Critical Infrastructure | SC Media

Critical Infrastructure

Iranian hackers targeting critical infrastructure

Dragos acquires NexDefense to bolster ICS defense capability

By

Dragos has acquired the industrial control system (ICS) visibility technology firm NexDefense and has announced the availability of a suite of tools for companies to assess their ICS security. No financial or organizational details on the deal were released. “This is a mainly a technology acquisition, however a majority of the engineering team is joining…

Protecting the Critical Infrastructure from cyber warfare

By

Cyber attacks are hard to prevent. A cyberattack against our nation’s critical infrastructure (CI) is especially hard to thwart and could have devastating consequences to our human existence. Most everyone is aware of the catastrophic risk the electrical grid faces from a cyberattack. To put it in perspective, a complete outage of the electrical grids…

Layering EMV chip, tokenization, encryption bolsters card payment security

Chip and PIN protections may fall short as future threats materialize

By

The protections that chip and PIN payment card solutions offer may fall short as cybercriminals begin installing command-and-control malware on infected EMV device readers, a new report warns. Cybercriminals could begin repurposing ATM EMV malware to attack retail environments by infecting point-of-sale (POS) machines (possibly via malicious USB drives) and then introducing an altered EMV…

Shamoon disk wiper attack on Saipem signals new affront against energy sector, Middle Eastern interests

By

The malware used to disrupt the global operations of Italian energy contractor Saipem S.p.A. earlier this week was none other than Shamoon, a disk wiper that’s been used in two prior attacks against Saudi interests. Saipem identified Shamoon as the culprit in a Dec. 12 news release that updated its previously vague disclosure of the incident.…

‘Sharpshooter’ cyberespionage campaign scopes out defense, critical infrastructure sectors

By

A global phishing campaign called Operation Sharpshooter was discovered using fake job recruitment documents to infect defense, government and critical infrastructure organizations with a malicious backdoor implant, presumably for cyber espionage purposes. The implant, nicknamed Rising Sun, was observed in least 87 impacted organizations over the course of October and November, McAfee Labs reported today…

Cyberattack sidelines Middle East servers of Italian energy contractor Saipem

By

Italian oil and gas industry contractor Saipem S.p.A. has reportedly confirmed that a Monday cyberattack impacted its servers and infrastructure in the Middle East as well as in Scotland. The specific nature of the attack has not yet been shared, but Saipem’s head of digital and innovation Mauro Piasere said that it originated from Chennai,…

Cybercriminal phishing campaign spoofs Russian critical infrastructure domains

By

A cybercriminal phishing operation designed to infect victims with a malicious backdoor was recently discovered using command-and-control domains that intentionally spoofed the real-life domains of various Russian critical infrastructure firms. The campaign’s focus on critical infrastructure at first gave it the appearance of an APT-sponsored cyberespionage operation, but upon closer inspection, the motivation appears to…

Nation-states, terrorists place critical infrastructure in their cross-hairs

By Steve Durbin, managing director, Information Security Forum Over the coming years, the very foundations of today’s digital world will shake. Innovative and determined attackers, along with changes to the way organizations conduct their operations, will combine to threaten even the strongest establishments. Only those with vigorous preparations will stand tall. Nation states and terrorist…

No news on if Iran will retaliate yet...

Iran claims telecommunications infrastructure was attacked by Stuxnet variant

By

Iran officials are reportedly claiming that a variant of the Stuxnet worm that disrupted their country’s nuclear program in the late 2000s was used in an attack on their telecommunications infrastructure last week. Iran is publicly pointing the finger at Israel, while claiming to have successfully defended the attack, according to multiple news outlets, including…

Critical infrastructure attack

FireEye attributes TRITON ICS attack to Russian

By

The cybersecurity firm FireEye has attributed the source of the TRITON critical infrastructure intrusion to a Russian government-owned research institute. An unnamed critical infrastructure facility was involved in the TRITON attack. FireEye was able to backtrack the malware, now identified as TEMP.Veles, to Russia by testing other types of malicious software that were used in…

Next post in Network Security