article thumbnail

DoS attack the caused disruption at US power utility exploited a known flaw

Security Affairs

A DoS attack that caused disruptions at a power utility in the United States exploited a flaw in a firewall used in the facility. In May, the Department of Energy confirmed that on March 5, 2019, between 9 a.m. a cyber event disrupted energy grid operations in California, Wyoming, and Utah. and 7 p.m., and 7 p.m.,

article thumbnail

Industrial Switches from different Vendors Impaired by Similar Exposures

Hacker Combat

Industrial switches are made using universal firmware developed by Korenix Technology, a leading provider for industrial networking solutions based in Taiwan. Korenix has developed another firmware that the organization incorporates in its JetNet industrial switches. Malicious firmware and bootloader uploads are possible too.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical Success Factors to Widespread Deployment of IoT

Thales Cloud Protection & Licensing

Electric grid utilities are deploying smart meters to better correspond to consumers energy demands while lowering costs. An IoT device connected to a network is simply a potential bridge between the internet and a malicious entity. Internet Of Things. Tue, 02/16/2021 - 16:33. The truth, however, is far from that.

IoT 96
article thumbnail

IT threat evolution Q3 2021

SecureList

The vulnerability is in MSHTML, the Internet Explorer engine. We have seen targeted attacks exploiting the vulnerability to target companies in research and development, the energy sector and other major industries, banking, the medical technology sector, as well as telecoms and IT. It also includes a Bitcoin wallet stealing module.

Malware 86
article thumbnail

Reassessing cyberwarfare. Lessons learned in 2022

SecureList

Industroyer2 was discovered in the network of a Ukrainian energy provider, and it is very unlikely that the attacker would have been able to develop it without access to the same ICS equipment as used by the victim. It directly affected satellite modems firmwares , but was still to be understood as of mid-March.

DDOS 131
article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. And again, smart meters were positioned squarely as making the environment more friendly by knowing how and when energy is being used by individual customers. It was all this discovery on the internet that brought me to it.

article thumbnail

Preparing for IT/OT convergence: Best practices

CyberSecurity Insiders

Beyond traditional IT operations that utilize servers, routers, PCs and switches, these organizations also rely on OT, such as programmable logic controllers (PLCs), distributed control systems (DCSs) and human machine interfaces (HMIs) to run their physical plants and factories. They also don't have event logs or audit trails. .