Critical Infrastructure News, Articles and Updates

NIAC members resign, saying president has under-prioritized cybersecurity

Eight members of the National Infrastructure Advisory Council said Trump had given "insufficient attention" to cybersecurity threats.

Attackers used template injection technique to steal credentials of power plant operators

The hackers responsible for breaching the systems of multiple U.S. energy operators since May 2017 employed a phishing scheme that used malicious attachments to download a template file via an SMB connection, in order to silently harvest credentials, according to a blog post from Cisco Talos.

Reports: Feds issue alert after adversary breaches power plant business networks

Since May, foreign hackers have breached computer networks at 12 or more U.S. power plants, including nuclear facilities, prompting the FBI and DHS to issue an urgent amber warning to utility companies, according to reports.

Kaspersky: Banks, manufacturers, oil and gas utilities roughly 82% of NotPetya's corporate victims

Kaspersky further reported that 60 percent of NotPetya infections took place in Ukraine, while Russia experienced just over 30 percent.

Russia blamed for DDoS attacks on Baltic Power grid

The Lithuanian, Latvian and Estonian power grids have all been targeted by Russia undergoing a series of limited Distributed Denial of Service (DDoS) over the last few years that may be probing for weaknesses.

Study: Infections of industrial systems common, but few are targeted

Approximately 3,000 unique industrial sites per year are randomly infected with generic malware, while attacks involving malware specifically designed to target industrial control systems are far less common, according to a study.

Energy facilities may become main target of cyber-attacks in Russia

It's estimated that power companies in Russia suffered more than 350 serious cyber-attacks in 2016, a 50 percent increase on the previous year.

Researchers tentatively link Greenbug cyberspy group to Saudi Shamoon attackers

Researchers may have found a tenuous link between a cyberespionage organization's credentials-stealing trojan and the Shamoon hacking group that's been targeting Saudi energy companies with Disttrack disk-wiping malware.

DHS designates election systems as critical infrastructure, under 'Government Facilities' category

Secretary of Homeland Security Jeh Johnson on Friday officially declared the U.S. electoral system as critical infrastructure.

New variant of KillDisk wiper threatens industrial control networks with ransomware

The KillDisk disk-wiper program that was used in conjunction with BlackEnergy malware to attack Ukrainian energy utilities now includes a ransomware component, according to researchers at CyberX.

Breach risk assessment reveals attackers' favorite techniques

A network breach risk assessment of over 20 organizations found that 100 percent showed signs of traffic tunneling, DNS-related exfiltration and malformed protocols in outbound traffic - all indicators of attackers using evasion and exfiltration techniques.

Stealing steel's secrets: Industrial conglomerate ThyssenKrupp breached by pro hackers

Professional hackers infiltrated the systems of Germany-based industrial conglomerate ThyssenKrupp earlier this year, stealing intellectual property, research and secrets.

Is your incident response team ready?

One of the best ways to test incident readiness is a tabletop exercise, a mock incident administered for senior leadership, IT, security, legal, corporate communications and business line readiness.

How BlackNurse DoS uses a single laptop to take your business down

The BlackNurse DOS attack uses ICMP messages to clog up firewalls with traffic.

Lansing, Mich., utility admits paying ransomware demand

Officials with the Lansing Board of Water & Light publicly acknowledged on Tuesday that the utility paid $25,000 to regain control of its accounting and email systems in the days following an April 25 ransomware attack.

DDoS attack could disrupt voter turnout, report

The DDoS attacks that shuttered the Dyn DNS service on Oct. 21 set a precedent that could disrupt the presidential election next week, according to a report from Imperva Incapsula.

IAEA director: cyberattack against a nuclear power plant occurred years ago

International Atomic Energy Agency's (IAEA) director Yukiya Amano said there was a successful cyberattack of a nuclear power plant two to three years ago.

IP EXPO: Kaspersky speaks on CNI and says we're living in 'scary times'

Eugene Kaspersky, CEO of Kaspersky Lab speaks at IP EXPO Europe 2016 and explains why he believes cyber-attackers are now turning their attention to critical national infrastructure.

BIND update fixes high-severity flaw affecting ICS, as CERT releases update to CSET tool

ISC released an update Tuesday for a high-severity security flaw affecting open source software that implements DNS protocols.

End-of-support devices on networks weakening cyberdefenses, report

Nearly three-quarters of businesses have end-of-support devices operating in their networks, and the consequences could prove dire, a new study found.

State officials warn Congress: don't damage public confidence in election systems

An association of state officials has published an open letter that seeks to strengthen public confidence in the electoral process, in light of research that has raised questions about the security of voting machines.

Cyber space wars may require new international regimes

While it might not include the Death Star cyber warfare among the stars is almost inevitable.

Can one CISO ever beat an army of IoT devices?

The security threat from the Internet of Things (IoT) has grown real because far too many of those sneaky IoT devices fly in under the radar. Corporate maintenance, facilities and operations departments are not accustomed to requesting IT's signoff on purchasing light bulbs or door locks. And yet, when those devices have their own independent - or dependent - communications capabilities, they are an easy backdoor for cyberthieves.