You are here

Cybersecurity

ICS Network Segmentation - The Difference Between an Internal Incident or Front Page Headline

There is no silver bullet in cybersecurity, but some strategies, like network segmentation, provide more bang for the cybersecurity buck. Effective network segmentation requires thorough knowledge about what is in the environment. This knowledge includes information beyond just the endpoints, such as regarding normal operational process workflows, as well as expected network communications. ICS cybersecurity expert Galina Antova discusses the priceless role network segmentation plays in protecting OT networks. Ms.

Government Agencies Receiving Suspicious Envelopes with Malware Infected CDs

The Delaware Information & Analysis Center (DIAC) has released a Cyber Alert warning that several state, local, tribal, and territorial governments have reported receiving suspicious envelopes containing malware infected CDs originating from China. Key features of these envelopes include Chinese postmarks, confusingly-worded letters with occasional Chinese characters, and SOCKO brand CD-Rs. DIAC’s alert contains sample photos of a letter, envelope, and CD. Members are encouraged to notify WaterISAC if they receive one of these envelopes. 

Dark Web Cyber Crime Market Thriving

Demand for malware creation is three times greater than supply, according to research by Positive Technologies into more than 10,000 hack-for-hire and malware-related postings on Dark Web markets. Its analysis included 25 sites on the Dark Web in Russian and English, with a total registered user base of about three million people. The leading type of malware available was cryptocurrency miners (20%), followed by hacking utilities (19%), botnet malware (14%), remote access Trojans (RATs) (12%), and ransomware (12%).

Business Continuity and Resiliency Planning – Asset Management

ICS security technology firm, Applied Risk discusses the importance of asset identification in ICS environments. The post explains how to approach asset identification and the benefits of passive monitoring solutions, not only to discover assets, but also for maintaining an up-to-date inventory, highlighting anomalies, and pinpointing operational problems – all while avoiding disruption to critical processes.

Iranian Man Who Hacked into U.S. Dam among FBI’s Most-Wanted Cyber Criminals

Business Insider has published an article highlighting some of the individuals on the FBI’s “Cyber’s Most Wanted” webpage. Many of these hackers are affiliated with nation-states, such as a group of Iranians who are believed to work for the “Mabna Institute” that conducts malicious cyber activities on behalf of the Iranian government. In the case of one Iranian hacker, who does not appear to be associated with the Mabna Institute, the suspect is believed to have hacked into the industrial control systems of a dam in upstate New York.

Malicious Cyber Activity Targeting ERP Applications

The NCCIC advises that Digital Shadows Ltd. and Onapsis Inc. have released a report describing an increase in the exploitation of vulnerabilities in Enterprise Resource Planning (ERP) applications. ERP applications help organizations manage critical business processes—such as product lifecycle management, customer relationship management, and supply chain management. An attacker can exploit these vulnerabilities to obtain access to sensitive information.

Private Sector Played Critical Role in WannaCry Attribution, ODNI Official Says

Private sector companies had a key role in the U.S. government’s attribution of last year’s WannaCry ransomware epidemic to North Korea, said Office of the Director of National Intelligence (ODNI) Cyber Threat Intelligence Integration Center (CTIIC) Director Tonya Ugoretz. She explained CTIIC learned of information about WannaCry that had been fed to the Department of Homeland Security by its private sector partners. This information allowed the U.S.

Identity and Access Management for Electric Utilities

The National Institute of Standards and Technology (NIST) has released a special publication that provides guidance and best practices for electric utilities to securely and efficiently manage access to the networked devices and facilities on which power generation, transmission, and distribution depend. According to NIST, such guidance is especially necessary now given the challenges posed by the convergence of OT and IT departments.

Pages

Subscribe to Cybersecurity