You are here

Cybersecurity

Inside Emotet, the Malware Distributor

In terms of malware, Emotet has been among the greatest threats to water and wastewater utilities in recent months, infecting systems and deploying other types of malware. In one well-document example, in October 2018 Emotet dropped the Ryuk ransomware into the IT system for a North Carolina water utility (WaterISAC created a page on its portal and hosted presentations during webcasts in October and November about this incident).

The Importance of IT/OT Collaboration for OT Systems Management

IT cybersecurity policies and processes do not directly translate to the OT environment, but that does not mean they are not useful. In a recent post, industrial cybersecurity firm Verve Industrial Protection suggests there is great value in applying the rigor of IT systems management to OT systems. As industrial organizations embrace the need for OT specific policies, there is no need to reinvent the wheel. Well-developed IT policies should be used as a starting point and adapted for OT environments.

Waterfall Industrial Security Podcast – Keep Current on ICS Cybersecurity Topics with Expert Interviews

Today, industrial cybersecurity firm Waterfall Security Solutions announced their Industrial Security Podcast. The podcast will feature interviews with world-recognized experts addressing current and developing ICS cybersecurity topics, such as IIoT, governance, IT/OT integration, and ICS vulnerabilities. The podcast is hosted by Andrew Ginter, VP Industrial Security at Waterfall Security. Episodes will be released every two to three weeks with new experts and new topics.

In Annual Threat Report, Microsoft Highlights Risks to Supply Chains

In its just released Security Intelligence Report (SIR), Microsoft points to supply chain attacks as being responsible for numerous high-profile incidents in 2018. These included a massive campaign to deliver the Dofoil Trojan through a peer-to-peer application’s update package. Dofoil carried a cryptocurrency mining payload and exhibited advanced cross-process injection techniques, persistence mechanisms, and evasion techniques.

NSA Releases Ghidra, a Free Tool for Malware Analysts

At the RSA security conference in San Francisco yesterday, the National Security Agency (NSA) released “Ghidra,” a free software reverse engineering tool that the agency had been using internally for well over a decade. The tool is ideal for software engineers but will be especially useful for malware analysts. Ghidra is a free alternative to IDA Pro, a similar reverse engineering tool that's only available under a very expensive commercial license, priced in the range of thousands of U.S. dollars per year.

Pages

Subscribe to Cybersecurity