[1] Cybersecurity and Infrastructure
Security Agency. (2022 11 10). ICS
Advisory (ICSA-22-314-07). Retrieved December 1, 2022, from https://www.cisa.gov/uscert/ics/advisories/icsa-22-314-07
[2] Cybersecurity and Infrastructure
Security Agency. (2022 11 10). ICS
Advisory (ICSA-22-314-08). Retrieved December 1, 2022, from https://www.cisa.gov/uscert/ics/advisories/icsa-22-314-08
[3] Omron. (2022 07 01). Authentication bypass vulnerabilities in
communications functions of NJ/NX-series Machine Automation Controllers. Retrieved
on December 1, 2022, from https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf
[4] Omron. (2022 07 01). Malicious program execution vulnerability in
NJ/NXseries Machine Automation Controllers. Retrieved on December 1, 2022,
from https://www.ia.omron.com/product/vulnerability/OMSR-2022-002_en.pdf
[5] Kovacs, E. (2022 11 18). Omron PLC Vulnerability Exploited by
Sophisticated ICS Malware. Retrieved December 1, 2022, from https://www.securityweek.com/omron-plc-vulnerability-exploited-sophisticated-ics-malware
[6] Kovacs, E. (2022 04 14). Russia-Linked Pipedream/Incontroller ICS
Malware Designed to Target Energy Facilities. Retrieved December 1, 2022,
from https://www.securityweek.com/russia-linked-pipedreamincontroller-ics-malware-designed-target-energy-facilities
[7] Cybersecurity and Infrastructure
Security Agency. (2022 4 13). APT Cyber
Tools Targeting ICS/SCADA Devices. Retrieved December 1, 2022, from https://www.cisa.gov/uscert/ncas/alerts/aa22-103a
[8] Dragos. (2022 10 27). Analyzing PIPEDREAM: Results from Runtime
Testing. Retrieved December 1, 2022, from https://www.dragos.com/blog/analyzing-pipedream-results-from-runtime-testing/