Five Key Lessons from Industrial Control System Attacks

Five Key Lessons from Industrial Control System Attacks

Attacks on industrial control systems are becoming more frequent, yet lack novelty. Imagine it’s 1903, and you are standing in front of a large inn on a remote peninsula in Bodmin, Cornwall, England. Despite the massive antenna next to the inn and large kites occasionally lifting the antenna higher, you might not realize that you … Read more

Industrial Control System Cybersecurity: Attack Types and Prevention

Industrial Control System Cybersecurity: Attack Types and Prevention

Catastrophic incidents may result from insecure industrial control systems. Enhancing cybersecurity across the entire system can be achieved through four steps. Despite the fact that cybersecurity has always been a major concern for any industry, it is commonly believed that attacks only lead to loss of proprietary data, becoming victims of espionage, and facing threats … Read more

Vulnerabilities in Industrial Control Systems

Vulnerabilities in Industrial Control Systems

Source: “Intelligent Manufacturing Information Security Technology” (Authors: Qin Zhiguang, Nie Xuyun, Qin Zhen) This book has been published, please see the end for details~ “1. Security Incidents in Industrial Control Systems“ With the deep integration of cyberspace and physical space, the impact of cyber issues on reality is becoming increasingly severe. Industrial control systems, as … Read more

Malware Unpacking Methods (Part 2): Weak Encryption Algorithms

Malware Unpacking Methods (Part 2): Weak Encryption Algorithms

A few days ago, I began writing a series of articles about tools and methods for unpacking malware. Each malware or packer is different, and sometimes general methods do not work for unpacking. However, common characteristics can sometimes be found among them. For example, packers often use weak encryption algorithms, which can be cracked. In … Read more

Advanced Threat Intelligence Analysis

Advanced Threat Intelligence Analysis

2024.12.13~12.19 Attack group intelligence Mask APT reappeared, targeting Latin American organizations. Attack Bitter APT utilized WmRAT and MiyaRAT malware to attack Turkish defense organization APT-C-36 (Blind Eye Eagle), continuously launching attacks against Colombia. Gamaredon deployed in former Soviet states Andr…

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker, produced by Rapid7, is a network scanning tool for default password credentials of IoT devices, capable of scanning specific IoT devices to determine whether they are using default or factory-set password credentials. Tool Introduction The cause of the large-scale network outage in the United States was investigated to be malware exploiting default password credentials … Read more

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker, developed by Rapid7, is a tool for scanning default password credentials of IoT devices. It can scan specific IoT devices to determine if they are using default or factory-set passwords. Tool Introduction The recent large-scale network disruption in the United States was investigated to be caused by malware exploiting default password credentials of IoT … Read more