11-12-18 – News This Past Week

Flaws in Roche Medical Devices Can Put Patients at Risk
The affected products consist of a base unit and a handheld device that communicates wirelessly – including over Wi-Fi if an optional module is available – with the base unit. Medigate researchers discovered that an attacker with access to the local network can hack the base station and from there target the handheld devices.
https://www.securityweek.com/flaws-roche-medical-devices-can-put-patients-risk

Implications of the NIS Directive for the industrial sector
Under the law, operators of essential services and digital service providers are required to abide by the requirements of the new regulations. These are intended to provide a framework for countries and operators to strengthen the security of critical infrastructures and allied information systems. Any operator with 50 or more employees and/or a balance sheet of greater than €10 million must comply with the NIS Directive
https://www.helpnetsecurity.com/2018/11/12/nis-directive-industrial-sector/

IT-to-OT Solutions That Can Bolster Security in the IIoT
The Industrial Internet of Things (IIoT) — within companies and across the entire global IIoT ecosystem — is an intricately intertwined and negotiated merger of information technology (IT) and operational technology (OT). OT systems are not only business-critical, they can be nation-critical or life-and-death-critical.
https://www.darkreading.com/attacks-breaches/it-to-ot-solutions-that-can-bolster-security-in-the-iiot/a/d-id/1333210

How A New Wave of Cyber-Attacks is Targeting Maritime Trade
In concrete terms, the historical “air gap” separating industrial control systems from enterprise networks meant that factories and shipyards were more or less immune to cyber-attack. As long as systems were air-gapped it didn’t matter how pernicious or effective the cyber-threat became, we felt confident that these virtual concerns couldn’t impact our physical infrastructure.
https://www.securityweek.com/troubled-waters-how-new-wave-cyber-attacks-targeting-maritime-trade

11-05-18 – News This Past Week

USB threat vector trends and implications for industrial operators
In an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to transfer patches, updates and files to those systems
https://www.helpnetsecurity.com/2018/11/02/industrial-usb-threats/

Researchers find Stuxnet, Mirai, WannaCry lurking in industrial USB drives
When we consider threats to our industrial systems, specifically crafted malware, such as the Industroyer strain which cut off the power to the city of Kiev in Ukraine for an hour, often comes to mind
https://www.zdnet.com/article/almost-half-of-usb-drives-in-industrial-settings-pose-severe-security-risk/

USB Drives Deliver Dangerous Malware to Industrial Facilities: Honeywell
Malware is still being delivered to industrial facilities via USB removable storage devices and some threats can cause significant disruptions, according to a report published on Thursday by Honeywell
https://www.securityweek.com/usb-drives-deliver-dangerous-malware-industrial-facilities-honeywell

Sauter Quickly Patches Flaw in Building Automation Software
A serious vulnerability that allows an attacker to steal files from an affected system has been found by a researcher in a building automation product from Swiss-based Fr. Sauter AG. It took the vendor only 10 days to release a patch.
https://www.securityweek.com/sauter-quickly-patches-flaw-building-automation-software

ICS Devices Vulnerable to Side-Channel Attacks
Side-channel attacks can pose a serious threat to industrial control systems (ICS), a researcher warned last month at SecurityWeek’s ICS Cyber Security Conference in Atlanta, GA
https://www.securityweek.com/ics-devices-vulnerable-side-channel-attacks-researcher

Cyberattacks Against Energy Sector Are Higher Than Average
Attacks against critical infrastructure industries such as those targeting the energy supply — actual and potential — are rarely out of the news. Russia and Russian state actors are the probable aggressors. But we are still in the Cold War era of attacks against energy utilities. There has been no cyber related-successful attack against the supply of energy in the United States.
https://www.securityweek.com/cyberattacks-against-energy-sector-are-higher-average-report

Cyberattacks against energy and utilities firms begin inside enterprise IT networks
New research from Vectra has revealed that while industrial control systems are being targeted by hackers, most cyberattacks against energy and utilities firms occur inside enterprise IT networks
https://www.techradar.com/news/cyberattacks-against-energy-and-utilities-firms-begin-inside-enterprise-it-networks

Many water and energy systems vulnerable to significant cyber risk
New Trend Micro research revealed how exposed human machine interface (HMI) systems in thousands of critical water and energy organizations around the world could be exploited, causing significant real-world impacts, such as contaminating the water supply.
https://www.helpnetsecurity.com/2018/10/31/vulnerable-critical-systems/

Internet-Exposed HMIs Put Energy, Water Facilities at Risk
Malicious actors could cause serious damage to organizations in the energy and water sectors by targeting their human-machine interfaces (HMIs), according to a report released by Trend Micro on Tuesday
https://www.securityweek.com/internet-exposed-hmis-put-energy-water-facilities-risk-report

IoT Flaw Allows Hijacking of Connected Construction Cranes
A connected construction crane, from Telecrane, has a vulnerability that would allow cyberattackers to intercept its communications and take the equipment over.
https://threatpost.com/iot-flaw-allows-hijacking-of-connected-construction-cranes/138648/

IoT Now Top Internet Attack Target
A new threat analysis report shows that IoT devices are now the primary target of criminals working on the Internet. And those criminals are learning and adapting their tactics to meet the improved defenses being put into place
https://www.darkreading.com/attacks-breaches/new-report-iot-now-top-internet-attack-target/d/d-id/1333147

The Seven Leading Security Gaps in Industrial Environments
October is officially National Cyber Security Awareness month, and this year one of the program’s key messages is working together to secure critical infrastructure from cyber threats
https://www.securityweek.com/seven-leading-security-gaps-industrial-environments

10-29-18 – News This Past Week

FDA strengthens medical device cybersecurity program
The FDA recently took additional steps to encourage better medical device cybersecurity, including releasing a cybersecurity playbook for healthcare organizations
https://searchhealthit.techtarget.com/feature/FDA-strengthens-medical-device-cybersecurity-program

What a crane in the ass: Bug leaves construction machinery vulnerable to evil command injection
US-CERT is advising some customers of Telecrane construction cranes to patch their control systems – following the disclosure of a security bug that could allow a nearby attacker to wirelessly hijack the equipment.
https://www.theregister.co.uk/2018/10/25/crane_command_vulnerability/

How to protect enterprise ICS networks with firewalls
ICS network security can be improved using firewalls. Expert Ernie Hayden explains how ICS-specific firewalls can help keep ICS networks strong and protected
https://searchsecurity.techtarget.com/tip/How-to-protect-enterprise-ICS-networks-with-firewalls

10-24-18 – News This Past Week

FireEye: Russian Research Lab Aided the Development of TRITON Industrial Malware
Cybersecurity firm FireEye claims to have discovered evidence that proves the involvement of a Russian-owned research institute in the development of the TRITON malware that caused some industrial systems to unexpectedly shut down last year, including a petrochemical plant in Saudi Arabia.
https://thehackernews.com/2018/10/russia-triton-ics-malware.html

Russia was likely behind dangerous critical infrastructure attack, report says
The malware, alternately dubbed Triton and Trisis, was most likely designed to cause physical damage inside critical infrastructure sites, such as gas refineries and chemical plants, FireEye researchers said in a report published in December.
https://arstechnica.com/information-technology/2018/10/russia-was-likely-behind-dangerous-critical-infrastructure-attack-report-says/

Plaintext Passwords Often Put Industrial Systems at Risk
Plaintext passwords crossing the network, outdated operating systems, direct connections to the Internet, and the lack of automated updates for security solutions often put industrial systems at risk of attacks, according to a new report published on Tuesday by industrial cybersecurity firm CyberX.
https://www.securityweek.com/plaintext-passwords-often-put-industrial-systems-risk-report

The Danger and Opportunity in 5G Connectivity and IoT
The IoT is already rife with security issues resulting from poor incentives to fix vulnerabilities. At the same time, we are spiraling closer towards a hyper-connected world with the increasing momentum around 5G infrastructure. As telecommunications organizations build more infrastructure for 5G networks, we can expect to see wider adoption of IoT devices and an increase in the impact of the threats they pose.
https://threatpost.com/the-danger-and-opportunity-in-5g-connectivity-and-iot/138493/

Grave TCP/IP flaws in FreeRTOS leave IoT gear open to mass hijacking
Commandeered equipment – think Internet-of-Things sensors and gizmos, and automotive and industrial systems – can then be used to, say, spy on owners, siphon data out of a network, launch other cyber-attacks, and so on.
https://www.theregister.co.uk/2018/10/22/freertos_iot_platform_security_flaws/

AWS FreeRTOS Bugs Allow Compromise of IoT Devices
The bugs could allow hackers to crash connected devices in smart homes or critical infrastructure systems, leak information from the devices’ memory, and take them over. And while patches have been issued, researchers warn that it still may take time for smaller vendors to update.
https://threatpost.com/aws-freertos-bugs-allow-compromise-of-iot-devices/138455/

New Security Woes for Popular IoT Protocols
They found that the widely used device-to-device communications protocols contained inherent security weaknesses, especially in the way they are implemented in IoT devices – exposing flaws that could allow attackers to execute denial-of-service (DoS) attacks on devices or gain remote control of industrial IoT or consumer IoT devices for cyber espionage or worse.
https://www.darkreading.com/vulnerabilities—threats/new-security-woes-for-popular-iot-protocols/d/d-id/1333069

FBI Investigates Attack on Critical Water Utility
According to a media release from Onslow Water and Sewer Authority (ONWASA) issued on October 15, 2018, a critical water utility in North Carolina was targeted in a cyber-attack. Federal and state officials are now working with the water utility as part of the investigation into the attack on some of its computer systems.
https://www.infosecurity-magazine.com/news/fbi-investigates-attack-on/

Vulnerable controllers could allow attackers to manipulate marine diesel engines
These security flaws could be exploited by attackers to change the firmware and configuration files, install malware, and perform actions that effectively allow them to take control of a vessel’s engines
https://www.helpnetsecurity.com/2018/10/18/manipulate-marine-diesel-engines/

Medical device maker Medtronic finally fixes its hackable pacemaker
The company said in a notice this week that it’s switching off the software distribution network after researchers found that a hacker could update the pacemaker’s software with malicious software that could manipulate the impulses that regulate a patient’s heartbeat. The researchers, Jonathan Butts and Billy Rios, revealed the vulnerability at the Black Hat conference in August, more than a year after first reporting the vulnerability to Medtronic
https://techcrunch.com/2018/10/16/medical-device-maker-medtronic-finally-fixes-its-hackable-pacemaker/

GreyEnergy group targeting critical infrastructure with espionage
BlackEnergy has been terrorizing Ukraine for years and rose to prominence in December 2015 when they caused a blackout that left 230,000 people without electricity – the first-ever blackout caused by a cyberattack. Around the time of that incident, ESET researchers began detecting another malware framework named GreyEnergy.
https://www.helpnetsecurity.com/2018/10/17/greyenergy-group/

In County Crippled by Hurricane, Water Utility Targeted in Ransomware Attack
The Onslow Water and Sewer Authority (ONWASA) said in a Monday release that a “sophisticated ransomware attack… has left the utility with limited computer capabilities.” While customer data was not compromised as part of the attack, the lack of computing ability will impact the timeliness of service from ONWASA “for several weeks to come.”
https://threatpost.com/in-county-crippled-by-hurricane-water-utility-targeted-in-ransomware-attack/138327/

Remote Code Implantation Flaw Found in Medtronic Cardiac Programmers
A flaw in Medtronic’s CareLink 2090 and CareLink Encore 29901 programmers, which are portable computer systems used to manage implanted cardiac devices in clinical settings, would have allowed remote code implantation over Medtronic’s dedicated Software Deployment Network (SDN).
https://threatpost.com/remote-code-implantation-flaw-found-in-medtronic-cardiac-programmers/138363/

FDA Warns of Flaws in Medtronic Programmers
A vulnerability in the software update process of certain Medtronic Programmer models has determined the vendor to block the functionality on affected devices, the U.S. Food and Drug Administration (FDA) informs.
https://www.securityweek.com/fda-warns-flaws-medtronic-programmers

Feds Investigate After Hackers Attack Water Utility
The head of the Onslow Water and Sewer Authority said in a news release Monday that its internal computer system, including servers and personal computers, were subjected to what was characterized as “a sophisticated ransomware attack.”
https://www.securityweek.com/feds-investigate-after-hackers-attack-water-utility

NotPetya Linked to Industroyer Attack on Ukraine Energy Grid
The massive NotPetya ransomware outbreak that crippled organizations around the world last year turns out to have links to the Industroyer backdoor, which targets industrial control systems (ICS) and took down the Ukrainian power grid in Kiev in 2016
https://threatpost.com/notpetya-linked-to-industroyer-attack-on-ukraine-energy-grid/138287/

10-15-18 – News This Past Week

The future of OT security in modern industrial operations
Both the likelihood and consequences of cyberattacks to OT/ICS components continue to grow for modern industrial operations
https://www.helpnetsecurity.com/2018/10/15/future-ot-security/

It’s the real Heart Bleed: Medtronic locks out vulnerable pacemaker programmer kit
The watchdog’s alert this week comes after Irish medical device maker Medtronic said it will lock some of its equipment out of its software update service, meaning the hardware can’t download and install new code from its servers
https://www.theregister.co.uk/2018/10/12/medtronic_pacemaker_programmer_security/

Internet Hacking Is About to Get Much Worse
The risks are about to get worse, because computers are being embedded into physical devices and will affect lives, not just our data. Security is not a problem the market will solve. The government needs to step in and regulate this increasingly dangerous space.
https://www.nytimes.com/2018/10/11/opinion/internet-hacking-cybersecurity-iot.html

The Better Way: Threat Analysis & IIoT Security
Threat analysis offers a more nuanced and multidimensional approach than go/no-go patching in the Industrial Internet of Things. But first, vendors must agree on how they report and address vulnerabilities.
https://www.darkreading.com/perimeter/the-better-way-threat-analysis-and-iiot-security-/a/d-id/1332983

New Pentagon Weapons Systems Easily Hacked: Report
The Government Accountability Office said the Pentagon was unaware of how easy it could be for an adversary to gain access to the computer brains and software of the weapons systems and operate inside them undetected
https://www.securityweek.com/new-pentagon-weapons-systems-easily-hacked-report

Many Siemens Products Affected by Foreshadow Vulnerabilities
The security holes could allow malicious applications to obtain potentially sensitive information from a device’s memory, including data associated with operating systems, apps and virtual machines
https://www.securityweek.com/many-siemens-products-affected-foreshadow-vulnerabilities

Constructing the Future of ICS Cybersecurity
As industrial control systems are connected to the cloud and the IoT, experts discuss security challenges
https://www.darkreading.com/perimeter/constructing-the-future-of-ics-cybersecurity/d/d-id/1332995

Security Vulnerabilities in US Weapons Systems
The US Government Accounting Office just published a new report: “Weapons Systems Cyber Security: DOD Just Beginning to Grapple with Scale of Vulnerabilities” (summary here). The upshot won’t be a surprise to any of my regular readers: they’re vulnerable
https://www.schneier.com/blog/archives/2018/10/security_vulner_17.html

Report: US weapons systems are highly vulnerable to cyber attacks
The Department of Defense will have to ramp up its cybersecurity efforts now that it’s planning to spend $1.66 trillion to develop major weapons systems. According to a new report (PDF) by the Government Accountability Office, nearly all of Pentagon’s weapons systems are vulnerable to cyberattacks
https://www.engadget.com/2018/10/10/pentagon-weapons-systems-gao-report/

10-08-18 – News This Past Week

DHS Warns of Threats to Precision Agriculture
Relying on various embedded and connected technologies to improve agricultural and livestock management, precise agriculture is exposed to vulnerabilities and cyber-threats, a new report from the United States Department of Homeland Security (DHS) warns
https://www.securityweek.com/dhs-warns-threats-precision-agriculture

California bans default passwords on any internet-connected device
In less than two years, anything that can connect to the internet will come with a unique password — that is, if it’s produced or sold in California. The “Information Privacy: Connected Devices” bill that comes into effect on January 1, 2020, effectively bans pre-installed and hard-coded default passwords. It only took the authorities about two weeks to approve the proposal made by the state senate
https://www.engadget.com/2018/10/05/california-default-password-ban-information-privacy-connected-devices-bill/

New Splunk IoT Solution Helps Secure ICS
Splunk for Industrial IoT, expected to become available on October 30, combines the capabilities of Splunk Enterprise, Splunk Industrial Asset Intelligence, and the Splunk Machine Learning Toolkit.
https://www.securityweek.com/new-splunk-iot-solution-helps-secure-ics

How Shodan helps identify ICS cybersecurity vulnerabilities
Shodan can be a helpful tool for security pros to locate ICS cybersecurity vulnerabilities. Expert Ernie Hayden explains how Shodan works and how it can be used for security
https://searchsecurity.techtarget.com/tip/How-Shodan-helps-identify-ICS-cybersecurity-vulnerabilities

U.S. Energy Department Invests Another $28 Million in Cybersecurity
The U.S. Department of Energy on Monday announced that it’s investing up to $28 million in tools and technologies that will improve the resilience and cybersecurity of the power grid and oil and gas infrastructure
https://www.securityweek.com/us-energy-department-invests-another-28-million-cybersecurity

10-01-18 – News This Past Week

California’s new laws bolster security for connected devices
California just raised the baseline for security in the Internet of Things… to a degree. Governor Jerry Brown has signed very similar Assembly and Senate bills that require hardware makers to include “reasonable” security measures for connected devices
https://www.engadget.com/2018/09/30/california-connected-device-laws/

‘Torii’ Breaks New Ground For IoT Malware
Stealth, persistence mechanism and ability to infect a wide swath of devices make malware dangerous and very different from the usual Mirai knockoffs, Avast says.
https://www.darkreading.com/attacks-breaches/-torii-breaks-new-ground-for-iot-malware/d/d-id/1332930

Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks
Many organizations are not necessarily aware of the large number of IoT devices they are already using and how IoT devices may affect cybersecurity and privacy risks differently than conventional information technology (IT) devices do
https://csrc.nist.gov/publications/detail/nistir/8228/draft

Hackers are finding creative ways to target connected medical devices
Hackers are leveraging error messages from connected medical devices — including radiology, X-ray and other imaging systems — to gain valuable insights, according to Zingbox. These insights are then used to refine the attacks, increasing the chance of successful hack
https://www.helpnetsecurity.com/2018/09/28/target-connected-medical-devices/

Vulnerabilities and architectural considerations in industrial control systems
The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about SCADA vulnerabilities in ICS architectures
https://www.helpnetsecurity.com/2018/09/28/scada-vulnerabilities-ics/

No Patches for Critical Flaws in Fuji Electric Servo System, Drives
ICS-CERT and Trend Micro’s Zero Day Initiative (ZDI) this week disclosed the existence of several unpatched vulnerabilities affecting servo systems and drives from Japanese electrical equipment company Fuji Electric
https://www.securityweek.com/no-patches-critical-flaws-fuji-electric-servo-system-drives

Researchers See Improvements in Vehicle Cybersecurity
Since 2013, IOActive has spent thousands of hours every year analyzing vehicle cybersecurity, and the company has published several research papers on this topic. A report made available in 2016 showed that half of the flaws found at the time had an impact level of critical (25%) or high (25%).
https://www.securityweek.com/researchers-see-improvements-vehicle-cybersecurity

Owning Security in the Industrial Internet of Things
Why IIoT leaders from both information technology and line-of-business operations need to join forces to develop robust cybersecurity techniques that go beyond reflexive patching
https://www.darkreading.com/threat-intelligence/owning-security-in-the-industrial-internet-of-things/a/d-id/1332876

09-24-18 – News This Past Week

Legitimate RATs Pose Serious Risk to Industrial Systems
A report published on Friday by the security firm reveals that, on average, in the first half of 2018, legitimate RATs were found on more than two-thirds of computers used for industrial control systems (ICS).
https://www.securityweek.com/legitimate-rats-pose-serious-risk-industrial-systems

Rockwell Automation Patches Severe Flaws in Communications Software
RSLinx Classic is a widely used piece of software that allows organizations to connect Logix5000 programmable automation controllers to various Rockwell applications, including for data acquisition, programming, HMI interaction, and configuration apps. The product is used worldwide, mainly in the energy, critical manufacturing, and water and wastewater systems sectors
https://www.securityweek.com/rockwell-automation-patches-severe-flaws-communications-software

Threats posed by using RATs in ICS
Based on our analysis of KSN statistics, we were able to identify a number of attacks and malware infection attempts involving RATs installed on ICS computers. In most cases, attacks were based on the following scenarios (in the descending order of attack incidence)
https://securelist.com/threats-posed-by-using-rats-in-ics/88011/

Key weapon for closing IoT-era cybersecurity gaps? Artificial intelligence
As businesses struggle to combat increasingly sophisticated cybersecurity attacks, the severity of which is exacerbated by both the vanishing IT perimeters in today’s mobile and IoT era, and an acute shortage of skilled security professionals, IT security teams need a both a new approach and powerful new tools.
https://www.helpnetsecurity.com/2018/09/19/iot-era-cybersecurity-gaps/

Malicious hacking activity increasingly targeting critical infrastructure
In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about how the traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value
https://www.helpnetsecurity.com/2018/09/19/maliciuos-hacking-activity-increasingly-targeting-critical-infrastructure/

The Top 5 Security Threats & Mitigations for Industrial Networks
While vastly different than their IT counterparts, operational technology environments share common risks and best practices
https://www.darkreading.com/endpoint/the-top-5-security-threats-and-mitigations-for-industrial-networks-/a/d-id/1332816

Malware Samples Targeting IoT More Than Double in 2018
It’s no secret that connected devices are posing a security threat in the commercial, consumer and industrial worlds. A fresh report on this expanding threat landscape shows that attacks are accelerating, with MikroTik routers, Telnet password-cracking and the Mirai botnet dominating the proceedings
https://threatpost.com/threatlist-malware-samples-targeting-iot-more-than-double-in-2018/137528/

New trends in the world of IoT threats
Cybercriminals’ interest in IoT devices continues to grow: in H1 2018 we picked up three times as many malware samples attacking smart devices as in the whole of 2017. And in 2017 there were ten times more than in 2016. That doesn’t bode well for the years ahead
https://securelist.com/new-trends-in-the-world-of-iot-threats/87991/

09-17-18 – News This Past Week

Global market for smart city platforms expected to reach $755 million by 2027
Driven by Internet of Things (IoT) deployments, as well as other smart technologies, smart city platforms provide the integrated capability to coordinate data, applications, and services at one or more levels across operational domains for multiple stakeholders
https://www.helpnetsecurity.com/2018/09/12/smart-city-platforms/

BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid
We demonstrate that an Internet of Things (IoT) botnet of high wattage devices–such as air conditioners and heaters–gives a unique ability to adversaries to launch large-scale coordinated attacks on the power grid. In particular, we reveal a new class of potential attacks on power grids called the Manipulation of demand via IoT (MadIoT) attacks that can leverage such a botnet in order to manipulate the power demand in the grid
https://www.usenix.org/conference/usenixsecurity18/presentation/soltan

California bill regulates IoT for first time in US
The State legislature approved ‘SB-327 Information privacy: connected devices’ last Thursday and handed it over to the Governor to sign. The legislation introduces security requirements for connected devices sold in the US. It defines them as any device that connects directly or indirectly to the internet and has an IP or Bluetooth address. That covers an awful lot of devices
https://nakedsecurity.sophos.com/2018/09/13/california-bill-regulates-iot-for-first-time-in-us/

Supermicro servers fixed after insecure firmware updating discovered
Researchers have sounded a warning about the security of Baseboard Management Controllers (BMCs) – a critical component that datacentres depend on to manage servers.
https://nakedsecurity.sophos.com/2018/09/10/supermicro-servers-fixed-after-insecure-firmware-updating-discovered/

Google’s Android Team Finds Serious Flaw in Honeywell Devices
Members of Google’s Android team discovered that some of Honeywell’s Android-based handheld computers are affected by a high severity privilege escalation vulnerability. The vendor has released software updates that should address the flaw
https://www.securityweek.com/googles-android-team-finds-serious-flaw-honeywell-devices

Forcepoint Launches Critical Infrastructure Business Unit
The new unit will be led by David Hatchell, who has been named vice president of Critical Infrastructure. Hatchell, who previously led critical infrastructure units at Belden and Intel/McAfee, will report to Sean Berg, senior vice president and general manager for Forcepoint’s Global Governments and Critical Infrastructure business
https://www.securityweek.com/forcepoint-launches-critical-infrastructure-business-unit

Leveraging Segmentation to Secure IoT
The rapid deployment of IoT devices has had a significant and lasting impact on the security of today’s evolving network. BYOD, the first significant infusion of IoT devices begun over a decade, was focused mainly on user-owned devices such as mobile phones and laptops
https://www.securityweek.com/leveraging-segmentation-secure-iot

Flaws Found in Fuji Electric Tool That Links Corporate PCs to ICS
Several vulnerabilities rated “high severity” have been discovered by researchers in Fuji Electric V-Server. The vendor has released updates that should address the flaws
https://www.securityweek.com/flaws-found-fuji-electric-tool-links-corporate-pcs-ics

09-09-18 – News These Past Two Weeks

Malware Found on USB Drives Shipped With Schneider Solar Products
Schneider Electric recently informed customers that some of the USB flash drives shipped by the company with its Conext ComBox and Conext Battery Monitor products were infected with malware
https://www.securityweek.com/malware-found-usb-drives-shipped-schneider-solar-products

Finding the Middle Ground: Securing Smart Cities
High-profile cyberattacks and data breaches have become somewhat of a norm. You’ve likely heard this before: it’s no longer a question of if an attack will happen but when. We expect ‘always on’ connectivity with access to business data and this means that the clear boundaries of the traditional security perimeter are fading fast
https://www.securityweek.com/finding-middle-ground-securing-smart-cities

Take (Industrial) Control: A Look at the 2018 ICS Threat Landscape
Industrial control systems (ICS) are increasingly being targeted as attackers take advantage of the Internet to target machines on organizations’ industrial networks
https://www.darkreading.com/risk/take-(industrial)-control-a-look-at-the-2018-ics-threat-landscape/d/d-id/1332754

ThreatList: Attacks on Industrial Control Systems on the Rise
The main source of infection was the internet – with 27 percent of attacks received from web sources. Another 8.4 percent arrived through removable storage media, and a surprisingly small 3.8 percent came from email clients
https://threatpost.com/threatlist-attacks-on-industrial-control-systems-on-the-rise/137251/

Malware on ICS Increasingly Comes From Internet: Kaspersky
Kaspersky Lab products installed on industrial automation systems have detected over 19,000 malware samples in the first half of 2018, and the company has determined that the Internet is an increasingly significant source of attacks
https://www.securityweek.com/malware-ics-increasingly-comes-internet-kaspersky

IT security teams are being locked out of IoT projects
Trend Micro revealed that organizations around the world are exposing themselves to unnecessary cyber risk by failing to give IT security teams a voice when planning IoT project deployments in enterprise environments
https://www.helpnetsecurity.com/2018/09/06/iot-projects-security/

Flaw in Schneider PLC Allows Significant Disruption to ICS
A vulnerability discovered in some of Schneider Electric’s Modicon programmable logic controllers (PLCs) may allow malicious actors to cause significant disruption to industrial control systems (ICS).
https://www.securityweek.com/flaw-schneider-plc-allows-significant-disruption-ics

Remotely exploitable flaw in Schneider Electric PLCs is a danger to OT networks
A vulnerability in the Schneider Electric Modicon M221, a programmable logic controller (PLC) deployed in commercial industrial facilities worldwide, can be exploited to remotely disconnected the device from communicating in the ICS network.
https://www.helpnetsecurity.com/2018/09/06/remotely-exploitable-flaw-schneider-electric-plc/

Threat Landscape for Industrial Automation Systems in H1 2018
In February, Kaspersky Lab ICS CERT published a report on an investigation into the initial infection tactics used by the notorious APT group Energetic Bear/Crouching Yeti, as well as the results of an analysis of several web servers compromised by the group in 2016 and early 2017, using information provided by the server owners
https://securelist.com/threat-landscape-for-industrial-automation-systems-in-h1-2018/87913/

Endpoints a Top Security Concern for Industrial Organizations: IIoT Survey
The SANS Institute recently published a research study of Industrial IoT (IIoT) security. The survey polled more than 200 security professionals from energy, utility, oil and gas, and manufacturing organizations. Among the key findings, the majority of respondents reported they are more concerned about endpoint device security, than network security
https://www.securityweek.com/endpoints-top-security-concern-industrial-organizations-iiot-survey

Phillips plugs security flaws in e-Alert tool
Dutch tech company Phillips has fixed several serious security flaws in Philips e-Alert, a tool that helps magnetic resonance imaging (MRI) systems work as intended
https://www.helpnetsecurity.com/2018/09/04/philips-e-alert-vulnerabilities/

Critical Flaws in Syringe Pump, Device Gateways Threaten Patient Safety
Flaws in the Qualcomm Life Capsule Datacaptor Terminal Server and the Becton Dickinson (BD) Alaris TIVA Syringe Pump have been acknowledged by the vendors and publicly disclosed via ICS-CERT
https://threatpost.com/critical-flaws-in-syringe-pump-device-gateways-threaten-patient-safety/137067/

High-Severity Flaws Patched in Schneider Electric Products
The two flaws, which exist in Schneider Electric’s power management system, PowerLogic PM5560, and its programmable logic controller, Modicon M221, can be exploited remotely, according to dual advisories released by ICS-CERT on Tuesday
https://threatpost.com/high-severity-flaws-patched-in-schneider-electric-products/137034/

How hard-coded credentials threaten industrial control systems
Hard-coded credentials open industrial control systems up to unauthorized access by malicious actors. Expert Ernie Hayden explains the threat and what enterprises can do about it
https://searchsecurity.techtarget.com/tip/How-hard-coded-credentials-threaten-industrial-control-systems

Old “Misfortune Cookie” flaw opens medical gateway and devices to attack
A vulnerability in Qualcomm Life Capsule Datacaptor Terminal Server (DTS) can be easily exploited to allow attackers to execute unauthorized code to obtain administrator-level privileges on the device.
https://www.helpnetsecurity.com/2018/08/29/medical-gateway-device-vulnerability/

NIST’s New Advice on Medical IoT Devices
Medical infusion pumps, which deliver medications to patients, are archetypal examples of the expanding threat surface being delivered by connected devices. Connecting these pumps to clinical systems can improve healthcare delivery, but if not properly secured could endanger the patient and expose the health delivery organization (HDO) infrastructure to intrusion
https://www.securityweek.com/nists-new-advice-medical-iot-devices

Emerging consensus for an ICS security approach
An increasing body of experience with industrial control system (ICS) security, as well as the emerging Industrial Internet of Things (IIoT) are driving a new consensus as to the difference between information technology (IT) and operations technology (OT) / ICS security programs
https://www.helpnetsecurity.com/2018/08/27/ics-security-approach/