Friday, May 16, 2025
HomeBackdoorNow Industrial Control Systems (ICS) Become Prime Target for Cyber Attackers

Now Industrial Control Systems (ICS) Become Prime Target for Cyber Attackers

Published on

SIEM as a Service

Follow Us on Google News

Industrial management systems (ICS/SCADA) are now the prime target for cyber attackers seeking to compromise the production base and public utilities.

The gift of previous embedded Microsoft® operational systems gives attackers a well-protected supported provision to launch their attack and establish “backdoors” to compromise the enterprise systems.

Over the past 5 years, cyber security has become a prime corporate issue among the manufacturing industries for chief executive officers, their team and therefore the board of administrators.

Manufacturing sector firms, despite seeing a reduction in attacks and security incidents in 2016 still experienced a number of the foremost serious and compromising attacks.

- Advertisement - Google News

Also Read Important Consideration of Industrial Network Security and Protect SCADA & ICS System with mGuard

ICS/SCADA Attack report

TrapX submitted an exciting report on the attack over ICS and SCADA security with real world examples. Many cyber attackers tend to use generic cyber attack tools and normal malware.

They may Use a well developed socially built attack however within the finish, have faith in normal attack vectors. They use target manufacturing units directly, however, don’t demonstrate or utilize any special data of the commercial method management systems.

Industrial management Systems vendors are followed by several documented vulnerabilities that are currently freely out there on the Internet from numerous sources.

The vulnerabilities cover backdoors, lack of authentication and coding, and weak password storage schemes that might permit attackers to achieve access to the systems and so compromise them.

“Air gaps” are eminent than not, however, don’t guarantee the security of the ICS network. Information from their security operations center shows that these methods fail. This is often a typical theme visible inside the installations reviewed by our security operations team and TrapX Labs personnel. Social engineering targeted towards your personal or those of your vendors and suppliers will jump the “air gap.” Says TrapX

Old normal operational systems like Windows 7, Windows XP, and Windows 2000 are widely distributed among the worldwide ICS production base.

These operating systems are out of date and there are no fixes for several renowned attack vectors. They’re targets of selection for attackers.

Also Read Large scale Cyber attack Targeting Weak Spot in the Vital Electrical Infrastructure

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Windows 10 KB5058379 Update Causes PCs to Enter Recovery Mode and Prompt for BitLocker Key

Security update KB5058379 for Windows 10, released in May 2025, is causing significant technical...

Cybercriminal Andrei Tarasov Escapes US Extradition, Returns to Russia

Andrei Vladimirovich Tarasov, a 33-year-old Russian cybercrime figure known online as "Aels," has returned...

FBI Alerts Public to Malicious Campaign Impersonating US Government Officials

Federal Bureau of Investigation has issued a warning about an ongoing malicious messaging campaign...

Frigidstealer Malware Targets macOS Users to Harvest Login Credentials

An macOS users, a new information-stealing malware dubbed FrigidStealer has emerged as a formidable...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...