Saturday, July 13, 2024

Now Industrial Control Systems (ICS) Become Prime Target for Cyber Attackers

Industrial management systems (ICS/SCADA) are now the prime target for cyber attackers seeking to compromise the production base and public utilities.

The gift of previous embedded Microsoft® operational systems gives attackers a well-protected supported provision to launch their attack and establish “backdoors” to compromise the enterprise systems.

Over the past 5 years, cyber security has become a prime corporate issue among the manufacturing industries for chief executive officers, their team and therefore the board of administrators.

Manufacturing sector firms, despite seeing a reduction in attacks and security incidents in 2016 still experienced a number of the foremost serious and compromising attacks.

Also Read Important Consideration of Industrial Network Security and Protect SCADA & ICS System with mGuard

ICS/SCADA Attack report

TrapX submitted an exciting report on the attack over ICS and SCADA security with real world examples. Many cyber attackers tend to use generic cyber attack tools and normal malware.

They may Use a well developed socially built attack however within the finish, have faith in normal attack vectors. They use target manufacturing units directly, however, don’t demonstrate or utilize any special data of the commercial method management systems.

Industrial management Systems vendors are followed by several documented vulnerabilities that are currently freely out there on the Internet from numerous sources.

The vulnerabilities cover backdoors, lack of authentication and coding, and weak password storage schemes that might permit attackers to achieve access to the systems and so compromise them.

“Air gaps” are eminent than not, however, don’t guarantee the security of the ICS network. Information from their security operations center shows that these methods fail. This is often a typical theme visible inside the installations reviewed by our security operations team and TrapX Labs personnel. Social engineering targeted towards your personal or those of your vendors and suppliers will jump the “air gap.” Says TrapX

Old normal operational systems like Windows 7, Windows XP, and Windows 2000 are widely distributed among the worldwide ICS production base.

These operating systems are out of date and there are no fixes for several renowned attack vectors. They’re targets of selection for attackers.

Also Read Large scale Cyber attack Targeting Weak Spot in the Vital Electrical Infrastructure


Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles