Wednesday, February 26, 2025
HomeBackdoorNow Industrial Control Systems (ICS) Become Prime Target for Cyber Attackers

Now Industrial Control Systems (ICS) Become Prime Target for Cyber Attackers

Published on

SIEM as a Service

Follow Us on Google News

Industrial management systems (ICS/SCADA) are now the prime target for cyber attackers seeking to compromise the production base and public utilities.

The gift of previous embedded Microsoft® operational systems gives attackers a well-protected supported provision to launch their attack and establish “backdoors” to compromise the enterprise systems.

Over the past 5 years, cyber security has become a prime corporate issue among the manufacturing industries for chief executive officers, their team and therefore the board of administrators.

Manufacturing sector firms, despite seeing a reduction in attacks and security incidents in 2016 still experienced a number of the foremost serious and compromising attacks.

Also Read Important Consideration of Industrial Network Security and Protect SCADA & ICS System with mGuard

ICS/SCADA Attack report

TrapX submitted an exciting report on the attack over ICS and SCADA security with real world examples. Many cyber attackers tend to use generic cyber attack tools and normal malware.

They may Use a well developed socially built attack however within the finish, have faith in normal attack vectors. They use target manufacturing units directly, however, don’t demonstrate or utilize any special data of the commercial method management systems.

Industrial management Systems vendors are followed by several documented vulnerabilities that are currently freely out there on the Internet from numerous sources.

The vulnerabilities cover backdoors, lack of authentication and coding, and weak password storage schemes that might permit attackers to achieve access to the systems and so compromise them.

“Air gaps” are eminent than not, however, don’t guarantee the security of the ICS network. Information from their security operations center shows that these methods fail. This is often a typical theme visible inside the installations reviewed by our security operations team and TrapX Labs personnel. Social engineering targeted towards your personal or those of your vendors and suppliers will jump the “air gap.” Says TrapX

Old normal operational systems like Windows 7, Windows XP, and Windows 2000 are widely distributed among the worldwide ICS production base.

These operating systems are out of date and there are no fixes for several renowned attack vectors. They’re targets of selection for attackers.

Also Read Large scale Cyber attack Targeting Weak Spot in the Vital Electrical Infrastructure

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...