[prev in list] [next in list] [prev in thread] [next in thread] 

List:       isn
Subject:    [ISN] BlackEnergy crimeware coursing through US control systems
From:       InfoSec News <alerts () infosecnews ! org>
Date:       2014-10-29 9:45:30
Message-ID: alpine.DEB.2.02.1410290945180.23854 () infosecnews ! org
[Download RAW message or body]

http://www.theregister.co.uk/2014/10/29/blackenergy_crimeware_pwning_us_control_systems_cert_warns/

By Darren Pauli
The Register
29 Oct 2014

Industrial control systems in the United States have been compromised by 
the BlackEnergy malware toolkit for at least three years in a campaign the 
US Computer Emergency Response Team has dubbed "ongoing" and 
sophisticated.

Attackers had compromised unnamed industrial control system operators and 
implanted BlackEnergy on internet-facing human-machine interfaces 
including those from GE Cimplicity, Advantech/Broadwin WebAccess, and 
Siemens WinCC.

The latter system was often used by large plant operators including Iran's 
Natanz uranium facility at the time it was hosed by Stuxnet, however the 
latest attacks targeting the platform are suspected but not confirmed.

The CERT had not identified attempts to damage or disrupt system processes 
but had not verified if hackers had pivoted laterally across the victim 
networks.

[...]



--
Evident.io - Continuous Cloud Security for AWS.
Identify and mitigate risks in 5 minutes or less.
Sign up for a free trial @ https://evident.io/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic