Knowledge Base for IIoT, ICS & SCADA Security

Your trusted source for the latest ICS vulnerability research, industrial threat intelligence, and educational information about best practices for IIoT, ICS and SCADA security.
170

Global ICS & IIoT Risk Report

A data-driven analysis of vulnerabilities in real-world OT networks based on analyzing 375 industrial control networks via Network Traffic Analysis (NTA), across multiple industrial sectors in the US, EMEA and APAC.

 
170

SANS Webinar: NotPetya, Dragonfly 2.0 & CrashOverride: Is Now the Time for Active Cyber Defense in ICS/SCADA Networks?

In this educational SANS webinar led by Mike Assante, SANS Director of Critical Infrastructure & ICS/SCADA Security, we’ll explore:

• Limitations of basic ICS/SCADA security: Why firewalls & segmentation aren’t sufficient anymore
• NotPetya, CrashOverride & Dragonfly 2.0: Technical descriptions & how they work
• Active Cyber Defense: What is it & how can ICS/SCADA defenders implement it

 
170

ICS Hacking Exposed Chapter 1 – Intro to ICS/SCADA Security

Get your complimentary copy of Chapter 1 from this recently-published guide to ICS and SCADA security. Written by ICS/SCADA security experts, this educational chapter describes what’s driving IT/OT convergence and how ICS/SCADA security is different than IT security. It also covers major components, standards and terminology commonly used in industrial environments today (SCADA, DCS, PLC, HMI, NIST SP 800-82, PROFINET, etc.).

 
170

BlackEnergy Report

According to ICS-ALERT-14-281-01B, BlackEnergy malware targets a vulnerability (CVE-2014-0751) in HMI systems from GE CIMPLICITY, Siemens WinCC, and Advantech/Broadwin WebAccess. CyberX’s threat intelligence team reverse-engineered BlackEnergy3 and discovered it was designed to perform exfiltration of sensitive information from OT networks (especially valuable during the reconnaissance phase of the cyber kill chain). We found that BlackEnergy3 can penetrate OT networks — even when they’re theoretically isolated from IT networks by a firewall — via RPC communication using named pipes over SMB.

 
170

SANS Webinar: New Threat Vectors for ICS/SCADA Networks — and How to Prepare for Them

Join Mike Assante, SANS Director of Critical Infrastructure & ICS — described in Wired as “one of the most respected experts in the world” when it comes to cyber and power grids — as he discusses new ICS/SCADA attack vectors including:
• Industroyer/CrashOverride
• WannaCry & Petya ransomware
• Cyber-espionage targeting corporate IP

 
170

ICS Hacking Exposed Chapter 2 – ICS Risk Assessments

Download your complimentary overview of best practices risk assessments for ICS and SCADA security, and learn how to implement an ICS-focused risk mitigation framework that’s practical and efficient. This chapter provides specific examples of ICS vulnerabilities and security policies, and describes how to identify assets, network topology, data flows, and vulnerabilities without impacting production systems.

 
170

RADIATION Report

Months before Mirai malware was found to be infecting IoT devices, CyberX’s threat intelligence team discovered RADIATION. Targeting surveillance cameras commonly used in industrial environments, the RADIATION malware is much more sophisticated than Mirai because it exploits a zero-day vulnerability in IIoT devices rather than open ports and default credentials that can easily be addressed. We’ve since identified 25,000 Internet-accessible devices compromised by RADIATION, and found that cybercriminals are now providing DDOS-for-Hire services using this massive botnet army.

 
170

Rockwell Automation Vulnerability Report

Researchers from CyberX’s threat intelligence team have uncovered a remote code execution (RCE) vulnerability in the Allen-Bradley MicroLogix 1100/1400 families of Rockwell Automation PLCs. With a CVSS score of 9.8, the stack-based buffer overflow vulnerability (CVE-2016-0868) was described in ICS-CERT advisory ICSA-16-026-02. CyberX first demonstrated the exploit at the 2015 ICS Cybersecurity Conference, and it was subsequently described in detail in the chapter on “ICS Zero-Day Vulnerability Research” from the book “Hacking Exposed Industrial Control Systems.”

 
170

Network World: How CyberX Assesses Industrial Environments for Cyber Risks

The U.S. Department of Homeland Security (DHS) reports that cyber incidents at energy facilities increased by nearly a third over 2015. But the actual number of ICS/SCADA security incidents isn’t the really concerning part of the story. More worrisome, say federal cybersecurity officials and private security specialists, is that the vast majority of industrial organizations lack the technology and personnel to continuously monitor their operational systems for anomalous activity, which leaves them unable to detect intrusions when they happen.