<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: SCADA systems security issues</title>
	<atom:link href="http://www.epanorama.net/blog/2011/12/14/scada-systems-security-issues/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2011/12/14/scada-systems-security-issues/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 04 Apr 2026 09:03:13 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/12/14/scada-systems-security-issues/comment-page-6/#comment-1574448</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Dec 2017 07:20:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6640#comment-1574448</guid>
		<description><![CDATA[Jim Finkle / Reuters:
“Triton” malware, likely the work of a nation-state, found in Schneider Electric industrial safety systems often used in nuclear, oil and gas plants

Hackers halt plant operations in watershed cyber attack
https://www.reuters.com/article/us-cyber-infrastructure-attack/hackers-halt-plant-operations-in-watershed-cyber-attack-idUSKBN1E8271

Hackers likely working for a nation-state recently invaded the safety system of a critical infrastructure facility in a watershed attack that halted plant operations, according to cyber investigators and the firm whose software was targeted.

FireEye Inc (FEYE.O) disclosed the incident on Thursday, saying it targeted Triconex industrial safety technology from Schneider Electric SE (SCHN.PA).

Schneider confirmed that the incident had occurred and that it had issued a security alert to users of Triconex, which cyber experts said is widely used in the energy industry, including at nuclear facilities, and oil and gas plants.

Compromising a safety system could let hackers shut them down in advance of attacking other parts of an industrial plant, potentially preventing operators from identifying and halting destructive attacks, they said.

Safety systems “could be fooled to indicate that everything is okay,” even as hackers damage a plant

“This is a watershed,” said Sergio Caltagirone, head of threat intelligence with Dragos. “Others will eventually catch up and try to copy this kind of attack.”

The U.S. government and private cyber-security firms have issued public warnings over the past few years about attempts by hackers from nations including Iran, North Korea and Russia and others to attack companies that run critical infrastructure plants in what they say are primarily reconnaissance operations.

EcoStruxure™ Triconex Safety Systems
https://www.schneider-electric.com/b2b/en/products/industrial-automation-control/triconex-safety-systems/]]></description>
		<content:encoded><![CDATA[<p>Jim Finkle / Reuters:<br />
“Triton” malware, likely the work of a nation-state, found in Schneider Electric industrial safety systems often used in nuclear, oil and gas plants</p>
<p>Hackers halt plant operations in watershed cyber attack<br />
<a href="https://www.reuters.com/article/us-cyber-infrastructure-attack/hackers-halt-plant-operations-in-watershed-cyber-attack-idUSKBN1E8271" rel="nofollow">https://www.reuters.com/article/us-cyber-infrastructure-attack/hackers-halt-plant-operations-in-watershed-cyber-attack-idUSKBN1E8271</a></p>
<p>Hackers likely working for a nation-state recently invaded the safety system of a critical infrastructure facility in a watershed attack that halted plant operations, according to cyber investigators and the firm whose software was targeted.</p>
<p>FireEye Inc (FEYE.O) disclosed the incident on Thursday, saying it targeted Triconex industrial safety technology from Schneider Electric SE (SCHN.PA).</p>
<p>Schneider confirmed that the incident had occurred and that it had issued a security alert to users of Triconex, which cyber experts said is widely used in the energy industry, including at nuclear facilities, and oil and gas plants.</p>
<p>Compromising a safety system could let hackers shut them down in advance of attacking other parts of an industrial plant, potentially preventing operators from identifying and halting destructive attacks, they said.</p>
<p>Safety systems “could be fooled to indicate that everything is okay,” even as hackers damage a plant</p>
<p>“This is a watershed,” said Sergio Caltagirone, head of threat intelligence with Dragos. “Others will eventually catch up and try to copy this kind of attack.”</p>
<p>The U.S. government and private cyber-security firms have issued public warnings over the past few years about attempts by hackers from nations including Iran, North Korea and Russia and others to attack companies that run critical infrastructure plants in what they say are primarily reconnaissance operations.</p>
<p>EcoStruxure™ Triconex Safety Systems<br />
<a href="https://www.schneider-electric.com/b2b/en/products/industrial-automation-control/triconex-safety-systems/" rel="nofollow">https://www.schneider-electric.com/b2b/en/products/industrial-automation-control/triconex-safety-systems/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/12/14/scada-systems-security-issues/comment-page-6/#comment-1573181</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 04 Dec 2017 14:15:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6640#comment-1573181</guid>
		<description><![CDATA[Industrial Cybersecurity Startup SCADAfence Secures $10 Million
http://www.securityweek.com/industrial-cybersecurity-startup-scadafence-secures-10-million

Israeli industrial cybersecurity startup SCADAfence has secured $10 million in funding through a recently announced Series A round. 

The Tel Aviv-based company explains that it helps industrial network operators bridge the cybersecurity gap that comes when connecting operational technology (OT) and IT networks to ensure operational continuity and the security of valuable assets.

SCADAfence’s solutions provide visibility of day-to-day operations, detection of malicious cyber-attacks as well as non-malicious operational threats, and risk management tools.]]></description>
		<content:encoded><![CDATA[<p>Industrial Cybersecurity Startup SCADAfence Secures $10 Million<br />
<a href="http://www.securityweek.com/industrial-cybersecurity-startup-scadafence-secures-10-million" rel="nofollow">http://www.securityweek.com/industrial-cybersecurity-startup-scadafence-secures-10-million</a></p>
<p>Israeli industrial cybersecurity startup SCADAfence has secured $10 million in funding through a recently announced Series A round. </p>
<p>The Tel Aviv-based company explains that it helps industrial network operators bridge the cybersecurity gap that comes when connecting operational technology (OT) and IT networks to ensure operational continuity and the security of valuable assets.</p>
<p>SCADAfence’s solutions provide visibility of day-to-day operations, detection of malicious cyber-attacks as well as non-malicious operational threats, and risk management tools.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/12/14/scada-systems-security-issues/comment-page-6/#comment-1573177</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 04 Dec 2017 14:12:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6640#comment-1573177</guid>
		<description><![CDATA[Siemens Patches Several Flaws in Teleprotection Devices
http://www.securityweek.com/siemens-patches-several-flaws-teleprotection-devices

Siemens has patched several vulnerabilities, including authentication bypass and denial-of-service (DoS) flaws, in its SWT 3000 teleprotection devices.

The SWT 3000 teleprotection devices are designed for quickly identifying and isolating faults in high-voltage power grids. This Siemens product is used in the energy sector worldwide.

According to advisories published by both Siemens and ICS-CERT, medium severity vulnerabilities have been found in the EN100 Ethernet module used by SWT 3000 devices running IEC 61850 and TPOP firmware.

The flaws can be exploited to bypass authentication to the web interface and perform administrative operations (CVE-2016-7112, CVE-2016-7114), and cause devices to enter a DoS condition by sending specially crafted packets (CVE-2016-7113).

Flaws related to the product’s web server can be leveraged by a network attacker to obtain sensitive device information (CVE-2016-4784), and data from the device’s memory (CVE-2016-4785).

The security holes have been addressed in IEC 61850 firmware with the release of version 4.29.01. The TPOP firmware is affected by only three of the flaws. These have been fixed with the release of version 01.01.00.]]></description>
		<content:encoded><![CDATA[<p>Siemens Patches Several Flaws in Teleprotection Devices<br />
<a href="http://www.securityweek.com/siemens-patches-several-flaws-teleprotection-devices" rel="nofollow">http://www.securityweek.com/siemens-patches-several-flaws-teleprotection-devices</a></p>
<p>Siemens has patched several vulnerabilities, including authentication bypass and denial-of-service (DoS) flaws, in its SWT 3000 teleprotection devices.</p>
<p>The SWT 3000 teleprotection devices are designed for quickly identifying and isolating faults in high-voltage power grids. This Siemens product is used in the energy sector worldwide.</p>
<p>According to advisories published by both Siemens and ICS-CERT, medium severity vulnerabilities have been found in the EN100 Ethernet module used by SWT 3000 devices running IEC 61850 and TPOP firmware.</p>
<p>The flaws can be exploited to bypass authentication to the web interface and perform administrative operations (CVE-2016-7112, CVE-2016-7114), and cause devices to enter a DoS condition by sending specially crafted packets (CVE-2016-7113).</p>
<p>Flaws related to the product’s web server can be leveraged by a network attacker to obtain sensitive device information (CVE-2016-4784), and data from the device’s memory (CVE-2016-4785).</p>
<p>The security holes have been addressed in IEC 61850 firmware with the release of version 4.29.01. The TPOP firmware is affected by only three of the flaws. These have been fixed with the release of version 01.01.00.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/12/14/scada-systems-security-issues/comment-page-5/#comment-1570648</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 15 Nov 2017 12:00:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6640#comment-1570648</guid>
		<description><![CDATA[Flaw in Siemens RTU Allows Remote Code Execution
http://www.securityweek.com/flaw-siemens-rtu-allows-remote-code-execution

Potentially serious vulnerabilities have been found in some Siemens SICAM remote terminal unit (RTU) modules, but patches will not be released as the product has been discontinued.

Researchers at IT security services and consulting company SEC Consult discovered the flaws in the SICAM RTU SM-2556 COM modules, which can be attached to SICAM 1703 and RTU substation controllers for LAN/WAN communications. The product is used worldwide in the energy and other sectors.

The most serious of the security holes is CVE-2017-12739, a critical vulnerability in the integrated web server that allows an unauthenticated attacker with network access to remotely execute code on affected devices.

The vulnerabilities affect devices running firmware versions ENOS00, ERAC00, ETA2, ETLS00, MODi00 and DNPi00. Since the product has been discontinued, Siemens has decided not to release patches. However, users can prevent potential attacks by disabling the affected web server, which is designed for diagnostics and is not needed for normal operation.

In its own advisory, SEC Consult said it reported the vulnerabilities to Siemens in late September. According to the company, the GoAhead webserver used by the RTU module was released in October 2003 and it’s affected by several known vulnerabilities.]]></description>
		<content:encoded><![CDATA[<p>Flaw in Siemens RTU Allows Remote Code Execution<br />
<a href="http://www.securityweek.com/flaw-siemens-rtu-allows-remote-code-execution" rel="nofollow">http://www.securityweek.com/flaw-siemens-rtu-allows-remote-code-execution</a></p>
<p>Potentially serious vulnerabilities have been found in some Siemens SICAM remote terminal unit (RTU) modules, but patches will not be released as the product has been discontinued.</p>
<p>Researchers at IT security services and consulting company SEC Consult discovered the flaws in the SICAM RTU SM-2556 COM modules, which can be attached to SICAM 1703 and RTU substation controllers for LAN/WAN communications. The product is used worldwide in the energy and other sectors.</p>
<p>The most serious of the security holes is CVE-2017-12739, a critical vulnerability in the integrated web server that allows an unauthenticated attacker with network access to remotely execute code on affected devices.</p>
<p>The vulnerabilities affect devices running firmware versions ENOS00, ERAC00, ETA2, ETLS00, MODi00 and DNPi00. Since the product has been discontinued, Siemens has decided not to release patches. However, users can prevent potential attacks by disabling the affected web server, which is designed for diagnostics and is not needed for normal operation.</p>
<p>In its own advisory, SEC Consult said it reported the vulnerabilities to Siemens in late September. According to the company, the GoAhead webserver used by the RTU module was released in October 2003 and it’s affected by several known vulnerabilities.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/12/14/scada-systems-security-issues/comment-page-5/#comment-1553394</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jul 2017 13:20:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6640#comment-1553394</guid>
		<description><![CDATA[Intel AMT bug bit Siemens industrial PCs
Patches issued for 38 products, plus bonus Web portal bug-fix
https://www.theregister.co.uk/2017/07/03/intel_amt_bug_bit_siemens_industrial_pcs/

You don&#039;t need state-sponsored hackers to crack industrial control systems, just an empty Intel AMT login – something Siemens started patching against last week.

The bug in Intel&#039;s Active Management Technology emerged in June. It allowed a user to exploit AMT features with an empty login string, and has been shipping in processors since 2010.

In Siemens&#039;s case, 38 product series use vulnerable Intel chipsets (the company lists them in this PDF). They include SIMATIC industrial PCs, SINUMERIK control panels and SIMOTION P320 PCs.

The company has shipped patches for the SIMATIC PCs, but is still working on the control panel products.

https://support.industry.siemens.com/cs/document/109747626/updating-the-intel-management-engine-bios-extension-for-simatic-ipcs-and-simatic-field-pgs?dti=0&amp;lc=en-WW]]></description>
		<content:encoded><![CDATA[<p>Intel AMT bug bit Siemens industrial PCs<br />
Patches issued for 38 products, plus bonus Web portal bug-fix<br />
<a href="https://www.theregister.co.uk/2017/07/03/intel_amt_bug_bit_siemens_industrial_pcs/" rel="nofollow">https://www.theregister.co.uk/2017/07/03/intel_amt_bug_bit_siemens_industrial_pcs/</a></p>
<p>You don&#8217;t need state-sponsored hackers to crack industrial control systems, just an empty Intel AMT login – something Siemens started patching against last week.</p>
<p>The bug in Intel&#8217;s Active Management Technology emerged in June. It allowed a user to exploit AMT features with an empty login string, and has been shipping in processors since 2010.</p>
<p>In Siemens&#8217;s case, 38 product series use vulnerable Intel chipsets (the company lists them in this PDF). They include SIMATIC industrial PCs, SINUMERIK control panels and SIMOTION P320 PCs.</p>
<p>The company has shipped patches for the SIMATIC PCs, but is still working on the control panel products.</p>
<p><a href="https://support.industry.siemens.com/cs/document/109747626/updating-the-intel-management-engine-bios-extension-for-simatic-ipcs-and-simatic-field-pgs?dti=0&#038;lc=en-WW" rel="nofollow">https://support.industry.siemens.com/cs/document/109747626/updating-the-intel-management-engine-bios-extension-for-simatic-ipcs-and-simatic-field-pgs?dti=0&#038;lc=en-WW</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/12/14/scada-systems-security-issues/comment-page-5/#comment-1551517</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 17 Jun 2017 17:51:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6640#comment-1551517</guid>
		<description><![CDATA[[ICS] Trihedral VTScada Multiple Vulnerabilities
https://ipositivesecurity.com/2017/06/15/ics-trihedral-vtscada-multiple-vulnerabilities/

ICS-CERT published an advisory on one of my reports this week –
https://ics-cert.us-cert.gov/advisories/ICSA-17-164-01]]></description>
		<content:encoded><![CDATA[<p>[ICS] Trihedral VTScada Multiple Vulnerabilities<br />
<a href="https://ipositivesecurity.com/2017/06/15/ics-trihedral-vtscada-multiple-vulnerabilities/" rel="nofollow">https://ipositivesecurity.com/2017/06/15/ics-trihedral-vtscada-multiple-vulnerabilities/</a></p>
<p>ICS-CERT published an advisory on one of my reports this week –<br />
<a href="https://ics-cert.us-cert.gov/advisories/ICSA-17-164-01" rel="nofollow">https://ics-cert.us-cert.gov/advisories/ICSA-17-164-01</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/12/14/scada-systems-security-issues/comment-page-5/#comment-1551516</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 17 Jun 2017 17:50:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6640#comment-1551516</guid>
		<description><![CDATA[High Severity Flaws Patched in Trihedral SCADA Software
http://www.securityweek.com/high-severity-flaws-patched-trihedral-scada-software

An update released by Trihedral for its VTScada product patches several vulnerabilities, including high severity weaknesses that can be exploited even by less skilled hackers.

VTScada, Trihedral’s flagship product, is a software suite designed for creating human-machine interfaces (HMI) for supervisory control and data acquisition (SCADA) systems. The product is used in various industries, mainly in North America and Europe.

Security researcher Karn Ganeshen discovered several vulnerabilities affecting VTScada versions prior to 11.2.26. The expert told SecurityWeek that a Shodan search showed a few systems running VTScada accessible from the Internet, but he believes there are more vulnerable instances that are exposed to attacks.

In an advisory published on his website, Ganeshen said an attacker with a non-privileged account can cause excessive CPU and RAM usage by submitting a large payload (up to roughly 80,000 characters) in the username field of the login window.]]></description>
		<content:encoded><![CDATA[<p>High Severity Flaws Patched in Trihedral SCADA Software<br />
<a href="http://www.securityweek.com/high-severity-flaws-patched-trihedral-scada-software" rel="nofollow">http://www.securityweek.com/high-severity-flaws-patched-trihedral-scada-software</a></p>
<p>An update released by Trihedral for its VTScada product patches several vulnerabilities, including high severity weaknesses that can be exploited even by less skilled hackers.</p>
<p>VTScada, Trihedral’s flagship product, is a software suite designed for creating human-machine interfaces (HMI) for supervisory control and data acquisition (SCADA) systems. The product is used in various industries, mainly in North America and Europe.</p>
<p>Security researcher Karn Ganeshen discovered several vulnerabilities affecting VTScada versions prior to 11.2.26. The expert told SecurityWeek that a Shodan search showed a few systems running VTScada accessible from the Internet, but he believes there are more vulnerable instances that are exposed to attacks.</p>
<p>In an advisory published on his website, Ganeshen said an attacker with a non-privileged account can cause excessive CPU and RAM usage by submitting a large payload (up to roughly 80,000 characters) in the username field of the login window.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/12/14/scada-systems-security-issues/comment-page-5/#comment-1547417</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 17 May 2017 10:04:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6640#comment-1547417</guid>
		<description><![CDATA[ICS Environments: Insecure by Design
http://www.securityweek.com/ics-environments-insecure-design

ndustrial Control System Design Flaws Have a Profound Impact on Security Posture of Operational Networks

It’s a generally known fact that most Industrial Control System (ICS) environments were not built with cyber security in mind because they were designed before the cyber threat existed. For decades these networks were protected by an air-gap, disconnected from the outside world. With the introduction of commercial off the shelf (COTS) technology in the 1990s (which replaced proprietary, purpose-built industrial hardware and software) and the increasing connectivity to corporate networks and the Internet, these systems have become more exposed to cyber threats and the risk of compromise.

The impact of vulnerabilities and design flaws

Like IT networks, ICS environments are susceptible to software and hardware vulnerabilities. In recent years there has been a significant increase in the number of ICS vulnerabilities reported.

ICS networks have become easy targets because they lack basic security controls such as authentication, and do not support encrypted communication. In IT security terms, this represents a major design flaw that adversely impacts the overall security of the ICS environment. This means that anyone with network access can make changes to controller logic and configuration which can severely affect operations and have a catastrophic impact on plant safety and reliability.

Visibility and control in ICS networks

ICS networks suffer from a lack of visibility which prevents engineering and security staff from identifying a malicious actor compromising critical assets, or a contractor that may be making an unauthorized change to the configuration of a controller. Not knowing with certainty what’s happening in these networks severely impacts the staff’s ability to detect and respond to incidents, whether caused by cyber threats or human error. 

As long as security controls aren&#039;t available to prevent unauthorized/malicious changes, the design flaws of ICS will continue to affect their security posture and put them at a high risk of compromise. No amount of vulnerability remediation can prevent access to the controllers on ICS networks or mitigate the risk of compromise resulting from a lack of security controls.]]></description>
		<content:encoded><![CDATA[<p>ICS Environments: Insecure by Design<br />
<a href="http://www.securityweek.com/ics-environments-insecure-design" rel="nofollow">http://www.securityweek.com/ics-environments-insecure-design</a></p>
<p>ndustrial Control System Design Flaws Have a Profound Impact on Security Posture of Operational Networks</p>
<p>It’s a generally known fact that most Industrial Control System (ICS) environments were not built with cyber security in mind because they were designed before the cyber threat existed. For decades these networks were protected by an air-gap, disconnected from the outside world. With the introduction of commercial off the shelf (COTS) technology in the 1990s (which replaced proprietary, purpose-built industrial hardware and software) and the increasing connectivity to corporate networks and the Internet, these systems have become more exposed to cyber threats and the risk of compromise.</p>
<p>The impact of vulnerabilities and design flaws</p>
<p>Like IT networks, ICS environments are susceptible to software and hardware vulnerabilities. In recent years there has been a significant increase in the number of ICS vulnerabilities reported.</p>
<p>ICS networks have become easy targets because they lack basic security controls such as authentication, and do not support encrypted communication. In IT security terms, this represents a major design flaw that adversely impacts the overall security of the ICS environment. This means that anyone with network access can make changes to controller logic and configuration which can severely affect operations and have a catastrophic impact on plant safety and reliability.</p>
<p>Visibility and control in ICS networks</p>
<p>ICS networks suffer from a lack of visibility which prevents engineering and security staff from identifying a malicious actor compromising critical assets, or a contractor that may be making an unauthorized change to the configuration of a controller. Not knowing with certainty what’s happening in these networks severely impacts the staff’s ability to detect and respond to incidents, whether caused by cyber threats or human error. </p>
<p>As long as security controls aren&#8217;t available to prevent unauthorized/malicious changes, the design flaws of ICS will continue to affect their security posture and put them at a high risk of compromise. No amount of vulnerability remediation can prevent access to the controllers on ICS networks or mitigate the risk of compromise resulting from a lack of security controls.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/12/14/scada-systems-security-issues/comment-page-5/#comment-1547413</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 17 May 2017 10:01:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6640#comment-1547413</guid>
		<description><![CDATA[World Close to &#039;Serious Digital Sabotage&#039;: Dutch Spy Chief
http://www.securityweek.com/world-close-serious-digital-sabotage-dutch-spy-chief

The world may be close to a &quot;serious act of digital sabotage&quot; which could trigger unrest, &quot;chaos and disorder,&quot; Dutch spy chief Rob Bertholee warned Tuesday.

Sabotage of critical infrastructure &quot;is the kind of thing that might keep you awake at night,&quot; Bertholee told a timely cyber security conference in The Hague, as global experts grapple with the fallout of a massive cyberattack over the past days.

Digital threats &quot;are not imaginary, they are everywhere around us,&quot; the head of the country&#039;s intelligence services (AIVD) told the conference organised by the Dutch government.

&quot;In my opinion, we might be closer to a serious act of digital sabotage than a lot of people can imagine,&quot; he told hundreds of experts and officials.

The world&#039;s infrastructure was heavily interconnected, which had huge benefits, but also &quot;vulnerabilities&quot;.

&quot;Imagine what would happen if the entire banking system were sabotaged for a day, two days, for a week,&quot; he asked.

&quot;Or if there was a breakdown in our transportation network. Or if air traffic controllers faced cyberattacks while directing flights. The consequences could be catastrophic.&quot;

Added Bertholee: &quot;Sabotage on one of these sectors could have major public repercussions, causing unrest, chaos and disorder.&quot;

The threat of &quot;cyber terrorism&quot; from terror groups such as the so-called Islamic State jihadist and Al-Qaeda was still limited, he said, but &quot;jihadist-inspired terrorism is the number one priority&quot; of the Dutch intelligence services.

&quot;The level of technical expertise available to a jihadist group is still insufficient to inflict significant damage or personal injury through digital sabotage,&quot; Bertholee said.

&quot;They may not yet have the capability but they definitely have the intent,&quot; he warned.]]></description>
		<content:encoded><![CDATA[<p>World Close to &#8216;Serious Digital Sabotage&#8217;: Dutch Spy Chief<br />
<a href="http://www.securityweek.com/world-close-serious-digital-sabotage-dutch-spy-chief" rel="nofollow">http://www.securityweek.com/world-close-serious-digital-sabotage-dutch-spy-chief</a></p>
<p>The world may be close to a &#8220;serious act of digital sabotage&#8221; which could trigger unrest, &#8220;chaos and disorder,&#8221; Dutch spy chief Rob Bertholee warned Tuesday.</p>
<p>Sabotage of critical infrastructure &#8220;is the kind of thing that might keep you awake at night,&#8221; Bertholee told a timely cyber security conference in The Hague, as global experts grapple with the fallout of a massive cyberattack over the past days.</p>
<p>Digital threats &#8220;are not imaginary, they are everywhere around us,&#8221; the head of the country&#8217;s intelligence services (AIVD) told the conference organised by the Dutch government.</p>
<p>&#8220;In my opinion, we might be closer to a serious act of digital sabotage than a lot of people can imagine,&#8221; he told hundreds of experts and officials.</p>
<p>The world&#8217;s infrastructure was heavily interconnected, which had huge benefits, but also &#8220;vulnerabilities&#8221;.</p>
<p>&#8220;Imagine what would happen if the entire banking system were sabotaged for a day, two days, for a week,&#8221; he asked.</p>
<p>&#8220;Or if there was a breakdown in our transportation network. Or if air traffic controllers faced cyberattacks while directing flights. The consequences could be catastrophic.&#8221;</p>
<p>Added Bertholee: &#8220;Sabotage on one of these sectors could have major public repercussions, causing unrest, chaos and disorder.&#8221;</p>
<p>The threat of &#8220;cyber terrorism&#8221; from terror groups such as the so-called Islamic State jihadist and Al-Qaeda was still limited, he said, but &#8220;jihadist-inspired terrorism is the number one priority&#8221; of the Dutch intelligence services.</p>
<p>&#8220;The level of technical expertise available to a jihadist group is still insufficient to inflict significant damage or personal injury through digital sabotage,&#8221; Bertholee said.</p>
<p>&#8220;They may not yet have the capability but they definitely have the intent,&#8221; he warned.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/12/14/scada-systems-security-issues/comment-page-5/#comment-1542998</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 05 Apr 2017 08:19:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6640#comment-1542998</guid>
		<description><![CDATA[Schneider Electric still shipping passwords in firmware
You&#039;d think a vendor of critical infrastructure would at least pretend to care about security
https://www.theregister.co.uk/2017/04/05/schneider_istilli_shipping_passwords_in_firmware/

That “don&#039;t use hard-coded passwords” infosec rule? Someone needs to use a needle to write it on the corner of Schneider Electric&#039;s developers&#039; eyes so they don&#039;t forget it.

Yes, it&#039;s happened again, this time on the SCADA vendor&#039;s Schneider Modicon TM221CE16R, Firmware 1.3.3.3 – and without new firmware, users are stuck, because they can&#039;t change the password.

It&#039;s a real Friday-afternoon-special: someone encrypted the user/password XML file with the fixed key “SoMachineBasicSoMachineBasicSoMa”.

That means an attacker can open the control environment (SoMachine Basic 1.4 SP1), get and decrypt the user file, and take over.]]></description>
		<content:encoded><![CDATA[<p>Schneider Electric still shipping passwords in firmware<br />
You&#8217;d think a vendor of critical infrastructure would at least pretend to care about security<br />
<a href="https://www.theregister.co.uk/2017/04/05/schneider_istilli_shipping_passwords_in_firmware/" rel="nofollow">https://www.theregister.co.uk/2017/04/05/schneider_istilli_shipping_passwords_in_firmware/</a></p>
<p>That “don&#8217;t use hard-coded passwords” infosec rule? Someone needs to use a needle to write it on the corner of Schneider Electric&#8217;s developers&#8217; eyes so they don&#8217;t forget it.</p>
<p>Yes, it&#8217;s happened again, this time on the SCADA vendor&#8217;s Schneider Modicon TM221CE16R, Firmware 1.3.3.3 – and without new firmware, users are stuck, because they can&#8217;t change the password.</p>
<p>It&#8217;s a real Friday-afternoon-special: someone encrypted the user/password XML file with the fixed key “SoMachineBasicSoMachineBasicSoMa”.</p>
<p>That means an attacker can open the control environment (SoMachine Basic 1.4 SP1), get and decrypt the user file, and take over.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
