ABB eSOMS (Update A) (ICSA-18-240-04) – Product Used in the Energy Sector
October 2, 2018
The NCCIC has updated this advisory with additional details on mitigation measures. NCCIC/ICS-CERT.
August 28, 2018
October 2, 2018
The NCCIC has updated this advisory with additional details on mitigation measures. NCCIC/ICS-CERT.
August 28, 2018
On October 11, 2018, the Internet Corporation for Assigned Names and Numbers (ICANN) will be changing the Root Zone Key Signing Key (KSK) used in the Domain Name System (DNS) Security Extensions (DNSSEC) protocol. DNSSEC is a set of protocol extensions used to digitally sign DNS information, an important part of preventing domain name hijacking. Updating DNSSEC KSK is a crucial security step in ensuring DNSSEC-validating DNS resolvers continue to function after the rollover. While DNSSEC validation is mandatory for federal agencies, it is not required of the private sector.
The NCCIC has just published a new Security Tip regarding how to protect against malicious code, unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. This reference provides background into malicious code, discusses actions for protecting against it, explains the role of antivirus software, and addresses how a victim can recover from an incident of malicious code. NCCIC/US-CERT.
The FBI’s Internet Crime Complaint Center (IC3) has released an alert on cyber threat actors maliciously using legitimate remote administration tools, such as Remote Desktop Protocol (RDP). RDP as an attack vector has been on the rise since mid-late 2016 with the rise of dark markets selling RDP Access. Malicious cyber actors have developed methods of identifying and exploiting vulnerable RDP sessions over the Internet to compromise identities, steal login credentials, and ransom other sensitive information.
The theme for the first week of National Cybersecurity Awareness Month is Cybersecurity at Home. For this, the National Cyber Security Alliance (NCSA) has published general tips to help you increase your cybersecurity awareness - including whom to contact if you are the victim of cyber crime - and protect your online activities.
October 2, 2018
The NCCIC has updated this advisory with additional details on the nature of the vulnerabilities and the background of the affected products. NCCIC/ICS-CERT.
July 31, 2018
The NCCIC has released an advisory on an out-of-bounds read vulnerability in Delta Electronics Delta Industrial Automation PMSoft. Versions 2.11 and prior are affected. Successful exploitation of this vulnerability could allow an attacker to read confidential information. Delta Electronics recommends affected users update to at least PMSoft v2.12. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities. NCCIC/ICS-CERT.
The NCCIC has released an advisory on improper access control and improper privilege management vulnerabilities in Emerson AMS Device Manager. Versions 12.0 to 13.5 are affected. Successful exploitation of these vulnerabilities could allow arbitrary remote code execution and malware injection. Emerson recommends users patch the affected products. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities. NCCIC/ICS-CERT.
WaterISAC entered over 220 indicators of compromise regarding recent open source reporting. Perch users subscribed to the WaterISAC Community will be able to detect the following within their environment:
A recommended practice document from the NCCIC provides guidance for developing mitigation strategies for specific cyber threats and direction on how to create a Defense-in-Depth security program for control system environments.