• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   ICS

Water and Energy Sectors Through the Lens of the Cybercriminal Underground

  • Posted on:November 29, 2018 at 4:58 am
  • Posted in:Internet of Things
  • Author:
    Trend Micro
0

In our research Exposed and Vulnerable Critical Infrastructure: Water and Energy Industries, we not only found exposed industrial control system (ICS) human machine interfaces (HMIs) but also pointed out how these systems were at risk. This risk is corroborated by the active interest in water and energy ICSs shown by different kinds of cybercriminal groups.

Read More
Tags: critical infrastructuresICSiiotindustrial internet of thingsinternet of thingsIOT

Disrupting the Flow: Exposed and Vulnerable Water and Energy Infrastructures

  • Posted on:October 30, 2018 at 2:45 am
  • Posted in:Internet of Things
  • Author:
    Trend Micro
0

Energy and water are two of the most central critical infrastructures (CIs). Both sectors have undergone necessary changes to reflect the latest in technology and improve how natural resources are harnessed and distributed. At present, these changes are heading toward more interconnected systems, especially through the integration of industrial internet of things (IIoT) technologies.

Read More
Tags: ICSiiotIOT

Compromising Industrial Robots: The Fallacy of Industrial Routers in the Industry 4.0 Ecosystem

  • Posted on:May 3, 2017 at 5:10 am
  • Posted in:Internet of Things
  • Author:
    Federico Maggi (Senior Threat Researcher)
0

The increased connectivity of computer and robot systems in the industry 4.0. ecosystem, is, and will be exposing robots to cyber attacks in the future. Indeed, industrial robots—originally conceived to be isolated—have evolved, and are now exposed to corporate networks and the internet.

While this provides synergy effects and higher efficiency in production, the security posture is not on par. In our latest report Rogue Robots: Testing the Limits of an Industrial Robot’s Security we analyzed how easily an industrial grade robot could be actually ”hacked”. We demonstrated how easily an attacker is able to alter an industrial robot’s accuracy without changing the program code so that that minor defects can be (maliciously) introduced into work pieces. Needless to say, defective products can have repercussions on the production floor and, depending on the security and QA practices of the target factory, may have some financial consequences down the line.

Read More
Tags: ICSindustrial robotindustrial securityrouters

Leaking Beeps: Are You In Control Of Your Own Automation?

  • Posted on:October 25, 2016 at 5:00 am
  • Posted in:Targeted Attacks
  • Author:
    Stephen Hilt (Senior Threat Researcher)
0

Industrial Control Systems (ICS) are a hot topic in the security industry today, thanks to the prevalence of software that is often riddled with security flaws and legacy protocols that were designed without any type of security. Many of these systems were designed in a different time, when the world was quite different. ICS systems used to be isolated, Internet access was rare and expensive, and hacking knowledge was not as widespread as it is today. It would be very difficult for a programmer to have foreseen some of the security issues that have now come about. As a result, however, this often translates to cases where solutions are developed to get the most out of the system while maintaining a cost-conscious mindset. As a result, there are cases where software and protocols that were never meant to be part of an ICS system end up as part of such a system.

Read More
Tags: ICSIndustrial Control Systemspager technologypagersSDRSoftware Defined Radio

The SCADA That Cried Wolf: Who Is Really Attacking Your ICS Devices Part 2

  • Posted on:August 27, 2013 at 1:25 am
  • Posted in:Targeted Attacks
  • Author:
    Kyle Wilhoit (Senior Threat Researcher)
0

The concern on ICS/SCADA security gained prominence due to high-profile attacks targeting these devices, most notably Flame and Stuxnet. However, we noted recent findings, which prove that the interest in ICS/SCADA devices as attack platforms is far from waning. We’ve all read about how insecure ICS/SCADA devices are and how certain threat actors are targeting…

Read More
Tags: APTattackdata breachFlameICSSCADAsecurityStuxnet
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.