🔥 SmidMart Best Sellers Are Here!
Discover the most trusted industrial automation components – handpicked by experts and loved by our customers.
✅ Top-rated PLCs, Sensors, Meters & More
✅ Guaranteed Quality & Performance
✅ Ready to Ship – Limited Stock!
🛒 Don’t miss out – Shop now at SmidMart
📞 8956167814
#SmidMart #BestSellers #IndustrialAutomation #PLCs #Sensors #FactoryEssentials #ShopNow #AutomationMadeEasy
Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls
https://gbhackers.com/iocontrol-iot-attack/
#Infosec #Security #Cybersecurity #CeptBiro #Hackers #IoT #OT #Malware #IOCONTROL #IPCameras #Routers #PLCs #HMIs #Firewalls
Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in Israel and the US,
@landley @DavittoKun Again: Simplicity on it's own has value!
https://infosec.space/@OS1337/111795968531113076
I don't expect OS/1337 to become the major #Desktop OS or even put a significant dent into #Yocto #Linux's marketshare.
But I'd rather want to see it as something that drives #CriticalInfrastructure like #MedicalIT, #PowerGrids and #PLCs instead of cringeworthy #Bloatware like #Windows that is laced with so much #Govware that we can truly say #Microsoft is incompetent...
http://www.youtube.com/watch?v=SGmtP5Lg_t0#t=6m20s
In the end, it may end up like #AlpineLinux but to be fair I want to basically find a sweet spot between #mkroot-level simplicity and most modern distros with some basic quality-of-life additions that one can choose (or not!) to use.
Like a really basic package manager that takes away the hassle of "build it yourself" if one trusts me...
https://github.com/OS-1337/spm
OFC that could be self-hosted internally...
@landley@mstdn.jp @DavittoKun@mastodon.social *nodds in agreement* The same reasons are why I want OS/1337 to be a better minimalist OS: Because if I ever want the #PocketCrypto and/or #Cryptofon to succeed, I've to convince people that wear a tinfoil-lined hazmat suit and have 25X security spechalists on speeddial that make Schneier and Snowden look like Skiddies to trust that whole thing. And like NORAD it basically boils down to "personell hours are expensive" and "the less code there is to audit the easier it is to do so"... Having a clean slate even if it's just a piece of sheetmetal on top of Euro-Pallets is sufficient as table. I don't need fancy handcarved on a spindle feet!
You know shits about to get super real when #DavidMuir is reporting about it on #ABCWorldNewsTonight
A #PumpStation in #Aliquippa #Pennsylvania was hacked by #IranianHackers simply because they used electronics made in #Israel. Obviously, they were just probing to gain #intel for a future attack against a larger critical infrastructure target. Thankfully, no one was hurt, and the town's water supply isn't tainted. The #hackers even threatened that "Israel-made gear is fair game" pointing to continued aggressions.
Woke up to an advisory from #CISA on #UnitronicPLCs using in Water and Wastewater Systems: Cyber threat actors are targeting #PLCs associated with #WWS facilities, including an identified Unitronics PLC, at a U.S. water facility.
#cyberwar #criticalinfrastructure #IsraelHamaswar #PatchYourSystems
R. Ma et al., "Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study"¹
Programmable Logic Controllers (PLCs) are the core control devices in Industrial Control Systems (ICSs), which control and monitor the underlying physical plants such as power grids. PLCs were initially designed to work in a trusted industrial network, which however can be brittle once deployed in an Internet-facing (or penetrated) network. Yet, there is a lack of systematic empirical analysis of the run-time security of modern real-world PLCs. To close this gap, we present the first large-scale measurement on 23 off-the-shelf PLCs across 13 leading vendors. We find many common security issues and unexplored implications that should be more carefully addressed in the design and implementation. To sum up, the unsupervised logic applications can cause system resource/privilege abuse, which gives adversaries new means to hijack the control flow of a runtime system remotely (without exploiting memory vulnerabilities); 2) the improper access control mechanisms bring many unauthorized access implications; 3) the proprietary or semi-proprietary protocols are fragile regarding confidentiality and integrity protection of run-time data. We empirically evaluated the corresponding attack vectors on multiple PLCs, which demonstrates that the security implications are severe and broad. Our findings were reported to the related parties responsibly, and 20 bugs have been confirmed with 7 assigned CVEs.
Programmable Logic Controllers (PLCs) are the core control devices in Industrial Control Systems (ICSs), which control and monitor the underlying physical plants such as power grids. PLCs were initially designed to work in a trusted industrial network, which however can be brittle once deployed in an Internet-facing (or penetrated) network. Yet, there is a lack of systematic empirical analysis of the run-time security of modern real-world PLCs. To close this gap, we present the first large-scale measurement on 23 off-the-shelf PLCs across 13 leading vendors. We find many common security issues and unexplored implications that should be more carefully addressed in the design and implementation. To sum up, the unsupervised logic applications can cause system resource/privilege abuse, which gives adversaries new means to hijack the control flow of a runtime system remotely (without exploiting memory vulnerabilities); 2) the improper access control mechanisms bring many unauthorized access implications; 3) the proprietary or semi-proprietary protocols are fragile regarding confidentiality and integrity protection of run-time data. We empirically evaluated the corresponding attack vectors on multiple PLCs, which demonstrates that the security implications are severe and broad. Our findings were reported to the related parties responsibly, and 20 bugs have been confirmed with 7 assigned CVEs.