminal Expert and Pro-face BLUE software and WinGP runtime environment by Schneider Electric.

]]>
Tue, 26 Jan 2021 12:25:13 +0000
A classic that needs updating: fresh vulnerabilities in the software of Siemens SCALANCE X switches https://ics-cert.kaspersky.com/publications/blog/2021/01/26/a-classic-that-needs-updating-fresh-vulnerabilities-in-the-software-of-siemens-scalance-x-switches/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2021/01/26/a-classic-that-needs-updating-fresh-vulnerabilities-in-the-software-of-siemens-scalance-x-switches/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main DoS vulnerabilities have been disclosed in the integrated web server of Siemens SCALANCE X-200 / X-200IRT / X-300 switches. Measures proposed by the vendor do not prevent all possible attacks.

]]>
Tue, 26 Jan 2021 12:13:47 +0000
SunBurst industrial victims https://ics-cert.kaspersky.com/publications/reports/2021/01/26/sunburst-industrial-victims/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2021/01/26/sunburst-industrial-victims/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main How many industrial organizations had installed backdoored SolarWinds versions? We present the results of our analysis.

]]>
Tue, 26 Jan 2021 11:00:00 +0000
ICS threat predictions for 2021 https://ics-cert.kaspersky.com/publications/reports/2020/12/02/ics-threat-predictions-for-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/12/02/ics-threat-predictions-for-2021/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main We present our vision of what challenges industrial cybersecurity will soon be (or already is) facing, and what to expect from cybercriminals in 2021.

]]>
Wed, 02 Dec 2020 12:00:14 +0000
Are industrial organizations a target for cybercriminals? https://ics-cert.kaspersky.com/events/2020/12/01/are-industrial-organizations-a-target-for-cybercriminals/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2020/12/01/are-industrial-organizations-a-target-for-cybercriminals/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky ICS CERT experts virtually provided ICS Training for Executives

]]>
Tue, 01 Dec 2020 11:30:53 +0000
Kaspersky ICS CERT goes virtual with the Deggendorf Institute of Technology! https://ics-cert.kaspersky.com/events/2020/11/24/kaspersky-ics-cert-goes-virtual-with-the-deggendorf-institute-of-technology/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2020/11/24/kaspersky-ics-cert-goes-virtual-with-the-deggendorf-institute-of-technology/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky’s mission incorporates education on all levels, including collaborations with universities. As part of this mission, we have been working with the Deggendorf Institute of Technology (DIT) for the past eighteen months.

]]>
Tue, 24 Nov 2020 08:58:17 +0000
First things first: Kaspersky ICS CERT becomes new member of the global Forum of Incident Response and Security Teams (FIRST) https://ics-cert.kaspersky.com/publications/blog/2020/11/23/first-things-first-kaspersky-ics-cert-becomes-new-member-of-the-global-forum-of-incident-response-and-security-teams-first/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/11/23/first-things-first-kaspersky-ics-cert-becomes-new-member-of-the-global-forum-of-incident-response-and-security-teams-first/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main After rigorous assessment, Kaspersky’s Industrial Systems Emergency Response Team (ICS CERT) has officially joined FIRST – the global Forum of Incident Response and Security Teams.

]]>
Mon, 23 Nov 2020 10:59:10 +0000
ENISA publishes guidelines for securing internet of things supply chain https://ics-cert.kaspersky.com/publications/blog/2020/11/23/enisa-publishes-guidelines-for-securing-internet-of-things-supply-chain/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/11/23/enisa-publishes-guidelines-for-securing-internet-of-things-supply-chain/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The European Union Agency for Cybersecurity (ENISA) has published its guidelines for securing the internet of things supply chain. Kaspersky ICS CERT experts were among the contributors to the development effort.

]]>
Mon, 23 Nov 2020 10:13:30 +0000
Municipal services at Canadian City of Saint John down due to cyberattack https://ics-cert.kaspersky.com/publications/blog/2020/11/18/saint-john-attack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/11/18/saint-john-attack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Attack by Ryuk ransomware disrupts nearly all municipal services in Canadian city of Saint John

]]>
Wed, 18 Nov 2020 16:02:50 +0000
Attacks on industrial enterprises using RMS and TeamViewer: new data https://ics-cert.kaspersky.com/publications/reports/2020/11/05/attacks-on-industrial-enterprises-using-rms-and-teamviewer-new-data/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/11/05/attacks-on-industrial-enterprises-using-rms-and-teamviewer-new-data/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The attacks use remote administration utilities whose graphical user interface is hidden by the malware, enabling the attackers to control the infected system without the user’s knowledge.

]]>
Thu, 05 Nov 2020 10:00:00 +0000
Practical example of fuzzing OPC UA applications https://ics-cert.kaspersky.com/publications/reports/2020/10/19/practical-example-of-fuzzing-opc-ua-applications/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/10/19/practical-example-of-fuzzing-opc-ua-applications/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main We continue to describe our approaches to searching for vulnerabilities in industrial systems based on the OPC UA protocol. In this article, we examine new techniques that can be used to search for memory corruption vulnerabilities if the source code is available. We also discuss an example of fuzzing using libfuzzer.

]]>
Mon, 19 Oct 2020 08:00:00 +0000
What it feels like for a turbine https://ics-cert.kaspersky.com/publications/reports/2020/10/13/what-it-feels-like-for-a-turbine/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/10/13/what-it-feels-like-for-a-turbine/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The goal of the article is to raise awareness on security of Distributed Control Systems (DCS), propose a methodology for assessment, and a remediation strategy. Defenders are always behind attackers, and this publication is trying to balance things out.

]]>
Tue, 13 Oct 2020 13:03:41 +0000
Session Information Exposure in ARC Informatique PcVue https://ics-cert.kaspersky.com/advisories/2020/10/09/klcert-20-017-session-information-exposure-in-arc-informatique-pcvue/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/10/09/klcert-20-017-session-information-exposure-in-arc-informatique-pcvue/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An information exposure vulnerability exists in PcVue 12, allowing a non-authorized user to access session data of legitimate users.

]]>
Fri, 09 Oct 2020 15:07:00 +0000
Denial-of-Service in ARC Informatique PcVue https://ics-cert.kaspersky.com/advisories/2020/10/09/klcert-20-016-denial-of-service-in-arc-informatique-pcvue/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/10/09/klcert-20-016-denial-of-service-in-arc-informatique-pcvue/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A Denial of service vulnerability exists in PcVue 12, due to the ability for a non-authorized user to modify information used to validate messages sent by legitimate web clients.

]]>
Fri, 09 Oct 2020 15:03:00 +0000
Remote Code Execution in ARC Informatique PcVue https://ics-cert.kaspersky.com/advisories/2020/10/09/klcert-20-015-remote-code-execution-in-arc-informatique-pcvue/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/10/09/klcert-20-015-remote-code-execution-in-arc-informatique-pcvue/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An attacker with network access to the target workstation can send specially crafted packets with serialized data, which may cause remote code execution upon deserialization.

]]>
Fri, 09 Oct 2020 14:59:00 +0000
MontysThree: Industrial espionage with steganography and a Russian accent on both sides https://ics-cert.kaspersky.com/publications/reports/2020/10/08/montysthree-industrial-espionage-with-steganography-and-a-russian-accent-on-both-sides/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/10/08/montysthree-industrial-espionage-with-steganography-and-a-russian-accent-on-both-sides/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In Summer 2020 we uncovered a previously unknown multi-module C++ toolset used in highly targeted industrial espionage attacks dating back to 2018.

]]>
Thu, 08 Oct 2020 10:00:00 +0000
Threat landscape for industrial automation systems. H1 2020 https://ics-cert.kaspersky.com/publications/reports/2020/09/24/threat-landscape-for-industrial-automation-systems-h1-2020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/09/24/threat-landscape-for-industrial-automation-systems-h1-2020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The percentage of computers attacked globally is decreasing. At the same time, threats are becoming more localized, more focused, and, as a result, more diverse and sophisticated.

]]>
Thu, 24 Sep 2020 08:00:00 +0000
The State of Industrial Cybersecurity 2020 https://ics-cert.kaspersky.com/publications/reports/2020/09/15/the-state-of-industrial-cybersecurity-2020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/09/15/the-state-of-industrial-cybersecurity-2020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In 2020 ARC Advisory Group on behalf of Kaspersky conducted a survey on the state of industrial cybersecurity, as well as the current priorities and challenges of industrial organizations. More than 330 industrial companies and organizations across the globe were surveyed online and 10 industry representatives were interviewed at trade fairs and ARC forums worldwide.

]]>
Tue, 15 Sep 2020 11:00:00 +0000
Cyberthreats for ICS in Energy in Europe. Q1 2020 https://ics-cert.kaspersky.com/publications/reports/2020/08/31/cyberthreats-for-ics-in-energy-in-europe-q1-2020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/08/31/cyberthreats-for-ics-in-energy-in-europe-q1-2020/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In Q1 2020 in Europe, Kaspersky products were triggered on 20.4% of ICS computers in the energy sector. A total of 1,485 malware modifications from 633 different families were blocked.

]]>
Mon, 31 Aug 2020 10:00:00 +0000
Session token exposed in Honeywell ControlEdge PLC and RTU https://ics-cert.kaspersky.com/advisories/2020/06/23/klcert-20-014-session-token-exposed-in-honeywell-controledge-plc-and-rtu/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/06/23/klcert-20-014-session-token-exposed-in-honeywell-controledge-plc-and-rtu/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Exposed session token in Honeywell ControlEdge PLC and RTU.

]]>
Tue, 23 Jun 2020 10:31:00 +0000
Unencypted password transmission in Honeywell ControlEdge PLC and RTU https://ics-cert.kaspersky.com/advisories/2020/06/23/klcert-20-013-unencypted-password-transmission-in-honeywell-controledge-plc-and-rtu/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/06/23/klcert-20-013-unencypted-password-transmission-in-honeywell-controledge-plc-and-rtu/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Unencrypted password transmission on the network in Honeywell ControlEdge PLC and RTU.

]]>
Tue, 23 Jun 2020 10:28:00 +0000
Targeted attacks on industrial companies using Snake ransomware (updated) https://ics-cert.kaspersky.com/publications/alerts/2020/06/17/targeted-attacks-on-industrial-companies-using-snake-ransomware/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/alerts/2020/06/17/targeted-attacks-on-industrial-companies-using-snake-ransomware/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main According to Kaspersky ICS CERT data, a number of industrial companies are currently experiencing targeted attacks involving the Snake encryption ransomware.

]]>
Wed, 17 Jun 2020 16:51:23 +0000
Steganography in attacks on industrial enterprises (updated) https://ics-cert.kaspersky.com/publications/reports/2020/06/17/steganography-in-attacks-on-industrial-enterprises/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/06/17/steganography-in-attacks-on-industrial-enterprises/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky ICS CERT has identified a series of attacks targeting, among others, organizations in various industrial sectors. Victims include suppliers of equipment and software for industrial enterprises.

]]>
Wed, 17 Jun 2020 10:00:00 +0000
Multiple vulnerabilities in EcoStruxure Operator Terminal Expert https://ics-cert.kaspersky.com/publications/blog/2020/05/28/multiple-vulnerabilities-in-ecostruxure-operator-terminal-expert/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/05/28/multiple-vulnerabilities-in-ecostruxure-operator-terminal-expert/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerabilities that can lead to unsanctioned account access or remote code execution.

]]>
Thu, 28 May 2020 15:01:16 +0000
Dangerous vulnerabilities in Emerson OpenEnterprise https://ics-cert.kaspersky.com/publications/blog/2020/05/28/dangerous-vulnerabilities-in-emerson-openenterprise/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/05/28/dangerous-vulnerabilities-in-emerson-openenterprise/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky ICS CERT has discovered vulnerabilities that may allow threat actors to modify configuration files, execute arbitrary code remotely or access user passwords.

]]>
Thu, 28 May 2020 15:00:42 +0000
Cyber incidents in industrial enterprises during the first half of May: Stadler, Elexon, BlueScope https://ics-cert.kaspersky.com/publications/blog/2020/05/20/cyber-incidents-in-industrial-enterprises-during-the-first-half-of-may/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/05/20/cyber-incidents-in-industrial-enterprises-during-the-first-half-of-may/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Victims included a railway stock manufacturer, an electric utility company and a steel producer. One incident brought operations to a halt

]]>
Wed, 20 May 2020 10:23:26 +0000
Missing Authentication in Emerson OpenEnterprise SCADA before 3.3.4 https://ics-cert.kaspersky.com/advisories/2020/05/20/klcert-20-012-missing-authentication-in-emerson-openenterprise-scada-before-3-3-4/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/05/20/klcert-20-012-missing-authentication-in-emerson-openenterprise-scada-before-3-3-4/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Missing Authentication in Emerson OpenEnterprise SCADA versions before 3.3.4 might lead to arbitrary code execution. The affected components may allow an attacker to run an arbitrary commands with system privileges or perform remote code execution via a specific communication service.

]]>
Wed, 20 May 2020 09:12:00 +0000
Inadequate Encryption Strength in Emerson OpenEnterprise SCADA before 3.3.4 https://ics-cert.kaspersky.com/advisories/2020/05/20/klcert-20-011-inadequate-encryption-strength-in-emerson-openenterprise-scada-before-3-3-4/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/05/20/klcert-20-011-inadequate-encryption-strength-in-emerson-openenterprise-scada-before-3-3-4/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Inadequate Encryption Strength in Emerson OpenEnterprise SCADA versions before 3.3.4.

]]>
Wed, 20 May 2020 09:09:00 +0000
Improper Ownership Management in Emerson OpenEnterprise SCADA before 3.3.4 https://ics-cert.kaspersky.com/advisories/2020/05/20/klcert-20-010-improper-ownership-management-in-emerson-openenterprise-scada-before-3-3-4/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/05/20/klcert-20-010-improper-ownership-management-in-emerson-openenterprise-scada-before-3-3-4/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Improper Ownership Management in Emerson OpenEnterprise SCADA versions before 3.3.4.

]]>
Wed, 20 May 2020 09:06:00 +0000
Overview of recommendations on organizing secure remote work for critical infrastructure and other facilities https://ics-cert.kaspersky.com/publications/reports/2020/04/30/secure-remote-work-for-critical-infrastructure/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/04/30/secure-remote-work-for-critical-infrastructure/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Do security issues associated with working remotely affect critical infrastructure enterprises? Should organizations take additional protective measures? A view of regulators in the area of information security.

]]>
Thu, 30 Apr 2020 17:14:50 +0000
Multiple vulnerabilities in ABB 800xA DCS https://ics-cert.kaspersky.com/publications/blog/2020/04/30/abb-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/04/30/abb-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerabilities could allow attackers to remotely compromise hosts, cause denial-of-service conditions or elevate their privileges

]]>
Thu, 30 Apr 2020 08:50:11 +0000
Targeted attacks on Israeli water supply and wastewater treatment facilities https://ics-cert.kaspersky.com/publications/blog/2020/04/29/israel-water-cyberattacks/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/04/29/israel-water-cyberattacks/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Israeli authorities have warned of possible attacks on SCADA systems of wastewater treatment, water pumping and sewerage facilities

]]>
Tue, 28 Apr 2020 21:11:24 +0000
Malicious campaigns against Azerbaijan’s government and industrial organizations https://ics-cert.kaspersky.com/publications/blog/2020/04/24/attacks-on-azerbaijan/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/04/24/attacks-on-azerbaijan/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The attackers use PoetRAT, a new RAT Trojan distributed via Microsoft Word documents

]]>
Fri, 24 Apr 2020 12:20:47 +0000
Threat landscape for industrial automation systems. Overall global statistics – H2 2019 https://ics-cert.kaspersky.com/publications/reports/2020/04/24/threat-landscape-for-industrial-automation-systems-overall-global-statistics-h2-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/04/24/threat-landscape-for-industrial-automation-systems-overall-global-statistics-h2-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The statistical data presented in the report was received from ICS computers protected by Kaspersky products that Kaspersky ICS CERT categorizes as part of the industrial infrastructure at organizations.

]]>
Fri, 24 Apr 2020 08:04:00 +0000
Threat landscape for industrial automation systems. Ransomware and other malware: key events of H2 2019 https://ics-cert.kaspersky.com/publications/reports/2020/04/24/threat-landscape-for-industrial-automation-systems-ransomware-and-other-malware-key-events-of-h2-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/04/24/threat-landscape-for-industrial-automation-systems-ransomware-and-other-malware-key-events-of-h2-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This section presents an overview of threats related to ransomware activity against municipal institutions, industrial enterprises and critical infrastructure facilities.

]]>
Fri, 24 Apr 2020 08:03:00 +0000
Threat landscape for industrial automation systems. APT attacks on industrial companies in 2019 https://ics-cert.kaspersky.com/publications/reports/2020/04/24/threat-landscape-for-industrial-automation-systems-apt-attacks-on-industrial-companies-in-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/04/24/threat-landscape-for-industrial-automation-systems-apt-attacks-on-industrial-companies-in-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Overview of APT attacks on industrial enterprises information on which was published in 2019.

]]>
Fri, 24 Apr 2020 08:02:00 +0000
Threat landscape for industrial automation systems. Vulnerabilities identified in 2019 https://ics-cert.kaspersky.com/publications/reports/2020/04/24/threat-landscape-for-industrial-automation-systems-vulnerabilities-identified-in-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/04/24/threat-landscape-for-industrial-automation-systems-vulnerabilities-identified-in-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The analysis of vulnerabilities was performed based on vendor advisories, publicly available information from open vulnerability databases (US ICS-CERT, CVE, Siemens Product CERT), as well as the results of Kaspersky ICS CERT’s own research.

]]>
Fri, 24 Apr 2020 08:01:00 +0000
Threat landscape for industrial automation systems. 2019 Report at a glance https://ics-cert.kaspersky.com/publications/reports/2020/04/24/threat-landscape-for-industrial-automation-systems-2019-report-at-a-glance/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/04/24/threat-landscape-for-industrial-automation-systems-2019-report-at-a-glance/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Malicious objects were blocked on 46.6% and ransomware on 1.0% of ICS computers. Kaspersky ICS CERT identified 103 vulnerabilities in industrial systems, IIoT/IoT systems, and other types of solutions.

]]>
Fri, 24 Apr 2020 08:00:00 +0000
Dozens of Siemens industrial devices are affected by DoS vulnerabilities https://ics-cert.kaspersky.com/publications/blog/2020/04/17/siemens-dos-vulnerabilities-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/04/17/siemens-dos-vulnerabilities-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Siemens industrial solutions are affected by SegmentSmack and FragmentSmack vulnerabilities, which could lead to device denial of service

]]>
Fri, 17 Apr 2020 19:01:24 +0000
New ransomware attacks on industrial enterprises https://ics-cert.kaspersky.com/publications/blog/2020/04/17/new-ransomware/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/04/17/new-ransomware/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In new ransomware attacks, victims face the choice between paying the ransom and seeing their sensitive data published by the attackers

]]>
Fri, 17 Apr 2020 16:20:31 +0000
Multiple vulnerabilities in Advantech WebAccess/NMS https://ics-cert.kaspersky.com/publications/blog/2020/04/13/advantech-webaccess-nms/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/04/13/advantech-webaccess-nms/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main If exploited, the vulnerabilities could lead to arbitrary code execution, file manipulations, denial of service and the creation of an admin account

]]>
Mon, 13 Apr 2020 14:12:06 +0000
Threat actor behind Ruyk malware continues attacks on medical facilities despite epidemic https://ics-cert.kaspersky.com/publications/blog/2020/04/03/ryuk-attacks-continue/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/04/03/ryuk-attacks-continue/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In the past month, 10 more hospitals have fallen victim to Ryuk attacks in the US

]]>
Fri, 03 Apr 2020 12:37:39 +0000
WildPressure targets industrial-related entities in the Middle East https://ics-cert.kaspersky.com/publications/reports/2020/03/26/wildpressure-targets-industrial-related-entities-in-the-middle-east/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2020/03/26/wildpressure-targets-industrial-related-entities-in-the-middle-east/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main We found just three almost unique samples, all in one country. So we consider the attacks to be targeted and have currently named this operation WildPressure.

]]>
Thu, 26 Mar 2020 13:13:42 +0000
Remote Code Execution on LibVNC version prior to 0.9.12 https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-009-remote-code-execution-on-libvnc-version-prior-to-0-9-12/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-009-remote-code-execution-on-libvnc-version-prior-to-0-9-12/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main LibVNC client code contains heap buffer overflow vulnerability in commit prior to 6073771eed1caf72f196e410182471e0dfd32149. This could possible result into remote code execution. This attack appear to be exploitable via network connectivity. The issue has been fixed in commit 54220248886b5001fbbb9fa73c4e1a2cb9413fed.

]]>
Mon, 23 Mar 2020 12:20:00 +0000
Remote Code Execution on TigerVNC version prior to 1.10.1 https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-008-remote-code-execution-on-tigervnc-version-prior-to-1-10-1-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-008-remote-code-execution-on-tigervnc-version-prior-to-1-10-1-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack []

]]>
Mon, 23 Mar 2020 12:18:00 +0000
Remote Code Execution on TigerVNC version prior to 1.10.1 https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-007-remote-code-execution-on-tigervnc-version-prior-to-1-10-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-007-remote-code-execution-on-tigervnc-version-prior-to-1-10-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.

]]>
Mon, 23 Mar 2020 12:15:00 +0000
Remote Code Execution on TigerVNC version prior to 1.10.1 https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-006-remote-code-execution-on-tigervnc-version-prior-to-1-10-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-006-remote-code-execution-on-tigervnc-version-prior-to-1-10-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow. Vulnerability could be triggered from CopyRectDecoder due to incorrect value checks. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.

]]>
Mon, 23 Mar 2020 12:10:00 +0000
Remote Code Execution on TigerVNC version prior to 1.10.1 https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-005-remote-code-execution-on-tigervnc-version-prior-to-1-10-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-005-remote-code-execution-on-tigervnc-version-prior-to-1-10-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote []

]]>
Mon, 23 Mar 2020 12:08:00 +0000
Remote Code Execution on TigerVNC version prior to 1.10.1 https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-323-remote-code-execution-on-tigervnc-version-prior-to-1-10-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-323-remote-code-execution-on-tigervnc-version-prior-to-1-10-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.

]]>
Mon, 23 Mar 2020 12:07:00 +0000
Remote Code Execution on Emerson OpenEnterprise SCADA Server version 2.83 and all versions of OpenEnterprise 3.1 through 3.3.3 https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-324-remote-code-execution-on-emerson-openenterprise-scada-server-version-2-83-and-all-versions-of-openenterprise-3-1-through-3-3-3/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/03/23/klcert-20-324-remote-code-execution-on-emerson-openenterprise-scada-server-version-2-83-and-all-versions-of-openenterprise-3-1-through-3-3-3/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A Heap-based Buffer Overflow was found in Emerson OpenEnterprise SCADA Server version 2.83 (if Modbus or ROC Interfaces have been installed and are in use) and all versions of OpenEnterprise 3.1 through 3.3.3, where a specially crafted script could execute code on the OpenEnterprise Server.

]]>
Mon, 23 Mar 2020 12:01:00 +0000
XXE on Moxa’s cellular management software OnCell Central Manager Version lower than 2.4.1 https://ics-cert.kaspersky.com/advisories/2020/03/16/klcert-20-002-xxe-on-moxas-cellular-management-software-oncell-central-manager-version-lower-than-2-4-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/03/16/klcert-20-002-xxe-on-moxas-cellular-management-software-oncell-central-manager-version-lower-than-2-4-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Moxa’s cellular management software OnCell Central Manager Version lower than 2.4.1 was affected to XML External Entity (XXE) due to vulnerable third-party component usage (Apache Flex BlazeDS).

]]>
Mon, 16 Mar 2020 11:01:00 +0000
Remote Code Execution on Moxa’s cellular management software OnCell Central Manager Version lower than 2.4.1 https://ics-cert.kaspersky.com/advisories/2020/03/16/klcert-20-001-remote-code-execution-on-moxas-cellular-management-software-oncell-central-manager-version-lower-than-2-4-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2020/03/16/klcert-20-001-remote-code-execution-on-moxas-cellular-management-software-oncell-central-manager-version-lower-than-2-4-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Moxa’s cellular management software OnCell Central Manager Version lower than 2.4.1 was affected to Remote Code Execution due to vulnerable third-party component usage (Apache Flex BlazeDS).

]]>
Mon, 16 Mar 2020 10:52:00 +0000
Kaspersky conducts ICS digital forensics and incident response training course in China https://ics-cert.kaspersky.com/events/2020/01/30/kaspersky-in-china/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2020/01/30/kaspersky-in-china/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Beijing, 23-27 December 2019: Kaspersky ICS CERT together with the China Industrial Control Systems Cyber Emergency Response Team (CIC) conducted a training course on digital forensics and incident response in industrial control systems.

]]>
Thu, 30 Jan 2020 10:53:55 +0000
Ransomware attack on Picanol paralyzes production at plants in Belgium, Romania, and China https://ics-cert.kaspersky.com/publications/blog/2020/01/17/picanol-ransomware/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/01/17/picanol-ransomware/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The company has been forced to stop its operations almost completely. Production recovery will take at least a week

]]>
Fri, 17 Jan 2020 15:03:12 +0000
Dustman wiper attack on Bapco oil company https://ics-cert.kaspersky.com/publications/blog/2020/01/10/bapco-dustman/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2020/01/10/bapco-dustman/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Dustman is an upgraded version of the ZeroCleare wiper. The attack exploited a vulnerability in VPN appliances

]]>
Fri, 10 Jan 2020 10:40:12 +0000
Ryuk ransomware attacks unnamed US maritime transportation facility https://ics-cert.kaspersky.com/publications/blog/2019/12/30/ryuk-attacks-maritime-facility/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/12/30/ryuk-attacks-maritime-facility/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The infection affected the facility’s corporate network and industrial control systems that control cargo transfer. The primary operations of the facility were shut down for over 30 hours

]]>
Mon, 30 Dec 2019 15:51:27 +0000
German cities under attack by Emotet botnet https://ics-cert.kaspersky.com/publications/blog/2019/12/24/emotet-attacks-german-cities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/12/24/emotet-attacks-german-cities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Emotet was distributed via phishing emails and was used to deploy ransomware

]]>
Tue, 24 Dec 2019 11:34:53 +0000
Multiple vulnerabilities in WAGO PLCs https://ics-cert.kaspersky.com/publications/blog/2019/12/20/wago-critical-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/12/20/wago-critical-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Nine vulnerabilities have been identified in WAGO PFC200 and PFC100 PLCs. They could lead to arbitrary code execution or cause denial of service

]]>
Fri, 20 Dec 2019 16:42:24 +0000
More ransomware attacks https://ics-cert.kaspersky.com/publications/blog/2019/12/20/more-ransomware-attacks/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/12/20/more-ransomware-attacks/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Victims of the latest attacks include Pensacola and New Orleans city administrations in the US and a hospital in Benešov (Czech Republic)

]]>
Fri, 20 Dec 2019 10:38:50 +0000
Multiple vulnerabilities in Modicon controllers https://ics-cert.kaspersky.com/publications/blog/2019/12/19/schneider-electric-modicon-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/12/19/schneider-electric-modicon-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main If exploited, the vulnerabilities could result in denial of service. They can be fixed by updating device firmware

]]>
Thu, 19 Dec 2019 15:19:38 +0000
Multiple vulnerabilities in SPPA-T3000 components https://ics-cert.kaspersky.com/publications/blog/2019/12/18/siemens-sppa-t3000/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/12/18/siemens-sppa-t3000/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerabilities have been identified in SPPA-T3000 Application Server and MS3000 Migration Server. Some of the faults are critical and could allow attackers to execute arbitrary code on the server

]]>
Wed, 18 Dec 2019 10:42:23 +0000
Multiple vulnerabilities in Siemens products https://ics-cert.kaspersky.com/publications/blog/2019/12/17/siemens-multiple-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/12/17/siemens-multiple-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerable solutions include SiNVR 3, XHQ Operations Intelligence, RUGGEDCOM ROS, and Siemens EN100

]]>
Tue, 17 Dec 2019 15:21:30 +0000
Biometric data processing and storage system threats https://ics-cert.kaspersky.com/publications/reports/2019/12/02/biometric-data-processing-and-storage-system-threats/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/12/02/biometric-data-processing-and-storage-system-threats/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The findings of our research can be used to make a more objective assessment of risks associated with using modern biometric authentication systems.

]]>
Mon, 02 Dec 2019 15:00:02 +0000
Applied industrial cybersecurity by Kaspersky at the Deggendorf Institute of Technology https://ics-cert.kaspersky.com/events/2019/11/25/applied-industrial-cybersecurity-by-kaspersky-at-the-deggendorf-institute-of-technology/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2019/11/25/applied-industrial-cybersecurity-by-kaspersky-at-the-deggendorf-institute-of-technology/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main October 14 and 15, 2019, Kaspersky ICS CERT experts provided an exclusive two-day training program on applied industrial cybersecurity at the Deggendorf Institute of Technology (DIT) for graduate students specializing in cybersecurity, as well as for 30 students from various DIT courses.

]]>
Mon, 25 Nov 2019 14:26:00 +0000
VNC vulnerability research https://ics-cert.kaspersky.com/publications/reports/2019/11/22/vnc-vulnerability-research/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/11/22/vnc-vulnerability-research/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Findings of research on different implementations of the VNC remote access system. Memory corruption vulnerabilities were found, some of which, if exploited, could lead to remote code execution.

]]>
Fri, 22 Nov 2019 10:00:53 +0000
7th Kaspersky Industrial Cybersecurity Conference https://ics-cert.kaspersky.com/events/2019/11/01/7th-kaspersky-industrial-cybersecurity-conference/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2019/11/01/7th-kaspersky-industrial-cybersecurity-conference/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky’s seventh international conference dedicated to industrial cybersecurity took place on September 18­­-20 in Sochi, Russia.

]]>
Fri, 01 Nov 2019 12:46:42 +0000
A denial-of-service condition in RDesktop before 1.8.5 https://ics-cert.kaspersky.com/advisories/2019/10/30/klcert-19-032-denial-of-service-in-rdesktop-before-1-8-4/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/10/30/klcert-19-032-denial-of-service-in-rdesktop-before-1-8-4/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Rdesktop before version 1.8.5 contains multiple out-of-bound access read vulnerabilities in its code, which results in a denial-of-service (DoS) condition. This attack appear to be exploitable via network connectivity. These issues have been fixed in version 1.8.5.

]]>
Wed, 30 Oct 2019 12:00:00 +0000
Vulnerability in Cisco IOS and IOS XE affecting industrial routers https://ics-cert.kaspersky.com/publications/blog/2019/10/01/cisco-ios/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/10/01/cisco-ios/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Affected devices include Cisco 800 Series industrial routers and Cisco 1000 Series Connected Grid Routers (CGR 1000)

]]>
Tue, 01 Oct 2019 16:39:57 +0000
Cyberattack on Rheinmetall technology group https://ics-cert.kaspersky.com/publications/blog/2019/10/01/rheinmetall/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/10/01/rheinmetall/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A malware attack has disrupted production at Rheinmetall Group plants in three countries. The company expects it to take 2 to 4 weeks to eliminate the disruption

]]>
Tue, 01 Oct 2019 15:15:29 +0000
Threat landscape for industrial automation systems, H1 2019 https://ics-cert.kaspersky.com/publications/reports/2019/09/30/threat-landscape-for-industrial-automation-systems-h1-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/09/30/threat-landscape-for-industrial-automation-systems-h1-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Descriptions of dangerous threats, our findings from analyzing statistics on blocked threats, and possible vectors of malware penetration of ICS computers.

]]>
Mon, 30 Sep 2019 10:00:38 +0000
Threat landscape for smart buildings. H1 2019 in brief https://ics-cert.kaspersky.com/publications/reports/2019/09/19/threat-landscape-for-smart-buildings-h1-2019-in-brief/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/09/19/threat-landscape-for-smart-buildings-h1-2019-in-brief/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main What threats are relevant to building automation systems and what malware their owners have encountered in the first six months of 2019.

]]>
Thu, 19 Sep 2019 12:11:47 +0000
Security research: CODESYS Runtime, a PLC control framework. Part 3 https://ics-cert.kaspersky.com/publications/reports/2019/09/18/security-research-codesys-runtime-a-plc-control-framework-part-3/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/09/18/security-research-codesys-runtime-a-plc-control-framework-part-3/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This article continues the discussion of research on popular OEM technologies that are implemented in the products of a large number of vendors. Vulnerabilities in such technologies are highly likely to affect the security of many, if not all, products that use them. In some cases, this means hundreds of products that are used in industrial environments and in critical infrastructure facilities. This is the case with CODESYS Runtime, a framework by CODESYS designed for developing and executing industrial control system software.

]]>
Wed, 18 Sep 2019 10:01:04 +0000
Security research: CODESYS Runtime, a PLC control framework. Part 2 https://ics-cert.kaspersky.com/publications/reports/2019/09/18/security-research-codesys-runtime-a-plc-control-framework-part-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/09/18/security-research-codesys-runtime-a-plc-control-framework-part-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This article continues the discussion of research on popular OEM technologies that are implemented in the products of a large number of vendors. Vulnerabilities in such technologies are highly likely to affect the security of many, if not all, products that use them. In some cases, this means hundreds of products that are used in industrial environments and in critical infrastructure facilities. This is the case with CODESYS Runtime, a framework by CODESYS designed for developing and executing industrial control system software.

]]>
Wed, 18 Sep 2019 10:00:21 +0000
Security research: CODESYS Runtime, a PLC control framework. Part 1 https://ics-cert.kaspersky.com/publications/reports/2019/09/18/security-research-codesys-runtime-a-plc-control-framework-part-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/09/18/security-research-codesys-runtime-a-plc-control-framework-part-1/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This article continues the discussion of research on popular OEM technologies that are implemented in the products of a large number of vendors. Vulnerabilities in such technologies are highly likely to affect the security of many, if not all, products that use them. In some cases, this means hundreds of products that are used in industrial environments and in critical infrastructure facilities. This is the case with CODESYS Runtime, a framework by CODESYS designed for developing and executing industrial control system software.

]]>
Wed, 18 Sep 2019 09:59:03 +0000
Multiple vulnerabilities identified in Red Lion Controls Crimson software https://ics-cert.kaspersky.com/publications/blog/2019/09/11/red-lion/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/09/11/red-lion/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Successful exploitation of the vulnerabilities could allow an attacker to execute arbitrary code, crash the device or view protected data

]]>
Wed, 11 Sep 2019 16:03:03 +0000
Software vulnerabilities in EZ Touch Editor and EZ PLC Editor https://ics-cert.kaspersky.com/publications/blog/2019/09/11/ez-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/09/11/ez-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Exploitation of the vulnerabilities could lead to remote code execution

]]>
Wed, 11 Sep 2019 14:57:08 +0000
State of Industrial Cybersecurity: survey by Kaspersky and ARC Advisory Group https://ics-cert.kaspersky.com/publications/blog/2019/08/29/survey-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/08/29/survey-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main ARC Advisory Group and Kaspersky have presented a survey on the state of industrial cybersecurity in 2019

]]>
Thu, 29 Aug 2019 14:42:44 +0000
Industrial Internet Consortium will support Kaspersky Industrial Cybersecurity Conference 2019 as Association Partner https://ics-cert.kaspersky.com/publications/blog/2019/08/16/iic-conference-sochi/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/08/16/iic-conference-sochi/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Industrial Internet Consortium will take part in the Kaspersky Industrial Cybersecurity Conference 2019 in Sochi as an Association Partner. Don't miss the IIC delegate's presentation!

]]>
Fri, 16 Aug 2019 15:57:38 +0000
The internet of things security maturity model: a nudge for IoT cybersecurity https://ics-cert.kaspersky.com/publications/reports/2019/08/14/the-internet-of-things-security-maturity-model-a-nudge-for-iot-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/08/14/the-internet-of-things-security-maturity-model-a-nudge-for-iot-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The purpose of the IoT Security Maturity Model (IoT SMM) is to help choose protection measures against cyberthreats that correspond to the company’s actual business needs.

]]>
Wed, 14 Aug 2019 09:00:36 +0000
CODESYS V3 Password transmission vulnerability https://ics-cert.kaspersky.com/advisories/2019/08/13/klcert-19-031-codesys-v3-password-transmission-vulnerability/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/08/13/klcert-19-031-codesys-v3-password-transmission-vulnerability/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The CODESYS Control runtime system enables embedded or PC-based devices to be a programmable industrial controller. The CODESYS Control runtime system provides several security features. To limit the access to the programming port, it allows defining users with individual passwords or also to configure a role based user management with graded access rights and multiple []

]]>
Tue, 13 Aug 2019 15:17:00 +0000
Vulnerabilities fixed in Mitsubishi Electric FR Configurator2 https://ics-cert.kaspersky.com/publications/blog/2019/07/26/fr-configurator/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/07/26/fr-configurator/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerabilities could allow an attacker to read arbitrary files or cause a denial-of-service condition

]]>
Fri, 26 Jul 2019 16:33:02 +0000
Dangerous vulnerabilities in Siemens TIA Administrator, SIMATIC WinCC and PCS7 https://ics-cert.kaspersky.com/publications/blog/2019/07/16/siemens-vulnerabilties/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/07/16/siemens-vulnerabilties/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerabilities can lead to a denial-of-service condition and command execution without proper authentication

]]>
Tue, 16 Jul 2019 16:36:24 +0000
Dangerous vulnerability in the IGSS system https://ics-cert.kaspersky.com/publications/blog/2019/07/16/schneider-electric-igss/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/07/16/schneider-electric-igss/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerability could allow an attacker to force the software to crash or to execute arbitrary code

]]>
Tue, 16 Jul 2019 16:16:32 +0000
Multiple vulnerabilities in Schneider Electric Floating License Manager https://ics-cert.kaspersky.com/publications/blog/2019/07/16/schneider-electric-flm/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/07/16/schneider-electric-flm/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In addition to Schneider Electric, security issues affect products from AVEVA Vijeo Citect and Citect SCADA

]]>
Tue, 16 Jul 2019 15:56:00 +0000
New vulnerability in Schneider Electric Modicon PLCs https://ics-cert.kaspersky.com/publications/blog/2019/07/09/schneider-electric-modicon/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/07/09/schneider-electric-modicon/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerability is due to an improper check for unusual or exceptional conditions and could lead to denial of service

]]>
Tue, 09 Jul 2019 15:41:40 +0000
How we hacked our colleague’s smart home, or morning drum bass https://ics-cert.kaspersky.com/publications/reports/2019/07/01/fibaro-smart-home/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/07/01/fibaro-smart-home/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In this article, we publish the results of our study of the Fibaro Home Center smart home. We identified vulnerabilities in Fibaro Home Center 2 and Fibaro Home Center Lite version 4.540, as well as vulnerabilities in the online API.

]]>
Mon, 01 Jul 2019 10:00:29 +0000
Multiple vulnerabilities in ABB HMI solutions https://ics-cert.kaspersky.com/publications/blog/2019/06/28/abb-hmi/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/06/28/abb-hmi/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerabilities affect CP635 and CP651 control panels and PB610 Panel Builder 600

]]>
Fri, 28 Jun 2019 17:29:40 +0000
Critical vulnerability in SICK MSC800 PLC https://ics-cert.kaspersky.com/publications/blog/2019/06/28/sick-msc800/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/06/28/sick-msc800/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerability is caused by the use of hard-coded credentials

]]>
Fri, 28 Jun 2019 14:40:29 +0000
Multiple vulnerabilities in Advantech WebAccess/SCADA https://ics-cert.kaspersky.com/publications/blog/2019/06/28/webaccess-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/06/28/webaccess-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerabilities could lead to the disclosure of important information, deletion of files and remote code execution

]]>
Fri, 28 Jun 2019 13:45:49 +0000
Vulnerabilities in Phoenix Contact’s Automation Worx Software Suite https://ics-cert.kaspersky.com/publications/blog/2019/06/24/worx-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/06/24/worx-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Successful exploitations of the vulnerabilities could lead to remote execution of arbitrary code

]]>
Mon, 24 Jun 2019 15:18:57 +0000
Critical vulnerabilities in WAGO industrial switches https://ics-cert.kaspersky.com/publications/blog/2019/06/17/wago-fixed/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/06/17/wago-fixed/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Exploitation of the vulnerabilities could allow a remote compromise of the managed switch, resulting in disruption of communication and root access to the operating system

]]>
Mon, 17 Jun 2019 15:33:36 +0000
Ransomware disrupts production at four ASCO Industries plants https://ics-cert.kaspersky.com/publications/blog/2019/06/14/asco-ransomware/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/06/14/asco-ransomware/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A ransomware attack has caused ASCO plants in Belgium, Germany, Canada and the US to suspend their operations. 1000 employees have been placed on a one-week leave

]]>
Fri, 14 Jun 2019 15:40:38 +0000
Dangerous vulnerabilities identified in Phoenix Contact industrial switches and controllers https://ics-cert.kaspersky.com/publications/blog/2019/06/11/phoenix-contact/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/06/11/phoenix-contact/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerabilities allow attackers to gain unauthorized access to device configuration, decrypt passwords, cause denial of service, or bypass authentication

]]>
Tue, 11 Jun 2019 16:53:45 +0000
Dangerous vulnerability fixed in Cisco Industrial Network Director https://ics-cert.kaspersky.com/publications/blog/2019/06/11/cisco-ind/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/06/11/cisco-ind/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerability could be used by an authenticated, remote attacker to execute arbitrary code on devices running vulnerable software

]]>
Tue, 11 Jun 2019 16:19:24 +0000
Multiple vulnerabilities in Optergy Proton/Enterprise building management system https://ics-cert.kaspersky.com/publications/blog/2019/06/10/optergy/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/06/10/optergy/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main If successfully exploited, the vulnerabilities could allow an attacker to execute code remotely and gain full system access

]]>
Mon, 10 Jun 2019 14:21:15 +0000
Hasplm cookie without HTTPOnly attribute https://ics-cert.kaspersky.com/advisories/2019/06/05/klcert-19-030-hasplm-cookie-without-httponly-attribute/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/06/05/klcert-19-030-hasplm-cookie-without-httponly-attribute/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Hasplm cookie does not have a HTTPOnly attribute.

]]>
Wed, 05 Jun 2019 13:46:00 +0000
Gemalto Admin Control Center uses cleartext communication with www3.safenet-inc.com https://ics-cert.kaspersky.com/advisories/2019/06/05/klcert-19-029-gemalto-admin-control-center-uses-cleartext-communication-with-www3-safenet-inc-com/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/06/05/klcert-19-029-gemalto-admin-control-center-uses-cleartext-communication-with-www3-safenet-inc-com/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Gemalto Admin Control Center, all versions prior to 7.92, uses cleartext HTTP to communicate with www3.safenet-inc.com to obtain language packs.

]]>
Wed, 05 Jun 2019 13:43:00 +0000
Critical vulnerabilities identified by Kaspersky Lab have been corrected in Siemens SIMATIC WinCC and SIMATIC PCS 7 https://ics-cert.kaspersky.com/publications/blog/2019/05/20/simatic-wincc-pcs-7/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/05/20/simatic-wincc-pcs-7/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Multiple vulnerabilities could lead to arbitrary code and command execution on a target system and a denial-of-service condition

]]>
Mon, 20 May 2019 09:06:19 +0000
Remote Code Execution Vulnerability in Siemens SIMATIC WinCC and SIMATIC PCS 7 https://ics-cert.kaspersky.com/advisories/2019/05/16/klcert-19-027-remote-code-execution-vulnerability-in-siemens-simatic-wincc-and-simatic-pcs-7/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/05/16/klcert-19-027-remote-code-execution-vulnerability-in-siemens-simatic-wincc-and-simatic-pcs-7/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An attacker with network access to affected installations, which are configured without “Encrypted Communication”, can execute arbitrary code. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected installation. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the device.

]]>
Thu, 16 May 2019 10:32:00 +0000
Siemens WinCC local denial of service https://ics-cert.kaspersky.com/advisories/2019/05/16/klcert-19-026-siemens-wincc-local-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/05/16/klcert-19-026-siemens-wincc-local-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An attacker with local access to the project file could cause a Denial-of-Service condition on the affected product while the project file is loaded. Successful exploitation requires access to the project file. An attacker could use the vulnerability to compromise availability of the affected system.

]]>
Thu, 16 May 2019 10:31:00 +0000
Siemens SIMATIC WinCC and SIMATIC PCS 7 remote code execution using specially crafted project files https://ics-cert.kaspersky.com/advisories/2019/05/16/klcert-19-025-siemens-simatic-wincc-and-simatic-pcs-7-remote-code-execution-using-specially-crafted-project-files/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/05/16/klcert-19-025-siemens-simatic-wincc-and-simatic-pcs-7-remote-code-execution-using-specially-crafted-project-files/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An attacker with access to the project file could run arbitrary system commands with the privileges of the local database server. The vulnerability could be exploited by an attacker with access to the project file. The vulnerability does impact the confidentiality, integrity, and availability of the affected system.

]]>
Thu, 16 May 2019 10:27:00 +0000
Kaspersky Industrial CTF 2019 Finals Results https://ics-cert.kaspersky.com/events/2019/04/29/ctf-2019-finals/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2019/04/29/ctf-2019-finals/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The finals of the Kaspersky Industrial CTF, an industrial cybersecurity contest, were just held in Singapore. The winner is the LC/BC team from Russia

]]>
Mon, 29 Apr 2019 10:33:31 +0000
Cybersecurity Insight – MIT workshops in partnership with Kaspersky Lab https://ics-cert.kaspersky.com/events/2019/04/05/cybersecurity-insight-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2019/04/05/cybersecurity-insight-2019/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main MIT held Cybersecurity Insight, providing presentations, practical workshops and an ICS CTF in partnership with Kaspersky Lab

]]>
Fri, 05 Apr 2019 08:49:01 +0000
Threat landscape for industrial automation systems. H2 2018 https://ics-cert.kaspersky.com/publications/reports/2019/03/27/threat-landscape-for-industrial-automation-systems-h2-2018/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/03/27/threat-landscape-for-industrial-automation-systems-h2-2018/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Main events of the six-month period, vulnerabilities identified in 2018, relevant threats, and statistics from ICS computers protected by Kaspersky products.

]]>
Wed, 27 Mar 2019 10:00:53 +0000
Metallurgical giant Norsk Hydro attacked by encrypting malware https://ics-cert.kaspersky.com/publications/blog/2019/03/22/metallurgical-giant-norsk-hydro-attacked-by-encrypting-malware/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/03/22/metallurgical-giant-norsk-hydro-attacked-by-encrypting-malware/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main On March 19 2019 Norsk Hydro, one of the world’s largest aluminum producers revealed that ransomware had been used in an attack against them.

]]>
Fri, 22 Mar 2019 15:43:06 +0000
UltraVNC Improper Initialization https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 contains multiple memory leaks (CWE-665) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure.

]]>
Fri, 01 Mar 2019 14:53:00 +0000
UltraVNC Stack-based Buffer Overflow https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-023-ultravnc-stack-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-023-ultravnc-stack-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 has a stack buffer overflow vulnerability in VNC server code inside file transfer request handler, which can result in denial-of-service (DoS) condition.

]]>
Fri, 01 Mar 2019 14:52:08 +0000
UltraVNC Improper Null Termination https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-022-ultravnc-improper-null-termination/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-022-ultravnc-improper-null-termination/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 has a multiple improper null termination vulnerabilities in VNC server code, which result out-of-bound data being access by remote user.

]]>
Fri, 01 Mar 2019 14:52:00 +0000
UltraVNC Heap-based Buffer Overflow https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-021-ultravnc-heap-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-021-ultravnc-heap-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 has a heap buffer overflow vulnerability in VNC server code inside file transfer offer handler, which can potentially result in code execution.

]]>
Fri, 01 Mar 2019 14:51:07 +0000
UltraVNC Heap-based Buffer Overflow https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-020-ultravnc-heap-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-020-ultravnc-heap-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 has a heap buffer overflow vulnerability in VNC server code inside file transfer request handler, which can potentially result in code execution.

]]>
Fri, 01 Mar 2019 14:51:00 +0000
UltraVNC Off-by-one Error https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-019-ultravnc-off-by-one-error/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-019-ultravnc-off-by-one-error/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 has a multiple off-by-one vulnerabilities in VNC server code, which can potentially result in code execution.

]]>
Fri, 01 Mar 2019 14:50:06 +0000
UltraVNC Heap-based Buffer Overflow https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-018-ultravnc-heap-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-018-ultravnc-heap-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 has a heap buffer overflow vulnerability in VNC server code inside file transfer handler, which can potentially result in code execution.

]]>
Fri, 01 Mar 2019 14:50:00 +0000
UltraVNC Out-of-bounds Read https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-017-ultravnc-out-of-bounds-read/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-017-ultravnc-out-of-bounds-read/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 has out-of-bounds read vulnerability in VNC client code inside Ultra decoder, which results in a denial-of-service (DoS) condition of VNC client.

]]>
Fri, 01 Mar 2019 14:49:00 +0000
UltraVNC Stack-based Buffer Overflow https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-016-ultravnc-stack-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-016-ultravnc-stack-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 has stack-based Buffer overflow vulnerability in VNC client code inside FileTransfer module, which leads to a denial-of-service (DoS) condition of VNC client.

]]>
Fri, 01 Mar 2019 14:48:05 +0000
UltraVNC Off-by-one Error https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-015-ultravnc-off-by-one-error/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-015-ultravnc-off-by-one-error/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC revision 1206 has multiple off-by-one vulnerabilities in VNC client code connected with improper usage of ClientConnection::ReadString function, which can potentially result code execution. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1207.

]]>
Fri, 01 Mar 2019 14:48:00 +0000
UltraVNC Out-of-bounds Read https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-014-ultravnc-out-of-bounds-read/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-014-ultravnc-out-of-bounds-read/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 has out-of-bounds read vulnerability in VNC client code inside TextChat module, which results in a denial-of-service (DoS) condition.

]]>
Fri, 01 Mar 2019 14:47:00 +0000
UltraVNC Access of Memory Location After End of Buffer https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-013-ultravnc-access-of-memory-location-after-end-of-buffer/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-013-ultravnc-access-of-memory-location-after-end-of-buffer/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC revision 1207 has multiple out-of-bounds access vulnerabilities connected with improper usage of ClientConnection::Copybuffer function in VNC client code, which can potentially result code execution. This attack appear to be exploitable via network connectivity. User interaction is required to trigger these vulnerabilities. These vulnerabilities have been fixed in revision 1208.

]]>
Fri, 01 Mar 2019 14:46:04 +0000
UltraVNC Access of Memory Location After End of Buffer https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-012-ultravnc-access-of-memory-location-after-end-of-buffer/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-012-ultravnc-access-of-memory-location-after-end-of-buffer/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC revision 1207 has multiple out-of-bounds access vulnerabilities connected with improper usage of SETPIXELS macro in VNC client code, which can potentially result code execution. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1208.

]]>
Fri, 01 Mar 2019 14:46:00 +0000
UltraVNC Access of Memory Location After End of Buffer https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-011-ultravnc-access-of-memory-location-after-end-of-buffer/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-011-ultravnc-access-of-memory-location-after-end-of-buffer/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 has out-of-bounds access vulnerability in VNC client inside Ultra2 decoder, which can potentially result in code execution.

]]>
Fri, 01 Mar 2019 14:45:00 +0000
UltraVNC Stack-based Buffer Overflow https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-010-ultravnc-stack-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-010-ultravnc-stack-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 has stack-based buffer overflow vulnerability in VNC client code inside ShowConnInfo routine, which leads to a denial-of-service (DoS) condition of VNC client.

]]>
Fri, 01 Mar 2019 14:44:03 +0000
UltraVNC Access of Memory Location After End of Buffer https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An attacker controlling a device with the UltraVNC Server running can perform remote code execution on the client devices to cause a denial-of-service condition, modify system's and/or obtain sensitive information.

]]>
Fri, 01 Mar 2019 14:44:00 +0000
UltraVNC Heap-based Buffer Overflow https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-008-ultravnc-heap-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-008-ultravnc-heap-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC before 1.2.2.4 has multiple heap buffer overflow vulnerabilities in VNC client code inside Ultra decoder, which results in code execution.

]]>
Fri, 01 Mar 2019 14:43:00 +0000
UltraVNC Out-of-bound Read https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-007-ultravnc-out-of-bound-read/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-007-ultravnc-out-of-bound-read/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC Viewer before 1.2.2.4 has an out-of-bounds read vulnerability inside client CoRRE decoder, caused by multiplication overflow.

]]>
Fri, 01 Mar 2019 14:42:00 +0000
UltraVNC Out-of-bound Read https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-006-ultravnc-out-of-bound-read/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-006-ultravnc-out-of-bound-read/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC Viewer before 1.2.2.4 has a out-of-bounds read vulnerability in RRE decoder code, caused by multiplication overflow.

]]>
Fri, 01 Mar 2019 14:41:02 +0000
UltraVNC Memory Leak https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-005-ultravnc-memory-leak/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-005-ultravnc-memory-leak/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC revision 1198 contains multiple memory leaks (CWE-655) in VNC client code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been []

]]>
Fri, 01 Mar 2019 14:41:00 +0000
UltraVNC Heap-based Buffer Overflow https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-004-ultravnc-heap-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-004-ultravnc-heap-based-buffer-overflow/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An attacker controlling a device with the UltraVNC Server running can perform remote code execution on the client devices to cause a denial-of-service condition, modify system's data and/or obtain sensitive information.

]]>
Fri, 01 Mar 2019 14:38:00 +0000
UltraVNC Buffer Underwrite https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-003-ultravnc-buffer-underwrite/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-003-ultravnc-buffer-underwrite/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main UltraVNC Viewer before 1.2.2.4 has a buffer underflow vulnerability, which can potentially result in code execution.

]]>
Fri, 01 Mar 2019 14:36:00 +0000
AVEA Wonderware System Platform Vulnerability – Unauthorized Access to Credentials https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-002-avea-wonderware-system-platform-vulnerability-unauthorized-access-to-credentials/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-002-avea-wonderware-system-platform-vulnerability-unauthorized-access-to-credentials/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main AVEVA Wonderware System Platform vulnerability leading to Unauthorized Access to Credentials.

]]>
Fri, 01 Mar 2019 14:35:00 +0000
DeltaV Authentication Bypass https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-001-deltav-authentication-bypass/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2019/03/01/klcert-19-001-deltav-authentication-bypass/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An attacker with network access to the affected distributed control system (DCS) workstation can bypass the authentication of a maintenance port via brute-force, because number of login attempts is not limited. Having access to a maintenance port, the attacker can cause a denial-of-service condition.

]]>
Fri, 01 Mar 2019 14:33:00 +0000
Kaspersky Lab has taken part in S4x19 Industrial Cybersecurity Conference https://ics-cert.kaspersky.com/events/2019/01/31/s4-19/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2019/01/31/s4-19/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab presented its latest findings on CoDeSys Runtime vulnerabilities at the S4x19 conference, in what was a successful debut among competing industrial cybersecurity vendors

]]>
Thu, 31 Jan 2019 14:47:06 +0000
GreyEnergy’s overlap with Zebrocy https://ics-cert.kaspersky.com/publications/reports/2019/01/24/greyenergys-overlap-with-zebrocy/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/01/24/greyenergys-overlap-with-zebrocy/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Zebrocy is the name given to a subset of the Sofacy group (aka Fancy Bear, Sednit, APT28, Tsar Team, etc.). GreyEnergy and Zebrocy used the same servers at the same time and attacked the same organization.

]]>
Thu, 24 Jan 2019 09:00:06 +0000
Security research: ThingsPro Suite – IIoT gateway and device manager by Moxa https://ics-cert.kaspersky.com/publications/reports/2019/01/22/security-research-thingspro-suite-iiot-gateway-and-device-manager-by-moxa/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/01/22/security-research-thingspro-suite-iiot-gateway-and-device-manager-by-moxa/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The security of products such as IIoT requires special attention. This time, the subject of our research was the ThingsPro Suite, an IIoT gateway and device manager from Moxa.

]]>
Tue, 22 Jan 2019 10:00:12 +0000
Kaspersky Lab Joins Cybersecurity at MIT Sloan for Third Annual Academic Seminar https://ics-cert.kaspersky.com/events/2019/01/18/kaspersky-lab-joins-cybersecurity-at-mit-sloan-for-third-annual-academic-seminar/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2019/01/18/kaspersky-lab-joins-cybersecurity-at-mit-sloan-for-third-annual-academic-seminar/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab today announced it is working with the Cybersecurity at MIT Sloan Consortium (CAMS) to host the “Cybersecurity Insight” seminar, offering participants an opportunity to learn about current cybersecurity technologies, trends, and management practices. The event is open to the broad MIT community during MIT’s Independent Activities Period (IAP) from January 22 – 25.

]]>
Fri, 18 Jan 2019 10:18:04 +0000
Challenges of industrial cybersecurity https://ics-cert.kaspersky.com/publications/reports/2019/01/17/challenges-of-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2019/01/17/challenges-of-industrial-cybersecurity/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Factors that have a significant effect, now and going forward, on the threat landscape, on the development, implementation, and use of organizational and technical measures to protect industrial facilities, and the main issues associated with ensuring the cybersecurity of industrial enterprises.

]]>
Thu, 17 Jan 2019 10:00:26 +0000
Vulnerabilities in Schneider Electric industrial solutions https://ics-cert.kaspersky.com/publications/blog/2019/01/15/schneider-electric-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2019/01/15/schneider-electric-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Critical and severe vulnerabilities have been identified in GP-Pro EX programming environment, Zelio Soft software and IIoT Monitor platform

]]>
Tue, 15 Jan 2019 10:10:49 +0000
CodeSYS Control V3 Use of Insufficiently Random Values https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main CODESYS communication servers use insufficiently random values.

]]>
Wed, 19 Dec 2018 20:10:00 +0000
CodeSYS Control V3 Improper Communication Address Filtering https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main CODESYS routing protocol may disguise the source of crafted communication packets.

]]>
Wed, 19 Dec 2018 20:07:00 +0000
CodeSYS Control V3 Access Control Inactive by Default https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-035-codesys-control-v3-access-control-inactive-by-default/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-035-codesys-control-v3-access-control-inactive-by-default/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Neither communication encryption nor user authentication is activated by default, but must be activated by the user.

]]>
Wed, 19 Dec 2018 20:04:00 +0000
LibVNC NULL Pointer Dereference https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main LibVNCServer before a 0.9.12 release contains a null pointer dereference in VNC client code, which can result in denial-of-service condition.

]]>
Wed, 19 Dec 2018 10:16:00 +0000
LibVNC Memory leak https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main LibVNC before 8b06f835e259652b0ff026898014fc7297ade858 contains a CWE-665: Improper Initialization vulnerability in VNC Repeater client code, which could allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and bypass ASLR. This vulnerability has been fixed in 8b06f835e259652b0ff026898014fc7297ade858 and later.

]]>
Wed, 19 Dec 2018 10:14:00 +0000
LibVNC Multiple Memory Leaks https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains multiple CWE-665: Improper Initialization weaknesses in VNC client code, which could allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and bypass ASLR. This vulnerability has been fixed in 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 and later.

]]>
Wed, 19 Dec 2018 10:13:00 +0000
LibVNC Infinite Loop https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-031-libvnc-infinite-loop/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-031-libvnc-infinite-loop/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main LibVNCServer before a 0.9.12 release contains a CWE-835: Infinite Loop vulnerability in VNC client code. The vulnerability could allow an attacker to consume an excessive amount of resources, such as CPU and RAM.

]]>
Wed, 19 Dec 2018 10:11:00 +0000
LibVNC Heap Out-of-Bound Write https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main LibVNCServer before a 0.9.12 release contains a heap out-of-bound write vulnerability in a structure in VNC client code, which can result in remote code execution.

]]>
Wed, 19 Dec 2018 10:10:00 +0000
LibVNC Multiple Heap Out-of-Bound Vulnerabilities https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main LibVNCServer before a 0.9.12 release contains multiple heap out-of-bound write vulnerabilities in VNC client code, which can result in remote code execution.

]]>
Wed, 19 Dec 2018 10:08:00 +0000
LibVNC Heap Out-of-Bound Write https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main LibVNCServer before a 0.9.12 release contains a heap out-of-bound write vulnerability in the server code of the file transfer extension, which can result in remote code execution.

]]>
Wed, 19 Dec 2018 10:05:00 +0000
LibVNC Heap Use-After-Free https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-027-libvnc-heap-use-after-free/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-027-libvnc-heap-use-after-free/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main LibVNCServer before a 0.9.12 release contains a heap use-after-free vulnerability in the server code of the file transfer extension, which can result in remote code execution.

]]>
Wed, 19 Dec 2018 10:03:00 +0000
LibVNC Heap Use-After-Free https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main LibVNCServer before a 0.9.12 release contains a heap use-after-free vulnerability in the server code of the file transfer extension, which can result in remote code execution.

]]>
Wed, 19 Dec 2018 10:02:00 +0000
Critical vulnerabilities in Siemens SINUMERIK controllers https://ics-cert.kaspersky.com/publications/blog/2018/12/14/sinumerik/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/12/14/sinumerik/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Exploitation of vulnerabilities in Siemens SINUMERIK controllers cold allow remote code execution, privilege escalation and device denial-of-service conditions

]]>
Fri, 14 Dec 2018 15:56:08 +0000
Kaspersky Lab and Fraunhofer IOSB conduct another joint training https://ics-cert.kaspersky.com/events/2018/12/14/kaspersky-lab-and-fraunhofer-iosb-conduct-another-joint-training/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2018/12/14/kaspersky-lab-and-fraunhofer-iosb-conduct-another-joint-training/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Another two-day course “Advanced Industrial Cybersecurity in Practice” was held in Germany. The course included theoretical sections followed by live demonstrations and exercises. An international group of participants left positive feedback

]]>
Fri, 14 Dec 2018 10:16:56 +0000
IoT Security in the ‘Smart Manufacturing’ world: a new study by ENISA https://ics-cert.kaspersky.com/publications/blog/2018/12/11/enisa-report/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/12/11/enisa-report/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main ENISA has released a new study: “Good Practices for Security of Internet of Things in the context of Smart Manufacturing. Kaspersky Lab ICS CERT experts contributed to the study.

]]>
Tue, 11 Dec 2018 08:00:46 +0000
General Electric Proficy GDS XML eXternal Entity (XXE) https://ics-cert.kaspersky.com/advisories/2018/12/07/klcert-18-025-general-electric-proficy-gds-xml-external-entity-xxe/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/12/07/klcert-18-025-general-electric-proficy-gds-xml-external-entity-xxe/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An XXE injection vulnerability leads to path traversal inside the Proficy server. An attacker may be able to initiate an OPC UA session and retrieve an arbitrary file from the target system.

]]>
Fri, 07 Dec 2018 13:18:00 +0000
Kaspersky Industrial CTF 2018 Qualifications Results https://ics-cert.kaspersky.com/events/2018/11/29/ctf-2018-quals/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2018/11/29/ctf-2018-quals/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The online qualifications round for Kaspersky Industrial CTF 2018 took place on November 23-24. Over 1,000 teams registered with 130 eventually scoring points. The top 4 teams will participate in the finals

]]>
Thu, 29 Nov 2018 11:54:27 +0000
Kaspersky Lab ICS CERT Hands-on: IoT vulnerability research and exploitation training https://ics-cert.kaspersky.com/events/2018/11/27/kaspersky-lab-ics-cert-hands-on-iot-vulnerability-research-and-exploitation-training/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2018/11/27/kaspersky-lab-ics-cert-hands-on-iot-vulnerability-research-and-exploitation-training/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab ICS CERT is conducting a practical course in IoT vulnerability research. This class provides a deep dive into hardware analysis, firmware extraction and analysis, vulnerability research and exploitation.

]]>
Tue, 27 Nov 2018 11:07:44 +0000
Critical vulnerability in Modicon M221 PLC https://ics-cert.kaspersky.com/publications/blog/2018/11/23/modicon-m221/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/11/23/modicon-m221/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A critical vulnerability in Modicon M221 PLC could allow attackers to intercept traffic by remotely changing IPv4 parameters

]]>
Fri, 23 Nov 2018 15:10:17 +0000
RATs - are they Useful or Dangerous for your ICS https://ics-cert.kaspersky.com/events/2018/11/19/rats-are-they-useful-or-dangerous-for-your-ics/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2018/11/19/rats-are-they-useful-or-dangerous-for-your-ics/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In October 2018, Vyacheslav Kopeytsev, Security Researcher, Critical Infrastructure Threat Analysis, spoke at MALCON 2018, the 13th IEEE International Conference on Malicious and Unwanted Software, held this year in Massachusetts, USA.

]]>
Mon, 19 Nov 2018 10:47:52 +0000
Web vulnerabilities in Siemens SIMATIC operator panels https://ics-cert.kaspersky.com/publications/blog/2018/11/16/simatic-web/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/11/16/simatic-web/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The most serious of the vulnerabilities could allow arbitrary files to be downloaded from the device

]]>
Fri, 16 Nov 2018 13:15:35 +0000
Vulnerabilities in Siemens industrial products https://ics-cert.kaspersky.com/publications/blog/2018/11/16/siemens-nov18/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/11/16/siemens-nov18/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The most dangerous of the vulnerabilities affect the SIMATIC S7-400 CPU family and the SIMATIC IT Production Suite software package. The vulnerabilities have been fixed for most of the affected products

]]>
Fri, 16 Nov 2018 13:01:49 +0000
Schneider Electric has fixed a vulnerability in SESU software https://ics-cert.kaspersky.com/publications/blog/2018/11/08/sesu/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/11/08/sesu/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerability affects the Schneider Electric Software Update (SESU) tool, which is used to notify users when updated Schneider Electric software is available

]]>
Thu, 08 Nov 2018 11:22:53 +0000
Critical vulnerabilities in CirCarLife electric vehicle chargers https://ics-cert.kaspersky.com/publications/blog/2018/11/08/circarlife/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/11/08/circarlife/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Successful exploitation of these vulnerabilities could allow a remote attacker to retrieve credentials to bypass authentication, and to access critical information

]]>
Thu, 08 Nov 2018 08:41:52 +0000
Critical vulnerabilities in AVEVA industrial software https://ics-cert.kaspersky.com/publications/blog/2018/11/07/aveva-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/11/07/aveva-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerabilities affect InduSoft Web Studio and InTouch Edge HMI and could allow remote execution of arbitrary code

]]>
Wed, 07 Nov 2018 13:26:44 +0000
Multiple vulnerabilities in Advantech WebAccess https://ics-cert.kaspersky.com/publications/blog/2018/10/29/advantech-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/10/29/advantech-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerabilities identified in Advantech WebAccess include buffer overflow, path traversal, improper privilege management, etc.

]]>
Mon, 29 Oct 2018 16:14:29 +0000
Kaspersky Lab challenges whitehats to find flaws in IoT devices, in Capture the Flag competition https://ics-cert.kaspersky.com/events/2018/10/23/ctf-2018/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2018/10/23/ctf-2018/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab is launching the fourth international industrial Capture the Flag (CTF) security competition and inviting ethical hackers (whitehats) from across the world to test the security of smart devices and industrial systems

]]>
Tue, 23 Oct 2018 14:05:33 +0000
Phishing attack targeting Italian naval and defense industry https://ics-cert.kaspersky.com/publications/blog/2018/10/22/yoroi/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/10/22/yoroi/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The attackers attempted to infect computers with MartyMcFly remote access Trojan using phishing emails with malicious attachments

]]>
Mon, 22 Oct 2018 15:57:19 +0000
New GreyEnergy malware attacks industrial networks https://ics-cert.kaspersky.com/publications/blog/2018/10/19/greyenergy/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/10/19/greyenergy/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Experts point to the similarities between the new malware and BlackEnergy, and a possible connection of the attacks with the TeleBots criminal group

]]>
Fri, 19 Oct 2018 12:17:02 +0000
Moxa ThingsPro IIoT Gateway and Device Management Software Solutions: Remote Code Execution https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-024-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-remote-code-execution/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-024-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-remote-code-execution/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Remote Code Execution in Moxa ThingsPro IIoT Gateway and Device Management Software.

]]>
Thu, 18 Oct 2018 15:00:00 +0000
Moxa ThingsPro IIoT Gateway and Device Management Software Solutions: Hidden Token Access https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-023-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-hidden-token-access/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-023-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-hidden-token-access/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Hidden Token Access in Moxa ThingsPro IIoT Gateway and Device Management Software.

]]>
Thu, 18 Oct 2018 14:58:00 +0000
Moxa ThingsPro IIoT Gateway and Device Management Software Solutions: Sensitive Information Stored in Clear Text https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-022-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-sensitive-information-stored-in-clear-text/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-022-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-sensitive-information-stored-in-clear-text/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Sensitive Information Stored in Clear Text in Moxa ThingsPro IIoT Gateway and Device Management Software.

]]>
Thu, 18 Oct 2018 14:57:00 +0000
Moxa ThingsPro IIoT Gateway and Device Management Software Solutions: Password Management Issue https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-021-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-password-management-issue/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-021-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-password-management-issue/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Password Management Issue in Moxa ThingsPro IIoT Gateway and Device Management Software.

]]>
Thu, 18 Oct 2018 14:55:00 +0000
Moxa ThingsPro IIoT Gateway and Device Management Software Solutions: Broken Access Control https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-020-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-broken-access-control/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-020-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-broken-access-control/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Broken access control in Moxa ThingsPro IIoT Gateway and Device Management Software.

]]>
Thu, 18 Oct 2018 14:54:00 +0000
Moxa ThingsPro IIoT Gateway and Device Management Software Solutions: User Privilege Escalation https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-019-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-user-privilege-escalation/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-019-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-user-privilege-escalation/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main User Privilege Escalation in Moxa ThingsPro IIoT Gateway and Device Management Software.

]]>
Thu, 18 Oct 2018 14:52:00 +0000
Moxa ThingsPro IIoT Gateway and Device Management Software Solutions: User Enumeration https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-018-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-user-enumeration/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/10/18/klcert-18-018-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-user-enumeration/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main User Enumeration in Moxa ThingsPro IIoT Gateway and Device Management Software.

]]>
Thu, 18 Oct 2018 14:49:00 +0000
Opportunities and challenges in digital transformation: sixth industrial cybersecurity conference organized by Kaspersky Lab https://ics-cert.kaspersky.com/events/2018/10/15/sochi/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2018/10/15/sochi/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The sixth conference on industrial cybersecurity organized by Kaspersky Lab was held on September 19-21 in Sochi, Russia. This year’s theme was ‘Industrial cybersecurity: opportunities and challenges in digital transformation’.

]]>
Mon, 15 Oct 2018 14:55:59 +0000
Siemens fixes new vulnerabilities in its products https://ics-cert.kaspersky.com/publications/blog/2018/10/12/siemens-fixes/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/10/12/siemens-fixes/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerable products include ROX II operating system, SIMATIC S7-1200 CPU family, SCALANCE W1750D access point and some SIMATIC PLCs

]]>
Fri, 12 Oct 2018 08:12:56 +0000
Multiple vulnerabilities in Wecon PI Studio https://ics-cert.kaspersky.com/publications/blog/2018/10/10/wecon/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/10/10/wecon/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Wecon PI Studio HMI solutions are affected by multiple vulnerabilities that could allow remote code execution and disclosure of sensitive information, including in the context of an administrator

]]>
Wed, 10 Oct 2018 12:25:27 +0000
Bridging the ICS cybersecurity awareness gap: webinar by Kaspersky Lab Fraunhofer IOSB https://ics-cert.kaspersky.com/events/2018/10/10/webinar/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2018/10/10/webinar/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main On October 16, Kaspersky Lab and Fraunhofer IOSB are hosting a joint webinar to highlight the importance of ICS cybersecurity education and present a new ICS cybersecurity training course

]]>
Wed, 10 Oct 2018 10:01:41 +0000
First joint training by Kaspersky Lab and Fraunhofer IOSB https://ics-cert.kaspersky.com/events/2018/10/08/training-fraunhofer/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2018/10/08/training-fraunhofer/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main On September 26 – 27, 2018 Kaspersky Lab ICS CERT and Fraunhofer IOSB conducted their first “Advanced Industrial Cybersecurity in Practice” joint training course

]]>
Mon, 08 Oct 2018 14:50:01 +0000
Critical vulnerabilities in Entes EMG 12 converters https://ics-cert.kaspersky.com/publications/blog/2018/10/05/entes/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/10/05/entes/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerabilities in the web interface of EMG12 Ethernet Modbus Gateway devices could allow unauthorized access to the devices and the ability to change device configuration

]]>
Fri, 05 Oct 2018 15:32:38 +0000
Multiple vulnerabilities in Fuji Electric industrial products https://ics-cert.kaspersky.com/publications/blog/2018/10/02/fuji/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/10/02/fuji/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Multiple vulnerabilities affect the Alpha5 Smart Loader servo system, FRENIC Loader software, and FRENIC-Ace, FRENIC-Mini, FRENIC-Eco, FRENIC-Multi, and FRENIC-MEGA inverters

]]>
Tue, 02 Oct 2018 14:43:57 +0000
Critical vulnerabilities in Emerson AMS Device Manager https://ics-cert.kaspersky.com/publications/blog/2018/10/02/emerson-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/10/02/emerson-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Exploitation of vulnerabilities in Emerson AMS Device Manager, an industrial asset control system, could allow arbitrary code execution and malware injection

]]>
Tue, 02 Oct 2018 14:31:17 +0000
DeltaV Remote Code Execution https://ics-cert.kaspersky.com/advisories/2018/10/02/klcert-18-017-deltav-remote-code-execution/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/10/02/klcert-18-017-deltav-remote-code-execution/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Remote code execution in Emerson AMS Device Manager.

]]>
Tue, 02 Oct 2018 13:21:00 +0000
Dangerous vulnerabilities in Siemens industrial solutions https://ics-cert.kaspersky.com/publications/blog/2018/09/20/siemens/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/09/20/siemens/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Newly identified vulnerabilities affect SIMATIC WinCC OA HMI system, SCALANCE X switches and TD Keypad Designer tool

]]>
Thu, 20 Sep 2018 14:49:48 +0000
Threats posed by using RATs in ICS https://ics-cert.kaspersky.com/publications/reports/2018/09/20/threats-posed-by-using-rats-in-ics/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2018/09/20/threats-posed-by-using-rats-in-ics/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The paper provides an analysis of the prevalence of remote administration tools on OT networks and the threats associated with their use.

]]>
Thu, 20 Sep 2018 07:00:13 +0000
Schneider Electric products shipped with infected USB media https://ics-cert.kaspersky.com/publications/blog/2018/09/12/usb/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/09/12/usb/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main USB media infected with malware were shipped with Conext ComBox and Conext Battery Monitor products

]]>
Wed, 12 Sep 2018 10:36:55 +0000
Buffer overflow vulnerabilities in industrial automation products by Opto22 https://ics-cert.kaspersky.com/publications/blog/2018/09/11/opto22/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/09/11/opto22/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The vulnerability affects PAC Control Basic and PAC Control Professional version R10.0а and earlier and could allow arbitrary code execution

]]>
Tue, 11 Sep 2018 15:42:31 +0000
Threat landscape for industrial automation systems: H1 2018 https://ics-cert.kaspersky.com/publications/reports/2018/09/06/threat-landscape-for-industrial-automation-systems-h1-2018/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2018/09/06/threat-landscape-for-industrial-automation-systems-h1-2018/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In this report, Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) publishes the findings of its research on the threat landscape for industrial automation systems conducted during the first half of 2018.

]]>
Thu, 06 Sep 2018 10:00:18 +0000
Vulnerabilities in Schneider Electric industrial devices https://ics-cert.kaspersky.com/publications/blog/2018/08/31/schneider/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/08/31/schneider/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main New vulnerabilities have been identified in Schneider Electric PM5560 power meter and Modicon M221 logic controller

]]>
Fri, 31 Aug 2018 13:32:21 +0000
Princeton University researchers: causing power outages with IoT botnet https://ics-cert.kaspersky.com/publications/blog/2018/08/22/princeton/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/08/22/princeton/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A study has been published on the ways in which high-wattage smart devices could be used in attacks on the power grid

]]>
Wed, 22 Aug 2018 09:28:40 +0000
Multiple vulnerabilities in Emerson DeltaV DCS industrial workstations https://ics-cert.kaspersky.com/publications/blog/2018/08/22/deltav/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/08/22/deltav/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Critical vulnerabilities in industrial PCs used by Emerson’s DeltaV distributed control system could allow arbitrary code execution, malware injection or malware propagation to other workstations

]]>
Wed, 22 Aug 2018 09:11:51 +0000
Eltex ESR-200 Router Default Password Usage https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-016-eltex-esp-200-router-default-password-usage/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-016-eltex-esp-200-router-default-password-usage/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An attacker without authentication can login with default credentials for privileged users.

]]>
Fri, 17 Aug 2018 11:39:00 +0000
Eltex ESR-200 Router Unsecure sudo Configuration https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-015-eltex-esp-200-router-unsecure-sudo-configuration/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-015-eltex-esp-200-router-unsecure-sudo-configuration/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A authenticated attacker with low privileges can use unsecure sudo configuration to expand attack surface.

]]>
Fri, 17 Aug 2018 11:38:00 +0000
Eltex ESR-200 Router Build-in user with highest privileges https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-014-eltex-esp-200-router-build-in-user-with-highest-privileges/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-014-eltex-esp-200-router-build-in-user-with-highest-privileges/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A authenticated attacker with low privileges can activate high privileged user and use it to expand attack surface.

]]>
Fri, 17 Aug 2018 11:37:00 +0000
Eltex ESR-200 Router Information Disclosure https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-013-eltex-esp-200-router-information-disclosure/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-013-eltex-esp-200-router-information-disclosure/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A authenticated attacker with low privileges can extract password hash information for all users.

]]>
Fri, 17 Aug 2018 11:35:00 +0000
Eltex ESR-200 Router command injection https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-012-eltex-esp-200-router-command-injection/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-012-eltex-esp-200-router-command-injection/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A authenticated attacker can execute arbitrary code using command ejection.

]]>
Fri, 17 Aug 2018 11:33:00 +0000
Kraftway-24F2XG Router Outdated Certificate Usage https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-011-kraftway-24f2xg-router-outdated-certificate-usage/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-011-kraftway-24f2xg-router-outdated-certificate-usage/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Usage of SSLv2 and SSLv3 contain cryptographic weaknesses and cause data decryption.

]]>
Fri, 17 Aug 2018 11:31:00 +0000
Kraftway-24F2XG Router Denial of Service https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-010-kraftway-24f2xg-router-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-010-kraftway-24f2xg-router-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A Buffer Overflow exploited through web interface by remote attacker cause denial of service.

]]>
Fri, 17 Aug 2018 11:29:00 +0000
Kraftway-24F2XG Router Possible Remote Code Execution https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-009-kraftway-24f2xg-router-possible-remote-code-execution/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-009-kraftway-24f2xg-router-possible-remote-code-execution/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A Buffer Overflow exploited through web interface by remote attacker can cause remote code execution.

]]>
Fri, 17 Aug 2018 11:27:00 +0000
Kraftway-24F2XG Router Denial of Service https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-008-kraftway-24f2xg-router-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-008-kraftway-24f2xg-router-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A remote attacker with low privileges can cause denial of service.

]]>
Fri, 17 Aug 2018 11:24:00 +0000
Kraftway-24F2XG Router Denial of Service https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-007-kraftway-24f2xg-router-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-007-kraftway-24f2xg-router-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A remote attacker can craft a malicious link and send it to a privileged user. This can cause denial of service.

]]>
Fri, 17 Aug 2018 11:22:00 +0000
Kraftway-24F2XG Router Default Credentials https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-006-kraftway-24f2xg-router-default-credentials/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/17/klcert-18-006-kraftway-24f2xg-router-default-credentials/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A remote attacker can get administrative privileges using default credentials.

]]>
Fri, 17 Aug 2018 11:20:00 +0000
Zipato Zipabox Sensitive Information Disclosure https://ics-cert.kaspersky.com/advisories/2018/08/08/klcert-18-217-zipato-zipabox-sensitive-information-disclosure/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/08/klcert-18-217-zipato-zipabox-sensitive-information-disclosure/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A remote attacker can get sensitive information that expands attack surface.

]]>
Wed, 08 Aug 2018 11:38:00 +0000
Zipato Zipabox Weak Hash Algorithm https://ics-cert.kaspersky.com/advisories/2018/08/08/klcert-18-004-zipato-zipabox-weak-hash-algorithm/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/08/klcert-18-004-zipato-zipabox-weak-hash-algorithm/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Weak hashing algorithm allows attacker get passwords in clear text.

]]>
Wed, 08 Aug 2018 11:36:00 +0000
Zipato Zipabox Insecure configuration storage https://ics-cert.kaspersky.com/advisories/2018/08/08/klcert-18-003-zipato-zipabox-insecure-configuration-storage/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/08/08/klcert-18-003-zipato-zipabox-insecure-configuration-storage/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Insecure configuration storage allows attacker take under control device and smart home.

]]>
Wed, 08 Aug 2018 11:31:00 +0000
APT group called RASPITE attacks industrial enterprises https://ics-cert.kaspersky.com/publications/blog/2018/08/06/raspite/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/08/06/raspite/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Dragos has published information on a newly-identified APT group, which it calls RASPITE. According to Dragos, the group's activity overlaps significantly with that of Leafminer, a group identified earlier by Symantec

]]>
Mon, 06 Aug 2018 16:17:20 +0000
The Third Specialized Conference “IT Security for Industrial Systems” in Frankfurt https://ics-cert.kaspersky.com/publications/blog/2018/08/06/the-third-specialized-conference-it-security-for-industrial-systems-in-frankfurt/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/08/06/the-third-specialized-conference-it-security-for-industrial-systems-in-frankfurt/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main On November 12 – 13 the Third Specialized Conference “IT Security for Industrial Systems” will be held in Frankfurt.

]]>
Mon, 06 Aug 2018 10:57:24 +0000
Critical vulnerabilities in WECON LeviStudioU https://ics-cert.kaspersky.com/publications/blog/2018/08/03/levistudiou/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/08/03/levistudiou/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Buffer overflow vulnerabilities in WECON LeviStudioU could allow remote code execution.

]]>
Fri, 03 Aug 2018 13:59:26 +0000
Attacks on industrial enterprises using RMS and TeamViewer https://ics-cert.kaspersky.com/publications/reports/2018/08/01/attacks-on-industrial-enterprises-using-rms-and-teamviewer/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2018/08/01/attacks-on-industrial-enterprises-using-rms-and-teamviewer/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The malware used in these attacks installs legitimate remote administration software – TeamViewer or RMS – on the system. This enables the attackers to gain remote control of infected systems.

]]>
Wed, 01 Aug 2018 10:00:44 +0000
Buffer overflow vulnerabilities in AVEVA HMI solutions https://ics-cert.kaspersky.com/publications/blog/2018/07/24/aveva/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/07/24/aveva/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerabilities in HMI solutions InduSoft Web Studio, InTouch Machine Edition and InTouch could allow remote code execution and cause systems to be compromised

]]>
Tue, 24 Jul 2018 12:12:16 +0000
Dangerous vulnerability fixed in Moxa NPort serial network interface devices https://ics-cert.kaspersky.com/publications/blog/2018/07/23/nport/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/07/23/nport/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A vulnerability in Moxa NPort 5210, 5230 and 5232 devices could allow a remote attacker to cause a resource exhaustion condition

]]>
Mon, 23 Jul 2018 16:00:17 +0000
Dangerous vulnerability identified in ABB Panel Builder 800 engineering software https://ics-cert.kaspersky.com/publications/blog/2018/07/19/abb/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/07/19/abb/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A vulnerability in Panel Builder 800 engineering software installed on ABB Panel 800 HMI devices could enable attackers to plant and execute arbitrary code on affected devices

]]>
Thu, 19 Jul 2018 12:36:43 +0000
Multiple vulnerabilities fixed in WAGO operator panels https://ics-cert.kaspersky.com/publications/blog/2018/07/17/edisplay/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/07/17/edisplay/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main WAGO has fixed multiple vulnerabilities in e!DISPLAY 7300T series HMA devices. Exploitation of these vulnerabilities could enable attackers to execute arbitrary code or overwrite critical files

]]>
Tue, 17 Jul 2018 10:30:14 +0000
DoS vulnerabilities in SIPROTEC 5 relays and EN100 communication module https://ics-cert.kaspersky.com/publications/blog/2018/07/17/siprotec-5/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/07/17/siprotec-5/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main DoS vulnerabilities have been identified in Siemens SIPROTEC 5 relays and the EN100 communication module. These vulnerabilities can be exploited by a remote attacker without requiring any privileges or user interaction

]]>
Tue, 17 Jul 2018 09:58:40 +0000
Multiple vulnerabilities in Allen-Bradley Stratix 5950 appliances https://ics-cert.kaspersky.com/publications/blog/2018/07/09/stratix/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/07/09/stratix/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Allen-Bradley Stratix 5950 network security appliances are affected by multiple vulnerabilities. The flaws, which are due to security issues in the Cisco ASA operating system used in the devices, could cause the appliances to malfunction

]]>
Mon, 09 Jul 2018 10:19:28 +0000
The State of Industrial Cybersecurity 2018: findings of joint survey by Kaspersky Lab and PAC https://ics-cert.kaspersky.com/publications/reports/2018/06/28/the-state-of-industrial-cybersecurity-2018-findings-of-joint-survey-by-kaspersky-lab-and-pac/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2018/06/28/the-state-of-industrial-cybersecurity-2018-findings-of-joint-survey-by-kaspersky-lab-and-pac/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab has published the results of The State of Industrial Cybersecurity study carried out in collaboration with PAC, a CXP Group Company, and based on a survey of 320 professionals representing companies from such sectors as manufacturing and industrial production, energy, mining, transport, and logistics.

]]>
Thu, 28 Jun 2018 09:00:40 +0000
Vulnerability in Delta Industrial Automation COMMGR software https://ics-cert.kaspersky.com/publications/blog/2018/06/27/delta/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/06/27/delta/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A buffer overflow vulnerability in Delta Industrial Automation COMMGR software could lead to remote code execution, cause the application to crash, or cause a denial-of-service condition in the application server

]]>
Wed, 27 Jun 2018 17:27:49 +0000
DoS vulnerability in Allen-Bradley CompactLogix and Compact GuardLogix controllers https://ics-cert.kaspersky.com/publications/blog/2018/06/27/allen-bradley-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/06/27/allen-bradley-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Remote attackers could cause a denial-of-service condition in Allen-Bradley CompactLogix and Compact GuardLogix controllers by exploiting a vulnerability in these devices

]]>
Wed, 27 Jun 2018 16:41:45 +0000
Cyberattack on satellite communications companies https://ics-cert.kaspersky.com/publications/blog/2018/06/26/satcom/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/06/26/satcom/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In a cyberattack on organizations in the US and Southeast Asia, hackers have used legitimate tools to infect systems that monitor and control communications satellites

]]>
Tue, 26 Jun 2018 10:06:28 +0000
Dangerous vulnerabilities fixed in Siemens routers and switches https://ics-cert.kaspersky.com/publications/blog/2018/06/19/scalance/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/06/19/scalance/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Siemens has closed serious vulnerabilities in its solutions. Affected devices include SCALANCE M875 industrial routers and SCALANCE X switches

]]>
Tue, 19 Jun 2018 12:03:51 +0000
Multiple vulnerabilities in U.motion Builder https://ics-cert.kaspersky.com/publications/blog/2018/06/13/u-motion-builder/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/06/13/u-motion-builder/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Multiple remote code execution vulnerabilities have been corrected in Schneider Electric’s U.motion Builder. Fixes for the vulnerabilities have been included in version 1.3.4 of the solution

]]>
Wed, 13 Jun 2018 15:30:44 +0000
Serious vulnerability in RSLinx Classic and FactoryTalk Linx Gateway by Rockwell Automation https://ics-cert.kaspersky.com/publications/blog/2018/06/09/rockwell-automation/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/06/09/rockwell-automation/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A serious vulnerability has been identified in Rockwell Automation solutions for industrial networks RSLinx Classic and FactoryTalk Linx Gateway

]]>
Sat, 09 Jun 2018 15:34:20 +0000
Critical vulnerability in Yokogawa STARDOM controllers https://ics-cert.kaspersky.com/publications/blog/2018/06/05/yokogawa/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/06/05/yokogawa/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Hardcoded credentials have been identified in Yokogawa STARDOM controllers, potentially leading to remote execution of arbitrary code on affected devices

]]>
Tue, 05 Jun 2018 15:30:46 +0000
Multiple vulnerabilities in Schneider Electric Floating License Manager https://ics-cert.kaspersky.com/publications/blog/2018/05/29/flm/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/05/29/flm/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Dangerous vulnerabilities have been identified in the Schneider Electric Floating License Manager platform.

]]>
Tue, 29 May 2018 13:04:54 +0000
VPNFilter malware can be used to detect SCADA equipment https://ics-cert.kaspersky.com/publications/blog/2018/05/28/vpnfilter/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/05/28/vpnfilter/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Cisco Talos researchers have detected new malware, which has been dubbed VPNFilter. To date, the malware has infected at least 500,000 routers and network-attached storage (NAS) devices in 54 countries of the world.

]]>
Mon, 28 May 2018 14:16:02 +0000
Serious vulnerabilities in TELEM-GW6/GWM data concentrators https://ics-cert.kaspersky.com/publications/blog/2018/05/28/telem/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/05/28/telem/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerabilities in Martem TELEM-GW6/GWM data concentrators could enable remote attackers to gain control of the industrial process, cause denial of service and execute arbitrary code

]]>
Mon, 28 May 2018 13:11:50 +0000
Serious vulnerability fixed in PACSystems industrial controllers https://ics-cert.kaspersky.com/publications/blog/2018/05/23/pacsystems/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/05/23/pacsystems/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A serious improper data validation vulnerability has been closed in some models of PACSystems industrial controllers. Exploitation of the vulnerability could cause affected devices to malfunction

]]>
Wed, 23 May 2018 14:42:01 +0000
Dangerous vulnerabilities identified in FL SWITCH industrial Ethernet switches https://ics-cert.kaspersky.com/publications/blog/2018/05/23/fl-switch/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/05/23/fl-switch/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Critical vulnerabilities have been identified in FL SWITCH series 3xxx, 4xxx and 48xxx industrial Ethernet switches. Updating the firmware of the switches to version 1.34 or higher is recommended to eliminate these vulnerabilities

]]>
Wed, 23 May 2018 12:41:21 +0000
OPC Foundation Consortium comments on Kaspersky Lab’s OPC UA security analysis report https://ics-cert.kaspersky.com/publications/blog/2018/05/22/opc-foundation-comments/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/05/22/opc-foundation-comments/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The OPC Foundation has published an official response to Kaspersky Lab’s analysis

]]>
Tue, 22 May 2018 12:29:06 +0000
DoS vulnerability in SIMATIC S7-400 controllers https://ics-cert.kaspersky.com/publications/blog/2018/05/18/simatic-dos/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/05/18/simatic-dos/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A hardware vulnerability in SIMATIC S7-400 CPUs could cause denial-of-service conditions of affected PLCs. Exploitation of the vulnerability does not require user interaction or any privileges

]]>
Fri, 18 May 2018 10:19:59 +0000
Multiple vulnerabilities closed in Advantech WebAccess https://ics-cert.kaspersky.com/publications/blog/2018/05/17/advantech-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/05/17/advantech-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Multiple serious vulnerabilities have been closed in Advantech’s WebAccess SCADA/HMI solution. Their exploitation could lead to sensitive information disclosure, arbitrary code execution and file deletion.

]]>
Thu, 17 May 2018 16:43:44 +0000
OPC UA security analysis https://ics-cert.kaspersky.com/publications/reports/2018/05/10/opc-ua-security-analysis/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2018/05/10/opc-ua-security-analysis/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This paper discusses our project that involved searching for vulnerabilities in implementations of the OPC UA protocol. In publishing this material, we hope to draw the attention of vendors that develop software for industrial automation systems and the industrial internet of things to problems associated with using such widely available technologies, which turned out to be quite common.

]]>
Thu, 10 May 2018 10:00:07 +0000
Vulnerabilities in Advantech WebAccess HMI Designer https://ics-cert.kaspersky.com/publications/blog/2018/04/26/advantech/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/04/26/advantech/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Dangerous vulnerabilities have been identified in Advantech WebAccess HMI Designer. Their exploitation could lead to remote code execution

]]>
Thu, 26 Apr 2018 14:21:04 +0000
Energetic Bear / Crouching Yeti: attacks on servers https://ics-cert.kaspersky.com/publications/reports/2018/04/23/energetic-bear-crouching-yeti-attacks-on-servers/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2018/04/23/energetic-bear-crouching-yeti-attacks-on-servers/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This report by Kaspersky Lab ICS CERT presents information on identified servers that have been infected and used by the group. The report also includes the findings of an analysis of several webservers compromised by the Energetic Bear group during 2016 and in early 2017.

]]>
Mon, 23 Apr 2018 10:00:36 +0000
Education initiative by Kaspersky Lab ICS CERT and Fraunhofer IOSB https://ics-cert.kaspersky.com/events/2018/04/20/education-initiative-by-kaspersky-lab-ics-cert-and-fraunhofer-iosb/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2018/04/20/education-initiative-by-kaspersky-lab-ics-cert-and-fraunhofer-iosb/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab ICS CERT and Fraunhofer IOSB are working together to address industrial cybersecurity and awareness challenges.

]]>
Fri, 20 Apr 2018 13:35:34 +0000
Vulnerabilities in Rockwell Automation industrial networking solutions https://ics-cert.kaspersky.com/publications/blog/2018/04/19/rockwell-networking/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/04/19/rockwell-networking/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Critical vulnerabilities have been identified in several Rockwell Automation industrial networking devices. The issue is due to Cisco IOS or IOS XE versions with multiple vulnerabilities being used in these devices

]]>
Thu, 19 Apr 2018 15:58:58 +0000
Critical vulnerabilities in Schneider Electric industrial solutions https://ics-cert.kaspersky.com/publications/blog/2018/04/19/schneider-electric/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/04/19/schneider-electric/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Critical vulnerabilities have been identified in SCADA/HMI solutions InduSoft Web Studio and InTouch Machine Edition, and in the Triconex Tricon model 3008 Safety Instrumented System

]]>
Thu, 19 Apr 2018 10:50:41 +0000
Vulnerabilities in Moxa EDR-810 routers https://ics-cert.kaspersky.com/publications/blog/2018/04/18/moxa-edr-810/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/04/18/moxa-edr-810/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Multiple vulnerabilities have been identified in Moxa EDR-810 industrial routers. Their successful exploitation could lead to privilege escalation and denial-of-service conditions

]]>
Wed, 18 Apr 2018 09:02:35 +0000
Internet of Things Security Maturity Model description to be published https://ics-cert.kaspersky.com/publications/blog/2018/04/16/iot-smm/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/04/16/iot-smm/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The Industrial Internet Consortium has announced the publication of an official Internet of Things Security Maturity Model description.

]]>
Mon, 16 Apr 2018 17:57:09 +0000
Multiple vulnerabilities closed in U.motion Builder building automation solution https://ics-cert.kaspersky.com/publications/blog/2018/04/11/u-motion/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/04/11/u-motion/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Schneider Electric has closed multiple vulnerabilities in U.motion Builder – a total of 16 vulnerabilities with different severity levels (CVSS v.3 base score of 4.3 to 10)

]]>
Wed, 11 Apr 2018 17:49:28 +0000
Attack on Cisco switches https://ics-cert.kaspersky.com/publications/blog/2018/04/11/cisco-attack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/04/11/cisco-attack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A vulnerability in Cisco Smart Install Client was exploited in an attack on Cisco IOS switches to modify configuration files on the devices and cause a denial-of-service condition

]]>
Wed, 11 Apr 2018 10:29:38 +0000
Critical vulnerability closed in Moxa AWK-3131A industrial access point https://ics-cert.kaspersky.com/publications/blog/2018/04/06/moxa-awk-3131a/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/04/06/moxa-awk-3131a/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A critical vulnerability in Moxa AWK-3131A industrial access point could allow an unauthorized attacker to execute arbitrary code by injecting system commands

]]>
Fri, 06 Apr 2018 13:03:45 +0000
DoS vulnerability in Siemens SIMATIC products https://ics-cert.kaspersky.com/publications/blog/2018/04/03/simatic-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/04/03/simatic-2/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An Improper Input Validation vulnerability has been identified in Siemens SIMATIC industrial automation products.

]]>
Tue, 03 Apr 2018 15:32:05 +0000
Open for Insights: Kaspersky Lab Industrial Cybersecurity Conference 2018 Call for Papers https://ics-cert.kaspersky.com/events/2018/04/02/call-for-papers/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2018/04/02/call-for-papers/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main To drive the discussion around the future of OT cybersecurity and equip industry practitioners with the relevant knowledge and best practices, Kaspersky Lab invites industrial cybersecurity experts to submit their researches and reports to its 6th annual conference on industrial cybersecurity by June 1

]]>
Mon, 02 Apr 2018 14:27:30 +0000
Critical vulnerability closed in TIM 1531 IRC modules https://ics-cert.kaspersky.com/publications/blog/2018/03/30/tim-1531-irc/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/03/30/tim-1531-irc/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Siemens has released a new firmware version for TIM 1531 IRC communication modules to close a critical vulnerability in these modules. If exploited, this vulnerability could lead to unauthorized changes in the module’s configuration and a denial of service condition

]]>
Fri, 30 Mar 2018 15:53:44 +0000
New vulnerabilities in Allen Bradley MicroLogix 1400 PLCs https://ics-cert.kaspersky.com/publications/blog/2018/03/30/allen-bradley/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/03/30/allen-bradley/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Serious vulnerabilities have been closed in Allen Bradley MicroLogix 1400 PLC series. Exploitation of these vulnerabilities could lead to unauthorized modification of PLC configuration and cause the devices to enter a denial-of-service condition

]]>
Fri, 30 Mar 2018 15:45:35 +0000
Multiple vulnerabilities identified in the Modicon family of industrial controllers https://ics-cert.kaspersky.com/publications/blog/2018/03/29/modicon/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/03/29/modicon/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main US CERT has published an advisory on vulnerabilities in the Modicon family of industrial controllers by Schneider Electric.

]]>
Thu, 29 Mar 2018 13:55:42 +0000
Improper Input Validation vulnerability in Siemens industrial devices https://ics-cert.kaspersky.com/publications/blog/2018/03/26/simatic/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/03/26/simatic/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A vulnerability that could cause a denial-of-service condition has been identified in Siemens industrial solutions. The vulnerability can only be exploited if the attacker is located in the same Ethernet segment as the targeted device

]]>
Mon, 26 Mar 2018 12:00:40 +0000
Serious vulnerability identified in Beckhoff TwinCAT PLC software solution https://ics-cert.kaspersky.com/publications/blog/2018/03/26/beckhoff/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/03/26/beckhoff/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerability in kernel drivers of Beckhoff TwinCAT 2 and 3.1 PLC software solutions for PLCs could allow local attackers to escalate privileges on target systems

]]>
Mon, 26 Mar 2018 11:59:14 +0000
Threat Landscape for Industrial Automation Systems in H2 2017 https://ics-cert.kaspersky.com/publications/reports/2018/03/26/threat-landscape-for-industrial-automation-systems-in-h2-2017/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2018/03/26/threat-landscape-for-industrial-automation-systems-in-h2-2017/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In this report, Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) publishes the findings of its research on the threat landscape for industrial automation systems conducted during the second half of 2017.

]]>
Mon, 26 Mar 2018 10:00:11 +0000
Somebody’s watching! When cameras are more than just ‘smart’ https://ics-cert.kaspersky.com/publications/reports/2018/03/12/somebodys-watching-when-cameras-are-more-than-just-smart/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2018/03/12/somebodys-watching-when-cameras-are-more-than-just-smart/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The researchers at Kaspersky Lab ICS CERT decided to check the popular smart camera to see how well protected it is against cyber abuses.

]]>
Mon, 12 Mar 2018 10:00:01 +0000
Siemens industrial solutions are affected by vulnerabilities in Intel ME, SPS and TXE technologies https://ics-cert.kaspersky.com/publications/blog/2018/03/01/siemens-intel/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/03/01/siemens-intel/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main 28 industrial solutions by Siemens are affected by vulnerabilities in Intel ME, SPS and TXE technologies. The vendor has released patches for all of these products and made these patches available on its website

]]>
Thu, 01 Mar 2018 16:00:03 +0000
IoT hack: how to break a smart home... again https://ics-cert.kaspersky.com/publications/reports/2018/02/28/iot-hack-how-to-break-a-smart-home-again/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2018/02/28/iot-hack-how-to-break-a-smart-home-again/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main There can never be too many IoT gadgets – that’s what people usually think when buying yet another connected device with advanced functionality. From our perspective, we also think there can’t be too many IoT investigations.

]]>
Wed, 28 Feb 2018 18:09:53 +0000
OMG botnet turns infected devices into proxy servers https://ics-cert.kaspersky.com/publications/blog/2018/02/27/omg/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/02/27/omg/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A new variant of the Mirai botnet can set up proxy servers on infected IoT devices

]]>
Tue, 27 Feb 2018 15:04:54 +0000
3.3% of ICS computers attacked by miners during the past year https://ics-cert.kaspersky.com/publications/blog/2018/02/22/cryptominers/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/02/22/cryptominers/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab has recorded an increase in the number of attacks involving cryptocurrency miners on the infrastructure of industrial enterprises, which started in September 2017. Miners can interfere with industrial process control and threaten process stability.

]]>
Thu, 22 Feb 2018 19:01:19 +0000
Vulnerabilities in GE D60 Line Distance Relay devices https://ics-cert.kaspersky.com/publications/blog/2018/02/22/d60/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/02/22/d60/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Critical vulnerabilities have been identified in General Electric D60 Line Distance Relay devices. The vulnerabilities could allow attackers to execute code on vulnerable systems.

]]>
Thu, 22 Feb 2018 15:45:17 +0000
Critical vulnerability in WAGO PFC200 controllers closed https://ics-cert.kaspersky.com/publications/blog/2018/02/22/wago/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/02/22/wago/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main WAGO has closed a critical vulnerability (improper authentication) in its PFC200 Series PLCs.

]]>
Thu, 22 Feb 2018 12:57:22 +0000
Kaspersky Lab and MIT host a successful second annual ‘Think Security’ seminar https://ics-cert.kaspersky.com/events/2018/02/19/think-security/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2018/02/19/think-security/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The Massachusetts Institute of Technology (MIT), in collaboration with Kaspersky Lab, hosted its second annual “Think Security” seminar devoted to protecting industrial automation systems from cyberattacks. The seminar featured an industrial Capture the Flag (CTF) contest

]]>
Mon, 19 Feb 2018 16:53:46 +0000
Multiple Vulnerabilities Found in Popular Document Management System https://ics-cert.kaspersky.com/publications/alerts/2018/02/12/multiple-vulnerabilities-found-in-popular-document-management-system/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/alerts/2018/02/12/multiple-vulnerabilities-found-in-popular-document-management-system/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) has identified multiple vulnerabilities in the Saperion Web Client, a web application developed by Kofax.

]]>
Mon, 12 Feb 2018 07:00:17 +0000
Saperion webclient multiple vulnerabilities: Arbitrary File Read in Saperion web client https://ics-cert.kaspersky.com/advisories/2018/02/09/klcert-18-002-saperion-webclient-multiple-vulnerabilities-arbitrary-file-read-in-saperion-web-client/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/02/09/klcert-18-002-saperion-webclient-multiple-vulnerabilities-arbitrary-file-read-in-saperion-web-client/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Remote exploitation of discovered vulnerabilities lead to full compromise the system with Saperion webclient.

]]>
Fri, 09 Feb 2018 13:25:00 +0000
Saperion webclient multiple vulnerabilities: Remote Code Execution with system user privileges in Saperion web client https://ics-cert.kaspersky.com/advisories/2018/02/09/klcert-18-001-saperion-webclient-multiple-vulnerabilities-remote-code-execution-with-system-user-privileges-in-saperion-web-client/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2018/02/09/klcert-18-001-saperion-webclient-multiple-vulnerabilities-remote-code-execution-with-system-user-privileges-in-saperion-web-client/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Remote exploitation of discovered vulnerabilities lead to full compromise the system with Saperion webclient.

]]>
Fri, 09 Feb 2018 13:22:00 +0000
Gas is too expensive? Let’s make it cheap! https://ics-cert.kaspersky.com/publications/reports/2018/02/07/gas-is-too-expensive-lets-make-it-cheap/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2018/02/07/gas-is-too-expensive-lets-make-it-cheap/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A few months ago, while undertaking unrelated research into online connected devices, we uncovered something surprising and realized almost immediately that we could be looking at a critical security threat.

]]>
Wed, 07 Feb 2018 09:21:27 +0000
Vulnerability in Nari PCS-9611 relays https://ics-cert.kaspersky.com/publications/blog/2018/01/29/nari/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/01/29/nari/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main An improper input validation vulnerability has been identified in the Nari PCS-9611 protection relay. Although an exploit for the vulnerability exists, the vendor has so far not commented on the problem.

]]>
Mon, 29 Jan 2018 06:27:36 +0000
A silver bullet for the attacker. A study into the security of hardware license tokens https://ics-cert.kaspersky.com/publications/reports/2018/01/22/a-silver-bullet-for-the-attacker-a-study-into-the-security-of-hardware-license-tokens/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2018/01/22/a-silver-bullet-for-the-attacker-a-study-into-the-security-of-hardware-license-tokens/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In the past years, the problem of vulnerabilities in industrial automation systems has been becoming increasingly important. The fact that industrial control systems have been developing in parallel with IT systems, relatively independently and often without regard for modern secure coding practices is probably the main source of ICS security problems.

]]>
Mon, 22 Jan 2018 10:00:27 +0000
MLAD: Machine Learning for Anomaly Detection https://ics-cert.kaspersky.com/publications/reports/2018/01/16/mlad-machine-learning-for-anomaly-detection/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2018/01/16/mlad-machine-learning-for-anomaly-detection/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Modern industrial control systems (ICS) are cyber-physical systems that include IT infrastructure and operational technologies or OT infrastructure. Attacks on OT pose the greatest danger and are very difficult to detect. The MLAD (Machine Learning for Anomaly Detection) technology is designed to protect OT.

]]>
Tue, 16 Jan 2018 18:00:27 +0000
Industrial solutions may be affected by Spectre and Meltdown vulnerabilities https://ics-cert.kaspersky.com/publications/blog/2018/01/12/spectre-meltdown/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2018/01/12/spectre-meltdown/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerabilities in Intel, ARM64 and AMD processors allow unauthorized access to virtual memory contents. Vulnerable devices include industrial equipment.

]]>
Fri, 12 Jan 2018 15:31:58 +0000
Serious vulnerabilities identified in Palo Alto firewalls https://ics-cert.kaspersky.com/publications/blog/2017/12/19/palo-alto/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/12/19/palo-alto/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Attackers can take advantage of vulnerabilities in the PAN-OS management interface to execute arbitrary code with superuser privileges.

]]>
Tue, 19 Dec 2017 11:36:39 +0000
TRITON attack. Comment by Kaspersky Lab ICS CERT expert https://ics-cert.kaspersky.com/publications/blog/2017/12/18/triton/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/12/18/triton/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The TRITON attack demonstrates an important property of attacks on industrial enterprises: they may show no signs of malicious computer activity.

]]>
Mon, 18 Dec 2017 14:38:07 +0000
The brief awakening of the Satori botnet https://ics-cert.kaspersky.com/publications/blog/2017/12/14/satori/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/12/14/satori/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The Satori botnet has used embedded exploits to attack ports 37215 and 52869. After reaching the size of 280,000 active bots, the botnet has suddenly folded its operations.

]]>
Thu, 14 Dec 2017 11:50:11 +0000
Cyber Security Tech Talk at the University of California, Berkeley https://ics-cert.kaspersky.com/events/2017/12/06/berkeley/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2017/12/06/berkeley/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab ICS CERT experts have held the first tech talk on industrial cyber security at UC Berkeley.

]]>
Wed, 06 Dec 2017 17:22:01 +0000
Dnsmasq Vulnerabilities Affect Siemens SCALANCE Solutions https://ics-cert.kaspersky.com/publications/blog/2017/12/05/dnsmasq/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/12/05/dnsmasq/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Siemens SCALANCE industrial solutions are affected by Dnsmasq vulnerabilities. An attacker could be able to execute arbitrary code or conduct a DoS attack.

]]>
Tue, 05 Dec 2017 13:59:39 +0000
New Mirai Variant https://ics-cert.kaspersky.com/publications/blog/2017/12/04/new-mirai/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/12/04/new-mirai/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main A new variant of the Mirai malware infects vulnerable ZyXEL devices, making them part of a botnet.

]]>
Mon, 04 Dec 2017 14:19:20 +0000
Vulnerabilities in Siemens SWT 3000 Devices https://ics-cert.kaspersky.com/publications/blog/2017/12/04/swt-3000/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/12/04/swt-3000/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Vulnerabilities in Siemens SWT 3000, a system used in the energy sector, allow attackers to gain access to sensitive information, circumvent authentication and conduct a DoS attack.

]]>
Mon, 04 Dec 2017 10:07:08 +0000
Industrial Enterprise and IoT Security Threats: Forecast for 2018 https://ics-cert.kaspersky.com/publications/reports/2017/11/30/industrial-enterprise-and-iot-security-threats-forecast-for-2018/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2017/11/30/industrial-enterprise-and-iot-security-threats-forecast-for-2018/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main 2017 was one of the most eventful years in terms of information security incidents affecting industrial systems, and it changed the way industrial companies think about protecting key operational technology systems.

]]>
Thu, 30 Nov 2017 12:08:48 +0000
Intel Releases Updates to Close ME, SPS and TXE Vulnerabilities https://ics-cert.kaspersky.com/publications/blog/2017/11/24/intel-updates/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/11/24/intel-updates/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Serious vulnerabilities have been found in Intel processors. These flaws also affect industrial equipment. Intel has released the relevant updates and equipment vendors now need to integrate them into their products.

]]>
Fri, 24 Nov 2017 16:36:13 +0000
Siemens Industrial Solutions Are Vulnerable to Denial-of-Service Attacks https://ics-cert.kaspersky.com/publications/blog/2017/11/24/siemens-dos-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/11/24/siemens-dos-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Siemens has announced that some of its industrial solutions are vulnerable to DoS attacks. Vulnerable devices include industrial controllers, field devices and shop floor automation systems.

]]>
Fri, 24 Nov 2017 13:36:54 +0000
Moxa Fixes Serious Vulnerabilities in NPort Serial Network Interface Devices https://ics-cert.kaspersky.com/publications/blog/2017/11/21/moxa-patch/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/11/21/moxa-patch/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Moxa has released updates that close serious flaws in NPort device firmware. Devices of this type were targeted in December 2015 attacks on Ukrainian power companies.

]]>
Tue, 21 Nov 2017 13:50:10 +0000
Serious Vulnerabilities Found in Siemens SICAM RTU Modules https://ics-cert.kaspersky.com/publications/blog/2017/11/17/siemens-sicam-rtu-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/11/17/siemens-sicam-rtu-vulnerabilities/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Serious vulnerabilities allowing attackers to execute code remotely and bypass authentication have been identified in Siemens SICAM RTU modules. Disabling the integrated web server is recommended to reduce risk.

]]>
Fri, 17 Nov 2017 15:34:37 +0000
Schneider Electric Closes Critical Vulnerability in HMI Products https://ics-cert.kaspersky.com/publications/blog/2017/11/16/schneider-hmi/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/11/16/schneider-hmi/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Schneider Electric has released patches for a vulnerability which affects InduSoft Web Studio and HMI InTouch Machine Edition products

]]>
Thu, 16 Nov 2017 12:06:27 +0000
Vendors Confirm That Industrial Solutions Are Vulnerable to KRACK Attacks https://ics-cert.kaspersky.com/publications/blog/2017/11/15/ics-krack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/11/15/ics-krack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Several companies, including Cisco, Rockwell Automation, Sierra Wireless, ABB and Siemens, have reported vulnerabilities in their industrial devices. The vendors are preparing updates to close these vulnerabilities and will release the patches as they are ready.

]]>
Wed, 15 Nov 2017 14:58:58 +0000
The Relevance of WPA2 Vulnerabilities and KRACK Attacks to Industrial Systems https://ics-cert.kaspersky.com/publications/reports/2017/11/15/the-relevance-of-wpa2-vulnerabilities-and-krack-attacks-to-industrial-systems/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2017/11/15/the-relevance-of-wpa2-vulnerabilities-and-krack-attacks-to-industrial-systems/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Critical vulnerabilities that have recently been identified in the WPA2 protocol enable threat actors to carry out Man-in-the-Middle (MitM) attacks and force devices connected to the network to reinstall encryption keys that protect traffic. These vulnerabilities can be used, among other things, to implement attacks on industrial automation systems.

]]>
Wed, 15 Nov 2017 14:30:47 +0000
New Botnet Recruits IoT Devices Across the Globe https://ics-cert.kaspersky.com/publications/blog/2017/11/09/reaper/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/11/09/reaper/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The Reaper IoT botnet includes about 10-20 thousand infected devices, with some of these devices possibly being used by industrial enterprises, hospitals, railway terminals and airports

]]>
Thu, 09 Nov 2017 16:19:43 +0000
To Hack an Oil Refinery in 7 Hours https://ics-cert.kaspersky.com/events/2017/10/27/ctf_finals/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2017/10/27/ctf_finals/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The finals of Kaspersky Industrial CTF 2017, an industrial cybersecurity contest, were held in Shanghai. This was the third CTF (Capture the Flag) tournament organized by Kaspersky Lab and the first to have the international status

]]>
Fri, 27 Oct 2017 19:18:57 +0000
Bad Rabbit, Brother of [Ex]Petr https://ics-cert.kaspersky.com/publications/blog/2017/10/26/bad-rabbit/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/10/26/bad-rabbit/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab experts believe that the same threat actor is behind ExPetr and Bad Rabbit

]]>
Thu, 26 Oct 2017 10:41:04 +0000
US-CERT Reports APT Attack on Critical Infrastructure https://ics-cert.kaspersky.com/publications/blog/2017/10/25/us-cert_apt/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/10/25/us-cert_apt/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main US-CERT has published a report on a targeted (APT) attack on government entities and organizations in energy, nuclear, aviation and other sectors. The attackers were interested in documents on industrial processes in targeted organizations.

]]>
Wed, 25 Oct 2017 09:39:01 +0000
WPA2 Vulnerabilities Can Be Used to Attack Industrial Systems https://ics-cert.kaspersky.com/publications/blog/2017/10/18/krack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/10/18/krack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main On October 16, information on critical vulnerabilities in the WPA2 protocol, which enable attackers to bypass protection and listen to Wi-Fi traffic, was disclosed. Comments from Kaspersky Lab ICS CERT experts

]]>
Wed, 18 Oct 2017 17:58:43 +0000
The Results of Kaspersky Industrial CTF 2017 Qualifications Are In https://ics-cert.kaspersky.com/events/2017/10/10/tctf-2017-qual/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2017/10/10/tctf-2017-qual/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab has released the results of Kaspersky Industrial CTF 2017 qualifications, which were held online on October 6-8, 2017. This year’s tournament is truly international, with 696 teams from different countries participating in qualifications. The top three teams were, respectively, CyKor (Korea), Eat, Sleep, Pwn, Repeat (Germany) and Tokyo Westerns (Japan).

]]>
Tue, 10 Oct 2017 11:53:50 +0000
Safeguarding Technological Progress: Kaspersky Lab Holds Its Fifth Industrial Cyber Security Conference https://ics-cert.kaspersky.com/events/2017/10/06/conference-5/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/events/2017/10/06/conference-5/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab has held the Industrial Cybersecurity: Safeguarding Technological Progress conference in Saint Petersburg. The conference was devoted to the most pressing issues associated with protecting modern industrial systems from cyberthreats. Its 300 guests and speakers represented more than 170 organizations from over 15 countries across the globe.

]]>
Fri, 06 Oct 2017 15:47:35 +0000
Several more vulnerabilities found and closed in popular license manager https://ics-cert.kaspersky.com/publications/alerts/2017/10/03/several-more-vulnerabilities-found-and-closed-in-popular-license-manager/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/alerts/2017/10/03/several-more-vulnerabilities-found-and-closed-in-popular-license-manager/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab ICS CERT has identified multiple vulnerabilities: denial of service (DOS), NTLM-relay attack, Stack buffer overflow, Remotely enabling web admin interface, Arbitrary memory read and possible remote code execution (RCE) in hasplms service that is a part of Gemalto’s HASP SRM, Sentinel HASP and Sentinel LDK products.

]]>
Tue, 03 Oct 2017 11:39:01 +0000
Sentinel LDK RTE: Remote enabling and disabling admin interface https://ics-cert.kaspersky.com/advisories/2017/10/02/klcert-17-008-sentinel-ldk-rte-remote-enabling-and-disabling-admin-interface/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2017/10/02/klcert-17-008-sentinel-ldk-rte-remote-enabling-and-disabling-admin-interface/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Remote enabling and disabling administrative interface opens new attack vectors on the remote system with Gemalto’s HASP SRM, Sentinel HASP and Sentinel LDK products prior to Sentinel LDK RTE version 7.55.

]]>
Mon, 02 Oct 2017 16:49:00 +0000
Sentinel LDK RTE: Memory corruption might cause remote code execution https://ics-cert.kaspersky.com/advisories/2017/10/02/klcert-17-007-sentinel-ldk-rte-memory-corruption-might-cause-remote-code-execution/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2017/10/02/klcert-17-007-sentinel-ldk-rte-memory-corruption-might-cause-remote-code-execution/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Memory corruption in Gemalto’s HASP SRM, Sentinel HASP and Sentinel LDK products prior to Sentinel LDK RTE version 7.55 might cause remote code execution.

]]>
Mon, 02 Oct 2017 16:47:00 +0000
Sentinel LDK RTE: Arbitrary memory read from controlled memory pointer leads to remote denial of service https://ics-cert.kaspersky.com/advisories/2017/10/02/klcert-17-006-sentinel-ldk-rte-arbitrary-memory-read-from-controlled-memory-pointer-leads-to-remote-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2017/10/02/klcert-17-006-sentinel-ldk-rte-arbitrary-memory-read-from-controlled-memory-pointer-leads-to-remote-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Arbitrary memory read from controlled memory pointer in Gemalto’s HASP SRM, Sentinel HASP and Sentinel LDK products prior to Sentinel LDK RTE version 7.55 leads to remote denial of service.

]]>
Mon, 02 Oct 2017 16:44:00 +0000
Sentinel LDK RTE: Remote manipulations with language pack updater lead to NTLM-relay attack for system user https://ics-cert.kaspersky.com/advisories/2017/10/02/klcert-17-005-sentinel-ldk-rte-remote-manipulations-with-language-pack-updater-lead-to-ntlm-relay-attack-for-system-user/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2017/10/02/klcert-17-005-sentinel-ldk-rte-remote-manipulations-with-language-pack-updater-lead-to-ntlm-relay-attack-for-system-user/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Remote manipulations with language pack updater lead to NTLM-relay attack for system user in Gemalto’s HASP SRM, Sentinel HASP and Sentinel LDK products prior to Sentinel LDK RTE version 7.55.

]]>
Mon, 02 Oct 2017 16:41:00 +0000
Sentinel LDK RTE: Stack overflow in custom XML-parser leads to remote denial of service https://ics-cert.kaspersky.com/advisories/2017/10/02/klcert-17-004-sentinel-ldk-rte-stack-overflow-in-custom-xml-parser-leads-to-remote-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2017/10/02/klcert-17-004-sentinel-ldk-rte-stack-overflow-in-custom-xml-parser-leads-to-remote-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Stack overflow in custom XML-parser in Gemalto’s HASP SRM, Sentinel HASP and Sentinel LDK products prior to Sentinel LDK RTE version 7.55 leads to remote denial of service

]]>
Mon, 02 Oct 2017 16:37:00 +0000
Threat Landscape for Industrial Automation Systems in H1 2017 https://ics-cert.kaspersky.com/publications/reports/2017/09/28/threat-landscape-for-industrial-automation-systems-in-h1-2017/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2017/09/28/threat-landscape-for-industrial-automation-systems-in-h1-2017/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) publishes the results of its research on the threat landscape for industrial automation systems for the first six months of 2017.

]]>
Thu, 28 Sep 2017 12:00:52 +0000
Infected CCleaner in ICS around the world https://ics-cert.kaspersky.com/publications/alerts/2017/09/25/infected-ccleaner-in-ics-around-the-world/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/alerts/2017/09/25/infected-ccleaner-in-ics-around-the-world/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main On 18 September 2017, Piriform, a software company, announced that its CCleaner utility, which is designed to optimize the operation of Windows, had been hacked.

]]>
Mon, 25 Sep 2017 14:00:26 +0000
MITRE Grants Kaspersky Lab CVE Numbering Authority (CNA) Status https://ics-cert.kaspersky.com/publications/blog/2017/09/15/cna/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/09/15/cna/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The MITRE Corporation has recognized Kaspersky Lab as an authority in the area of vulnerabilities, granting the company the CVE Numbering Authority (CNA) status.

]]>
Fri, 15 Sep 2017 09:00:55 +0000
New Attack Vector Affecting Bluetooth Devices https://ics-cert.kaspersky.com/publications/blog/2017/09/15/blueborne/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/09/15/blueborne/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Researches from Armis Labs have identified a new attack vector, dubbed BlueBorne, that endangers mobile, desktop and IoT operating systems, including Android, iOS, Windows, and Linux.

]]>
Fri, 15 Sep 2017 08:22:27 +0000
IBM Security Report on Cyber Security Risks in the Energy and Utilities Sector https://ics-cert.kaspersky.com/publications/blog/2017/09/13/ibm-on-cyber-security/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/09/13/ibm-on-cyber-security/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main IBM X-Force has published a report on cyber security risks in the energy and utilities sector.

]]>
Wed, 13 Sep 2017 13:40:16 +0000
New Wave of Cyberattacks in the Energy Sector of Europe and North America https://ics-cert.kaspersky.com/publications/blog/2017/09/07/attacks_energy_sector/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/09/07/attacks_energy_sector/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Symantec has published a report on new cyberattacks targeting the energy sector in Europe and North America.

]]>
Thu, 07 Sep 2017 14:59:14 +0000
Closing an XXE Vulnerability in Siemens Industrial Solutions https://ics-cert.kaspersky.com/publications/blog/2017/09/07/closing-an-xxe-vulnerability-in-siemens-industrial-solutions/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/09/07/closing-an-xxe-vulnerability-in-siemens-industrial-solutions/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main US ICS-СERT has published an advisory on fixes for a vulnerability in Siemens industrial products using the Discovery Service of the OPC UA protocol stack.

]]>
Thu, 07 Sep 2017 11:57:37 +0000
Abbott Recalls Pacemakers Due to Cyberattack Risk https://ics-cert.kaspersky.com/publications/blog/2017/09/04/abbott-recalls-pacemakers-due-to-cyberattack-risk/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/blog/2017/09/04/abbott-recalls-pacemakers-due-to-cyberattack-risk/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main U.S. Food and Drug Administration (FDA) has announced the recall of 465,000 cardiac pacemakers produced by Abbott for security update installation. The update patches cybersecurity vulnerabilities in the devices’ firmware.

]]>
Mon, 04 Sep 2017 13:21:26 +0000
Multiple vulnerabilities found in popular license manager https://ics-cert.kaspersky.com/publications/alerts/2017/07/28/multiple-vulnerabilities-found-in-popular-license-manager/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/alerts/2017/07/28/multiple-vulnerabilities-found-in-popular-license-manager/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab ICS CERT has identified multiple remote code execution (RCE) and denial of service (DOS) vulnerabilities in hasplms service that is a part of Gemalto’s HASP SRM, Sentinel HASP and Sentinel LDK products.

]]>
Fri, 28 Jul 2017 11:59:24 +0000
Sentinel LDK RTE: malformed ASN1 streams in V2C files lead to Remote Code Execution https://ics-cert.kaspersky.com/advisories/2017/07/28/klcert-17-003-sentinel-ldk-rte-malformed-asn1-streams-in-v2c-files-lead-to-remote-code-execution/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2017/07/28/klcert-17-003-sentinel-ldk-rte-malformed-asn1-streams-in-v2c-files-lead-to-remote-code-execution/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Malformed ASN1 streams in V2C and similar input files can be used to generate stack buffer overflows. The vulnerability causes an arbitrary code execution. OVAL definition* KLCERT-17-003_OVAL

]]>
Fri, 28 Jul 2017 11:58:00 +0000
Sentinel LDK RTE: language packs containing malformed filenames lead to Remote Code Execution https://ics-cert.kaspersky.com/advisories/2017/07/28/klcert-17-002-sentinel-ldk-rte-language-packs-containing-malformed-filenames-lead-to-remote-code-execution/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2017/07/28/klcert-17-002-sentinel-ldk-rte-language-packs-containing-malformed-filenames-lead-to-remote-code-execution/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Language packs containing malformed filenames lead to a stack buffer overflow. The vulnerability causes an arbitrary code execution. OVAL definition* KLCERT-17-002_OVAL

]]>
Fri, 28 Jul 2017 11:57:01 +0000
Sentinel LDK RTE: language pack with invalid HTML files leads to Denial of Service https://ics-cert.kaspersky.com/advisories/2017/07/28/klcert-17-001-sentinel-ldk-rte-language-pack-with-invalid-html-files-leads-to-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/advisories/2017/07/28/klcert-17-001-sentinel-ldk-rte-language-pack-with-invalid-html-files-leads-to-denial-of-service/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Language pack (ZIP file) with invalid HTML files lead to NULL pointer access. Remote attacker can create language pack file on their own with invalid HTML file. The vulnerability cause denial of service of remote process. OVAL definition* KLCERT-17-001_OVAL

]]>
Fri, 28 Jul 2017 11:57:00 +0000
More than 50% of organizations attacked by ExPetr (Petya) cryptolocker are industrial companies https://ics-cert.kaspersky.com/publications/alerts/2017/06/29/more-than-50-percent-of-organizations-attacked-by-expetr-petya-cryptolocker-are-industrial-companies/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/alerts/2017/06/29/more-than-50-percent-of-organizations-attacked-by-expetr-petya-cryptolocker-are-industrial-companies/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main According to our telemetry, we see evidence that many industrial companies are being attacked by ExPetr (Petya) malware. While there were examples of actual industrial control systems being affected, in most cases it was only the business networks were affected. According to our data, at least 50% of the companies being attacked are manufacturing and oil & gas enterprises.

]]>
Thu, 29 Jun 2017 12:27:08 +0000
WannaCry on industrial networks: error correction https://ics-cert.kaspersky.com/publications/reports/2017/06/22/wannacry-on-industrial-networks/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2017/06/22/wannacry-on-industrial-networks/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main During the period from 12 to 15 May 2017, numerous companies across the globe were attacked by a network cryptoworm called WannaCry. The worm’s victims include various manufacturing companies, oil refineries, city infrastructure objects and electrical distribution network facilities.

]]>
Thu, 22 Jun 2017 11:00:06 +0000
Vulnerable System Update Statistics. General Electric https://ics-cert.kaspersky.com/publications/reports/2017/06/19/industrial-system-component-updates-general-electric/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2017/06/19/industrial-system-component-updates-general-electric/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This article is devoted to vulnerabilities in General Electric products. The article looks only at known vulnerabilities, a list of which was prepared based using the MITRE CVE database. All the vulnerabilities in question were uncovered in 2012 – 2016.

]]>
Mon, 19 Jun 2017 11:00:51 +0000
Nigerian phishing: industrial companies under attack https://ics-cert.kaspersky.com/publications/reports/2017/06/15/nigerian-phishing-industrial-companies-under-attack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2017/06/15/nigerian-phishing-industrial-companies-under-attack/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In late 2016, the Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) reported on phishing attacks that were primarily targeting industrial companies from the metallurgy, electric power, construction, engineering and other sectors.

]]>
Thu, 15 Jun 2017 09:00:12 +0000
WannaCry ransomware widespread attack may indirectly hit Industrial organizations https://ics-cert.kaspersky.com/publications/alerts/2017/05/14/wannacry-ransomware-widespread-attack-may-indirectly-hit-industrial-organizations/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/alerts/2017/05/14/wannacry-ransomware-widespread-attack-may-indirectly-hit-industrial-organizations/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The “WannaCry” outbreak has being reported on May 12 2017 by many independent sources all over the World. Based on KL ICS CERT live reports we decided to warn industrial organizations that they might indirectly become a victims of this widespread attack.

]]>
Sun, 14 May 2017 14:21:12 +0000
Threat Landscape for Industrial Automation Systems in the second half of 2016 https://ics-cert.kaspersky.com/publications/reports/2017/03/28/threat-landscape-for-industrial-automation-systems-in-the-second-half-of-2016/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2017/03/28/threat-landscape-for-industrial-automation-systems-in-the-second-half-of-2016/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main The Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) is starting a series of regular publications about our research devoted to the threat landscape for industrial organizations.

]]>
Tue, 28 Mar 2017 09:00:49 +0000
Spear phishing attack hits industrial companies https://ics-cert.kaspersky.com/publications/alerts/2016/12/16/spear-phishing-attack-hits-industrial-companies/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/alerts/2016/12/16/spear-phishing-attack-hits-industrial-companies/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main In October 2016, Kaspersky Lab ICS CERT detected a targeted attack aimed at industrial organizations. The worst affected were companies in the smelting, electric power generation and transmission, construction, and engineering industries.

]]>
Fri, 16 Dec 2016 12:00:51 +0000
Vulnerability in Industrial Control software and quality of the patch management https://ics-cert.kaspersky.com/publications/reports/2016/12/09/vulnerability-in-industrial-control-software-and-quality-of-the-patch-management/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2016/12/09/vulnerability-in-industrial-control-software-and-quality-of-the-patch-management/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main Kaspersky Lab ICS-CERT is launching a series of articles devoted to vulnerability analysis across the world. The articles aim to highlight patch management problems in the ICS world. Each article will focus on one popular ICS vendor and known vulnerabilities according to the MITRE Common Vulnerabilities and Exposures (CVE) database.

]]>
Fri, 09 Dec 2016 13:55:48 +0000
Critical infrastructure protection – governance around the world https://ics-cert.kaspersky.com/publications/reports/2016/12/02/critical-infrastructure-protection-governance-around-the-world/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main https://ics-cert.kaspersky.com/publications/reports/2016/12/02/critical-infrastructure-protection-governance-around-the-world/?utm_source=ics-cert.kaspersky.com&utm_medium=rss&utm_campaign=main This research is intended to find out which approaches to cybersecurity governance on the national level are currently in place around the world (especially in the sphere of protecting critical infrastructure against cyberattacks), and estimate the current maturity of cybersecurity governance in different countries.

]]>
Fri, 02 Dec 2016 14:44:37 +0000