While the cybercrime ecosystem usually conjures a 21st Century online bazaar for buying and selling credit card numbers, some hackers possess loftier goals.
Attackers stepped into a honeypot environment that was set up by Cybereason to emulate a gateway to a power substation of a major electricity provider in the U.S. shortly after credential became available on the dark web. In fact, an actual power company’s name was placed on the xDedic listing for the virtual machine that could take the buyer from what appeared to be the facility’s information technology environment to its operational technology (OT), which the buyer was led to believe could cause physical damage if acted upon.
Cybereason advises power companies, so it had firsthand knowledge of how to replicate such an environment with an actual network blueprint that showed its inner workings.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.