You are here

Cybersecurity

LCDS - Leão Consultoria e Desenvolvimento de Sistemas Ltda ME LAquis SCADA (ICSA-19-015-01) – Product Used in the Water and Wastewater and Energy Sectors

The NCCIC has published an advisory on an improper input validation, out-of-bounds read, code injection, untrusted pointer dereference, out-of-bounds write, relative path traversal, injection, use of hard-coded credentials, and authentication bypass using an alternate path or channel vulnerabilities in LCDS - Leão Consultoria e Desenvolvimento de Sistemas Ltda ME LAquis SCADA. Version 4.1.0.3870 is affected. Successful exploitation of these vulnerabilities could allow remote code execution, data exfiltration, or cause a system crash. LCDS recommends users update to Version 4.1.0.4150.

2018: A Year of Cyber Attacks

Hackmageddon has compiled a full listing of cyber attacks it observed in 2018 – 1,337 in all – presenting for each the suspected perpetrator, target, and type of attack, among other details. From the individual incidents it has generated a number of useful statistics, which present the attacks that occurred by sector (including for the water sector), by month, and by motivation. Access the full listing of cyber incidents at Hackmageddon.

Ryuk Ransomware Partners with TrickBot to Gain Access to Infected Networks

New research indicates that the Ryuk ransomware actors may be using new types of malware to gain entrance to victims’ networks. As previously reported on by WaterISAC, the systems and networks of water utility in North Carolina were infected in October 2018 by Ryuk ransomware that had been dropped by the Emotet malware. In new reports by FireEye and CrowdStrike, researchers explain how “TrickBot” is now being used to get access.

Multiple Zero-Days Discovered in PremiSys Identicard Access Control System

Tenable Research reports it has discovered multiple zero-day vulnerabilities in the Identicard PremiSys access control system that, as of January 9, have not been patched. The PremiSys system can be used to manage door controls and access cards, collect detailed facility data and integrate with video monitoring systems. Because there is no vendor patch, Tenable Research notes affected users will have to attempt to mitigate these vulnerabilities.

How Cyber Attacks Impact Your Reputation

Today, cybersecurity firm Radware released a report discussing the damage a successful cyber attack can do to an organization, including to its reputation. The report was developed based on a worldwide survey of nearly 800 business and security executives and professionals. One of its key findings is that the average estimated cost of a cyber attack grew by 54 percent and now exceeds $1 million. Part of these costs emerge from impacts to an organization’s reputation, with some of the survey respondents acknowledging that they lost customers as a result of cyber attacks.

DNS Infrastructure Hijacking Campaign

The NCCIC reports it is aware of a global Domain Name System (DNS) infrastructure hijacking campaign. Using compromised credentials, an attacker can modify the location to which an organization’s domain name resources resolves. This enables the attacker to redirect user traffic to attacker-controlled infrastructure and obtain valid encryption certificates for an organization’s domain names, enabling man-in-the-middle attacks.

Emerson DeltaV (ICSA-19-010-01) - Product Used in the Energy Sector

The NCCIC has published an advisory on an authentication bypass vulnerability in Emerson DeltaV. Multiple versions of this product are affected. Successful exploitation of this vulnerability could allow an attacker to shut down a service, resulting in a denial of service. Emerson recommends users to patch affected products. The NCCIC also advises on a series of mitigating measures for this vulnerability. Read the full advisory at NCCIC/ICS-CERT.

Pages

Subscribe to Cybersecurity