24 April 2020
Threat landscape for industrial automation systems. APT attacks on industrial companies in 2019Overview of APT attacks on industrial enterprises information on which was published in 2019.
Filter
24 April 2020
Threat landscape for industrial automation systems. APT attacks on industrial companies in 2019Overview of APT attacks on industrial enterprises information on which was published in 2019.
24 April 2020
Threat landscape for industrial automation systems. Vulnerabilities identified in 2019The analysis of vulnerabilities was performed based on vendor advisories, publicly available information from open vulnerability databases (US ICS-CERT, CVE, Siemens Product CERT), as well as the results of Kaspersky ICS CERT’s own research.
24 April 2020
Threat landscape for industrial automation systems. 2019 Report at a glanceMalicious objects were blocked on 46.6% and ransomware on 1.0% of ICS computers. Kaspersky ICS CERT identified 103 vulnerabilities in industrial systems, IIoT/IoT systems, and other types of solutions.
26 March 2020
WildPressure targets industrial-related entities in the Middle EastWe found just three almost unique samples, all in one country. So we consider the attacks to be targeted and have currently named this operation WildPressure.
02 December 2019
Biometric data processing and storage system threatsThe findings of our research can be used to make a more objective assessment of risks associated with using modern biometric authentication systems.
22 November 2019
VNC vulnerability researchFindings of research on different implementations of the VNC remote access system. Memory corruption vulnerabilities were found, some of which, if exploited, could lead to remote code execution.
30 September 2019
Threat landscape for industrial automation systems, H1 2019Descriptions of dangerous threats, our findings from analyzing statistics on blocked threats, and possible vectors of malware penetration of ICS computers.
19 September 2019
Threat landscape for smart buildings. H1 2019 in briefWhat threats are relevant to building automation systems and what malware their owners have encountered in the first six months of 2019.
18 September 2019
Security research: CODESYS Runtime, a PLC control framework. Part 3This article continues the discussion of research on popular OEM technologies that are implemented in the products of a large number of vendors. Vulnerabilities in such technologies are highly likely to affect the security of many, if not all, products that use them. In some cases, this means hundreds of products that are used in industrial environments and in critical infrastructure facilities. This is the case with CODESYS Runtime, a framework by CODESYS designed for developing and executing industrial control system software.
18 September 2019
Security research: CODESYS Runtime, a PLC control framework. Part 2This article continues the discussion of research on popular OEM technologies that are implemented in the products of a large number of vendors. Vulnerabilities in such technologies are highly likely to affect the security of many, if not all, products that use them. In some cases, this means hundreds of products that are used in industrial environments and in critical infrastructure facilities. This is the case with CODESYS Runtime, a framework by CODESYS designed for developing and executing industrial control system software.
Filter
Filter
22 October 2018
Phishing attack targeting Italian naval and defense industryThe attackers attempted to infect computers with MartyMcFly remote access Trojan using phishing emails with malicious attachments
19 October 2018
New GreyEnergy malware attacks industrial networksExperts point to the similarities between the new malware and BlackEnergy, and a possible connection of the attacks with the TeleBots criminal group
12 October 2018
Siemens fixes new vulnerabilities in its productsVulnerable products include ROX II operating system, SIMATIC S7-1200 CPU family, SCALANCE W1750D access point and some SIMATIC PLCs
10 October 2018
Multiple vulnerabilities in Wecon PI StudioWecon PI Studio HMI solutions are affected by multiple vulnerabilities that could allow remote code execution and disclosure of sensitive information, including in the context of an administrator
05 October 2018
Critical vulnerabilities in Entes EMG 12 convertersVulnerabilities in the web interface of EMG12 Ethernet Modbus Gateway devices could allow unauthorized access to the devices and the ability to change device configuration
02 October 2018
Multiple vulnerabilities in Fuji Electric industrial productsMultiple vulnerabilities affect the Alpha5 Smart Loader servo system, FRENIC Loader software, and FRENIC-Ace, FRENIC-Mini, FRENIC-Eco, FRENIC-Multi, and FRENIC-MEGA inverters
02 October 2018
Critical vulnerabilities in Emerson AMS Device ManagerExploitation of vulnerabilities in Emerson AMS Device Manager, an industrial asset control system, could allow arbitrary code execution and malware injection
20 September 2018
Dangerous vulnerabilities in Siemens industrial solutionsNewly identified vulnerabilities affect SIMATIC WinCC OA HMI system, SCALANCE X switches and TD Keypad Designer tool
12 September 2018
Schneider Electric products shipped with infected USB mediaUSB media infected with malware were shipped with Conext ComBox and Conext Battery Monitor products
11 September 2018
Buffer overflow vulnerabilities in industrial automation products by Opto22The vulnerability affects PAC Control Basic and PAC Control Professional version R10.0а and earlier and could allow arbitrary code execution