Information Security News mailing list archives

BlackEnergy crimeware coursing through US control systems


From: InfoSec News <alerts () infosecnews org>
Date: Wed, 29 Oct 2014 09:45:30 +0000 (UTC)

http://www.theregister.co.uk/2014/10/29/blackenergy_crimeware_pwning_us_control_systems_cert_warns/

By Darren Pauli
The Register
29 Oct 2014

Industrial control systems in the United States have been compromised by the BlackEnergy malware toolkit for at least three years in a campaign the US Computer Emergency Response Team has dubbed "ongoing" and sophisticated.

Attackers had compromised unnamed industrial control system operators and implanted BlackEnergy on internet-facing human-machine interfaces including those from GE Cimplicity, Advantech/Broadwin WebAccess, and Siemens WinCC.

The latter system was often used by large plant operators including Iran's Natanz uranium facility at the time it was hosed by Stuxnet, however the latest attacks targeting the platform are suspected but not confirmed.

The CERT had not identified attempts to damage or disrupt system processes but had not verified if hackers had pivoted laterally across the victim networks.

[...]



--
Evident.io - Continuous Cloud Security for AWS.
Identify and mitigate risks in 5 minutes or less.
Sign up for a free trial @ https://evident.io/


Current thread: