We hear a lot about vulnerabilities in industrial control system (ICS) software. In fact, that's all we seem to hear about these days. The truth is: there's a lot to write about. In just the last month, the Department of Homeland Security's ICS-CERT warned its members about the ability of sophisticated - and even unskilled - attackers to use tools like the Shodan and ERIPP search engines to locate and attack vulnerable industrial control systems (PDF) that are accessible from the public Internet. In the meantime, every couple of weeks brings revelations about serious and remotely exploitable software holes. Most recently, ICS-CERT warned about a critical vulnerability EOScada (PDF), a Windows-based Energy Management System that is used to configure and manage intelligent electronic devices (IEDs) used in electrical, water, sewage and gas applications.
Systems with access to industrial automation systems are among those listed on support forums for those struggling with malware infe...
To read the full post subscribe and log in. Subscription is free and you can register below. Alreayd a member? Log in below!
New users register here
Existing members login here