• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   SCADA

Sandworm to Blacken: The SCADA Connection

  • Posted on:October 16, 2014 at 4:15 pm
  • Posted in:Internet of Things, Malware, Targeted Attacks
  • Author:
    Kyle Wilhoit and Jim Gogolinski (Senior Threat Researcher)
2

On October 14th, a report was publicly released regarding the Sandworm team.  After beginning an investigation into the affiliated malware samples and domains, we quickly came to realization that this group is very likely targeting SCADA-centric victims who are using GE Intelligent Platform’s CIMPLICITY HMI solution suite.   We have observed this team utilizing .cim and .bcl…

Read More
Tags: CIMPLICITYsandwormSCADAzero day

Is the Internet of Everything Under Attack?

  • Posted on:January 5, 2014 at 4:48 pm
  • Posted in:Exploits, Internet of Things, Malware, Mobile
  • Author:
    Robert McArdle (Senior Threat Researcher)
0

The “Internet of Everything” (also known as the Internet of Things) became one of the biggest technology buzzwords of 2013, as can easily be seen in Google Trends. This term refers to the increased digitisation of everyday objects – any new technology device is being designed with connectivity in mind, whether that device is a smart…

Read More
Tags: Augmented RealityGoogle GlassInternet of ThingsSCADASteam Machine

2014 Predictions: Blurring Boundaries

  • Posted on:December 8, 2013 at 7:43 pm
  • Posted in:CTO Insights
  • Author:Raimund Genes (Chief Technology Officer)
0

The past year has been an interesting one in the world of cyber security. Mobile malware has become a large-scale threat, government surveillance has users asking “does privacy still exist?”, cybercrime continues to steal money from individuals and businesses, and new targets for hackers like AIS and SCADA have been identified. 2013 was many things,…

Read More
Tags: 2014AISMobilepredictionsSCADAtargeted attacksXP

The SCADA That Cried Wolf: Who Is Really Attacking Your ICS Devices Part 2

  • Posted on:August 27, 2013 at 1:25 am
  • Posted in:Targeted Attacks
  • Author:
    Kyle Wilhoit (Senior Threat Researcher)
0

The concern on ICS/SCADA security gained prominence due to high-profile attacks targeting these devices, most notably Flame and Stuxnet. However, we noted recent findings, which prove that the interest in ICS/SCADA devices as attack platforms is far from waning. We’ve all read about how insecure ICS/SCADA devices are and how certain threat actors are targeting…

Read More
Tags: APTattackdata breachFlameICSSCADAsecurityStuxnet

Protecting Your ICS/SCADA Environment

  • Posted on:July 2, 2013 at 12:41 pm
  • Posted in:Targeted Attacks
  • Author:
    Kyle Wilhoit (Senior Threat Researcher)
0

Recently, I spoke at the Forum of Incident Response and Security Teams (FIRST) in Bangkok, Thailand on threat intelligence and incident response. The mantra throughout FIRST was “sharing to win”, the concept of which echoes throughout security got me to thinking about information sharing in the ICS/SCADA security arena. This idea of sharing thoughts and…

Read More
Tags: FlameICSSCADAStuxnet
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.