CyberX has discovered a new, large-scale cyber-reconnaissance operation targeting a broad range of targets in the Ukraine. Because it eavesdrops on sensitive conversations by remotely controlling PC microphones – in order to surreptitiously “bug” its targets – and uses Dropbox to store exfiltrated data, CyberX has named it “Operation BugDrop.”
Many decision-makers are still reluctant to spend more on tighter security controls to reduce ICS risk. Here are 7 examples of evolving risks in the cyber security space that you can use next time you hear “we’re not going to spend more on ICS cybersecurity because it’s never happened before.”
With all of the experts opining about the “disconnected” laptop at a Vermont utility, it’s easy to have missed this story by veteran WSJ reporter Rebecca Smith that appeared on Friday afternoon.
In short, a Lansing, Michigan utility was hacked with ransomware, resulting in a $25,000 bitcoin payment and $2.5 million worth of damage. CyberX’s VP of Industrial Cybersecurity dives into some scenarios for how cyberattackers could deploy malware on IT assets as launching points for subsequent attacks on OT networks.
The DHS/FBI released a report yesterday in which they said Russians launched attacks on “critical infrastructure entities” in the US and “conducted damaging and/or disruptive cyber-attacks” on critical infrastructure networks in other countries using BlackEnergy and other malware.
CyberX’s threat intelligence team has uncovered new evidence that the KillDisk malware previously used in the cyberattacks against the Ukrainian power grid has now evolved into industrial ransomware.
CyberX has announced that cybersecurity marketing veteran Phil Neray has joined the company’s leadership team as vice-president of marketing.