Tuesday, October 8, 2024
HomeBackdoorNow Industrial Control Systems (ICS) Become Prime Target for Cyber Attackers

Now Industrial Control Systems (ICS) Become Prime Target for Cyber Attackers

Published on

Industrial management systems (ICS/SCADA) are now the prime target for cyber attackers seeking to compromise the production base and public utilities.

The gift of previous embedded Microsoft® operational systems gives attackers a well-protected supported provision to launch their attack and establish “backdoors” to compromise the enterprise systems.

Over the past 5 years, cyber security has become a prime corporate issue among the manufacturing industries for chief executive officers, their team and therefore the board of administrators.

Manufacturing sector firms, despite seeing a reduction in attacks and security incidents in 2016 still experienced a number of the foremost serious and compromising attacks.

- Advertisement - EHA

Also Read Important Consideration of Industrial Network Security and Protect SCADA & ICS System with mGuard

ICS/SCADA Attack report

TrapX submitted an exciting report on the attack over ICS and SCADA security with real world examples. Many cyber attackers tend to use generic cyber attack tools and normal malware.

They may Use a well developed socially built attack however within the finish, have faith in normal attack vectors. They use target manufacturing units directly, however, don’t demonstrate or utilize any special data of the commercial method management systems.

Industrial management Systems vendors are followed by several documented vulnerabilities that are currently freely out there on the Internet from numerous sources.

The vulnerabilities cover backdoors, lack of authentication and coding, and weak password storage schemes that might permit attackers to achieve access to the systems and so compromise them.

“Air gaps” are eminent than not, however, don’t guarantee the security of the ICS network. Information from their security operations center shows that these methods fail. This is often a typical theme visible inside the installations reviewed by our security operations team and TrapX Labs personnel. Social engineering targeted towards your personal or those of your vendors and suppliers will jump the “air gap.” Says TrapX

Old normal operational systems like Windows 7, Windows XP, and Windows 2000 are widely distributed among the worldwide ICS production base.

These operating systems are out of date and there are no fixes for several renowned attack vectors. They’re targets of selection for attackers.

Also Read Large scale Cyber attack Targeting Weak Spot in the Vital Electrical Infrastructure

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Badge and CyberArk Announce Partnership to Redefine Privacy in PAM and Secrets Management

Partnership aims to help businesses eliminate vulnerable attack surfaces and provide a more streamlined...

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windwos Servers

The attackers exploited the EternalBlue vulnerability to gain initial access to the observatory farm,...

Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars

Recent discoveries in the automotive cybersecurity landscape have unveiled a series of critical zero-day...

Likho Hackers Using MeshCentral For Remotely Managing Victim Systems

The Awaken Likho APT group launched a new campaign in June of 2024 with...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Backdoored Azure Automation Account Packages And Runtime Environments

Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages....

Hackers Using Supershell Malware To Attack Linux SSH Servers

Researchers identified an attack campaign targeting poorly secured Linux SSH servers, where the attack...

UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader

UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN...