You are here

Cybersecurity

Director of National Intelligence Group Launches Campaign to Help Private Industry Guard against Threats from Nation State Actors

The National Counterintelligence and Security Center, an entity within the Office of the Director of National Intelligence, has launched a campaign of disseminating videos, brochures, and other informative materials to help organizations guard against growing threats from foreign intelligence entities and other adversaries. One of the categories of materials for this program is “Know the Risk, Raise Your Shield,” which is intended to raise awareness among organizations and equip them with best practices for protecting their data, assets, technologies, and networks.

Schneider Electric Pro-face GP-Pro Ex (ICSA-19-003-01) – Product Used in the Energy Sector

The NCCIC has published an advisory on an improper input validation vulnerability in Schneider Electric Pro-face GP-Pro Ex. Versions 4.08 and prior are affected. Successful exploitation of this vulnerability could allow an attacker to modify code to launch an arbitrary executable upon launch of the program. Schneider Electric has produced Version 4.08.200 of the software to address this vulnerability. The NCCIC also advises on a series of mitigating measures for this vulnerability.

Yokogawa Vnet/IP Open Communication Driver (ICSA-19-003-02) – Products Used in the Energy Sector

The NCCIC has published an advisory on a resource management error vulnerability in Yokogawa Vnet/IP Open Communication Driver. Numerous products and versions of these products are affected. Successful exploitation of this vulnerability could allow an attacker to cause Vnet/IP network communications to controlled devices to become unavailable. Yokogawa recommends users of affected devices and versions update to the latest available release. The NCCIC also advises on a series of mitigating measures for this vulnerability.

Hetronic Nova-M (ICSA-19-003-03)

The NCCIC has published an advisory on an authentication bypass by capture-replay vulnerability. All versions prior to r161 are affected. Successful exploitation of this vulnerability could allow unauthorized users to view commands, replay commands, control the device, or stop the device from running. Hetronic recommends that all Nova-M users update their radio transmitters and receivers. The NCCIC also advises on a series of mitigating measures for this vulnerability. NCCIC/ICS-CERT.

Cryptojacking Isn’t Going Away

Cryptojacking refers to the practice of attackers harnessing the processing power of computers they don’t own to mine for cryptocurrency, such as Bitcoin or Monero. Cryptojacking’s popularity soared when cryptocurrencies hit their all-time highs in late 2017 and early 2018, and attackers adapted the malware used for these activities to go after mobile devices, cloud infrastrucuture, Internet of Things devices, and even operational technology (OT).

How the Federal Government’s Partial Shutdown Affects the Department of Homeland Security

The partial government shutdown that began on Saturday has resulted in furloughs for nearly 33,000 federal employees from the U.S. Department of Homeland Security (DHS), which represents about 13 percent of the organization’s approximately 245,000 person workforce. DHS’s law enforcement and emergency management functions are largely unaffected by the shutdown, with most employees exempt from furloughs at components like Customs and Border Protection, the Coast Guard, the Transportation Security Administration, and the Federal Emergency Management Agency, among others.

Rockwell Automation FactoryTalk Services Platform (ICSA-18-331-02) – Product Used in the Water and Wastewater Sector

The NCCIC has published an advisory on an improper input validation vulnerability in Rockwell Automation FactoryTalk Services Platform. Versions 2.90 and earlier are affected. Successful exploitation of this vulnerability could allow a remote attacker to diminish communications or cause a complete denial of service to the device. Rockwell Automation recommends that affected users update to the latest version of the application. The NCCIC also advises on a series of mitigating measures for these vulnerabilities.

Pages

Subscribe to Cybersecurity