¡Es turno de Igor Pallin un año más! En su charla "PLC LAN Party: Sistemas Obsoletos y Redes Caóticas" nos presentará los resultados de un análisis a diferentes niveles de cinco PLCs de marcas líderes #ESCVIII #PLCs #Reversing

🔥 SmidMart Best Sellers Are Here!
Discover the most trusted industrial automation components – handpicked by experts and loved by our customers.

✅ Top-rated PLCs, Sensors, Meters & More
✅ Guaranteed Quality & Performance
✅ Ready to Ship – Limited Stock!

🛒 Don’t miss out – Shop now at SmidMart
📞 8956167814

#SmidMart #BestSellers #IndustrialAutomation #PLCs #Sensors #FactoryEssentials #ShopNow #AutomationMadeEasy

Smidmart – Your Industrial Automation Journey Starts Here!
Shop PLCs, HMIs, sensors & more. Fast delivery & trusted brands.
🌐 www.smidmart.com?utm_source=mastodon&utm_medium=Zoho+Social%0A%F0%9F%93%9E
📞 8956167814
#Smidmart #IndustrialAutomation #PLCs #HMI
🧐 DID YOU KNOW?
💡 PLCs power industrial automation with high reliability & zero downtime! Built for 24/7 operations, they enhance
🔍 Shop PLCs here: https://zurl.co/PJjRr
#IndustrialAutomation #PLCs #SmartManufacturing #AutomationSolutions #ProcessControl #FactoryAutomation
PLC

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls
https://gbhackers.com/iocontrol-iot-attack/

#Infosec #Security #Cybersecurity #CeptBiro #Hackers #IoT #OT #Malware #IOCONTROL #IPCameras #Routers #PLCs #HMIs #Firewalls

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in Israel and the US,

GBHackers Security | #1 Globally Trusted Cyber Security News Platform

@landley @DavittoKun Again: Simplicity on it's own has value!
https://infosec.space/@OS1337/111795968531113076

I don't expect OS/1337 to become the major #Desktop OS or even put a significant dent into #Yocto #Linux's marketshare.

But I'd rather want to see it as something that drives #CriticalInfrastructure like #MedicalIT, #PowerGrids and #PLCs instead of cringeworthy #Bloatware like #Windows that is laced with so much #Govware that we can truly say #Microsoft is incompetent...
http://www.youtube.com/watch?v=SGmtP5Lg_t0#t=6m20s

In the end, it may end up like #AlpineLinux but to be fair I want to basically find a sweet spot between #mkroot-level simplicity and most modern distros with some basic quality-of-life additions that one can choose (or not!) to use.

Like a really basic package manager that takes away the hassle of "build it yourself" if one trusts me...
https://github.com/OS-1337/spm

OFC that could be self-hosted internally...

OS/1337 (@OS1337@infosec.space)

@landley@mstdn.jp @DavittoKun@mastodon.social *nodds in agreement* The same reasons are why I want OS/1337 to be a better minimalist OS: Because if I ever want the #PocketCrypto and/or #Cryptofon to succeed, I've to convince people that wear a tinfoil-lined hazmat suit and have 25X security spechalists on speeddial that make Schneier and Snowden look like Skiddies to trust that whole thing. And like NORAD it basically boils down to "personell hours are expensive" and "the less code there is to audit the easier it is to do so"... Having a clean slate even if it's just a piece of sheetmetal on top of Euro-Pallets is sufficient as table. I don't need fancy handcarved on a spindle feet!

Infosec.Space

You know shits about to get super real when #DavidMuir is reporting about it on #ABCWorldNewsTonight

A #PumpStation in #Aliquippa #Pennsylvania was hacked by #IranianHackers simply because they used electronics made in #Israel. Obviously, they were just probing to gain #intel for a future attack against a larger critical infrastructure target. Thankfully, no one was hurt, and the town's water supply isn't tainted. The #hackers even threatened that "Israel-made gear is fair game" pointing to continued aggressions.

Woke up to an advisory from #CISA on #UnitronicPLCs using in Water and Wastewater Systems: Cyber threat actors are targeting #PLCs associated with #WWS facilities, including an identified Unitronics PLC, at a U.S. water facility.

https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems

#cyberwar #criticalinfrastructure #IsraelHamaswar #PatchYourSystems

🌘 Stuxnet:一個針對工業控制系統的複雜病毒
➤ 探討Stuxnet的攻擊方式、時間軸、感染統計、架構、安裝、控制命令、Windows Rootkit功能、傳播方法、修改PLCs、載荷輸出、變體等
https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf
Stuxnet是一個針對工業控制系統的複雜病毒,其最終目標是重新編程可編程邏輯控制器(PLCs)以達到攻擊者的目的,並隱藏這些更改。該病毒使用了許多不同的組件和功能,包括零日漏洞、Windows Rootkit、第一個PLC Rootkit、防病毒躲避技術、複雜的進程注入和掛鉤代碼、網絡感染例程、點對點更新和命令和控制界面。本文將深入探討Stuxnet的各個組件,以了解該威脅的詳細工作方式。
+ Stuxnet是一個非常危險的病毒,因為它針對的是工業控制系統,可能會導致災難性後果。我們需要加強對這些系統的保護
#Stuxnet #病毒 #工業控制系統 #PLCs #Windows Rootkit #傳播方法 #載荷輸出 #變體
«A Widespread Logic Controller Flaw Raises the Specter of #Stuxnet» -
More than 120 models of Siemens’ S7-1500 PLCs contain a serious vulnerability—and no fix is on the way. #ICS #SCADA #ICSSecurity #PLCs https://www.wired.com/story/siemens-s7-1500-logic-controller-flaw/
A Siemens S7-1500 Logic Controller Flaw Raises the Specter of Stuxnet

More than 120 models of Siemens' S7-1500 PLCs contain a serious vulnerability—and no fix is on the way.

WIRED

R. Ma et al., "Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study"¹

Programmable Logic Controllers (PLCs) are the core control devices in Industrial Control Systems (ICSs), which control and monitor the underlying physical plants such as power grids. PLCs were initially designed to work in a trusted industrial network, which however can be brittle once deployed in an Internet-facing (or penetrated) network. Yet, there is a lack of systematic empirical analysis of the run-time security of modern real-world PLCs. To close this gap, we present the first large-scale measurement on 23 off-the-shelf PLCs across 13 leading vendors. We find many common security issues and unexplored implications that should be more carefully addressed in the design and implementation. To sum up, the unsupervised logic applications can cause system resource/privilege abuse, which gives adversaries new means to hijack the control flow of a runtime system remotely (without exploiting memory vulnerabilities); 2) the improper access control mechanisms bring many unauthorized access implications; 3) the proprietary or semi-proprietary protocols are fragile regarding confidentiality and integrity protection of run-time data. We empirically evaluated the corresponding attack vectors on multiple PLCs, which demonstrates that the security implications are severe and broad. Our findings were reported to the related parties responsibly, and 20 bugs have been confirmed with 7 assigned CVEs.

#ResearchPapers #arXiv #SCADA #ICS #PLCs

__
¹ https://arxiv.org/abs/2212.14296

Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study

Programmable Logic Controllers (PLCs) are the core control devices in Industrial Control Systems (ICSs), which control and monitor the underlying physical plants such as power grids. PLCs were initially designed to work in a trusted industrial network, which however can be brittle once deployed in an Internet-facing (or penetrated) network. Yet, there is a lack of systematic empirical analysis of the run-time security of modern real-world PLCs. To close this gap, we present the first large-scale measurement on 23 off-the-shelf PLCs across 13 leading vendors. We find many common security issues and unexplored implications that should be more carefully addressed in the design and implementation. To sum up, the unsupervised logic applications can cause system resource/privilege abuse, which gives adversaries new means to hijack the control flow of a runtime system remotely (without exploiting memory vulnerabilities); 2) the improper access control mechanisms bring many unauthorized access implications; 3) the proprietary or semi-proprietary protocols are fragile regarding confidentiality and integrity protection of run-time data. We empirically evaluated the corresponding attack vectors on multiple PLCs, which demonstrates that the security implications are severe and broad. Our findings were reported to the related parties responsibly, and 20 bugs have been confirmed with 7 assigned CVEs.

arXiv.org