Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Architecture

DHS Report on Anonymous Warns of Potential Industrial Control Threat

Anonymous Targeting Industrial Control Systems

Anonymous Targeting Industrial Control Systems

On Monday, the Public Intelligence Project released a NCCIC (National Cybersecurity and Communications Integration Center) memo written last month that flags interest in Industrial Control Systems by Anonymous. While there is clear interest, the DHS doubts that the loosely associative group currently has the skills to seriously disrupt ICS stability.

“The loosely organized hacking collective known as Anonymous has recently expressed an interest in targeting industrial control systems (ICS). While Anonymous recently expressed intent to target ICS, they have not demonstrated a capability to inflict damage to these systems,” the bulletin says.

“The information available on Anonymous suggests they currently have a limited ability to conduct attacks targeting ICS. However, experienced and skilled members of Anonymous in hacking could be able to develop capabilities to gain access and trespass on control system networks very quickly.”

In the NCCIC  memo, the DHS focused on was a Twitter message that published the results of “browsing the directory tree for Siemens SIMATIC software.”

“The posted xml and html code reveals that the individual understands the content of the code in relation to common hacking techniques to obtain elevated privileges. It does not indicate knowledge of ICS; rather, it indicates that the individual has interest in the application software used in control systems,” the bulletin explained.

In short, the data posted to Twitter was likely selected to cause panic, as it offered just enough detail that anyone who knows ICS setup and design would take notice. Likewise, the memo said there is no evidence of an actual breach of any ICS systems.

 

Related Reading: Industrial Control Systems Security One Year After Stuxnet

Related Reading: Bridging the Air Gap: Examining Attack Vectors into Industrial Control Systems

Related Reading: Are Industrial Control Systems Secure?

Related Reading: How to Make the Smart Grid Smarter than Cyber Attackers

Related Reading: The Increasing Importance of Securing The Smart Grid

Related Reading: Stuck on Stuxnet – Are Grid Providers Prepared for Future Assaults?

 

Written By

Click to comment

Expert Insights

Related Content

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Big-game malware hunters at Volexity are shining the spotlight on a sophisticated Chinese APT caught recently exploiting a Sophos firewall zero-day to plant backdoors...

Endpoint Security

Apple has launched a new security research blog and website, which will also be the new home of the company’s bug bounty program.

Incident Response

Implementation of security automation can be overwhelming, and has remained a barrier to adoption

Application Security

Cybersecurity powerhouse Palo Alto Networks on Thursday announced plans to spend $195 million in cash to acquire Israeli startup Cider Security, a deal that...