Posts for category: ICS Cybersecurity

Targeted Attacks on Industrial Control Systems

(By: Edgar Namoca on September 3, 2020) Introduction On June 8, 2020 Honda of Japan was a victim of the snake ransomware attack also known as EKANS[2].  EKANS is a Windows ransomware that ...

Maritime Hacking

(By: Josh Balentine on March 3, 2019) The national maritime transportation services provide millions of Americans with employment at ports and port related industries every year and contributes ...

Industrial Gateways Vulnerable to Attack

(By: Josh Balentine on March 2, 2019) This month researchers with the cybersecurity firm Applied Risk, discovered vulnerabilities within the Kunbus PR100088 Modbus gateway that allows attackers to ...

SICAM 230 Process Control System (PCS) Vulnerabilities

(By: Josh Balentine on February 16, 2019) The company Siemens is one of the top suppliers for electrical engineering and electronic related products. The company provides various products that are ...

Industrial Control Systems Security Influences Electric Car Companies

     Automotive companies that produce electric vehicles such as Tesla, BMW, and Nissan are being inspired by strategies that have been created for critical infrastructure systems to secure ...

Radio Frequency (RF) Protocols Exploited by Remote Hackers

     Construction sites, shipyards, ports, and manufacturing sites utilizes RF to control the industrial equipment on their site for day to day operations. The cybersecurity firm Trend Micro has ...

Electric Vehicle Charging Station Vulnerabilities

Source: evchargesolution.com This week several vulnerabilities were reported in EVlink charging stations manufactured by Schneider Electric, that service electric vehicles. EVlink provides ...

ICS Summary for Week of September 14

Crafting Modbus Packets Industrial Control Systems (ICS) operate on a different set of protocols from what the public generally uses. These protocols are becoming more integrated into existing ...

ICS Summary for Week of February 2nd

[caption id="attachment_6982" align="alignright" width="216"] Source: SecurityWeek[/caption] Gemalto Licensing Tool Vulnerability It has come to light this week that vulnerabilities have been ...

ICS Summary for Week of January 26th

Trisis (Triton) Overview The Trisis Malware (also referred to as Triton and HatMan) is not a new piece of malware this week. It was discovered last August in a Saudi Arabian oil and gas plant. It ...