<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: The Future of SCADA/ICS Ransomware</title>
	<atom:link href="http://www.epanorama.net/blog/2017/03/10/the-future-of-scadaics-ransomware/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2017/03/10/the-future-of-scadaics-ransomware/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 29 Apr 2026 06:53:58 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/03/10/the-future-of-scadaics-ransomware/comment-page-1/#comment-1665663</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 23 Dec 2019 09:42:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=53338#comment-1665663</guid>
		<description><![CDATA[&quot;SCADA, a PLC&#039;s story&quot; https://voidsec.com/scada-a-plcs-story/

This talk will provide an overview of the most common SCADA components, known malware and incidents. As part of the presentation, we will disassemble and reverse engineer a PLC and its protocol.]]></description>
		<content:encoded><![CDATA[<p>&#8220;SCADA, a PLC&#8217;s story&#8221; <a href="https://voidsec.com/scada-a-plcs-story/" rel="nofollow">https://voidsec.com/scada-a-plcs-story/</a></p>
<p>This talk will provide an overview of the most common SCADA components, known malware and incidents. As part of the presentation, we will disassemble and reverse engineer a PLC and its protocol.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/03/10/the-future-of-scadaics-ransomware/comment-page-1/#comment-1556723</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 28 Jul 2017 16:38:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=53338#comment-1556723</guid>
		<description><![CDATA[Researchers Discover Critical Security Flaws Found In Nuke Plant Radiation Monitors 
https://hardware.slashdot.org/story/17/07/28/006215/researchers-discover-critical-security-flaws-found-in-nuke-plant-radiation-monitors?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Slashdot%2Fslashdot%2Fto+%28%28Title%29Slashdot+%28rdf%29%29

Researchers have discovered multiple unpatched vulnerabilities in radiation monitoring devices that could be leveraged by attackers to reduce personnel safety, delay detection of radiation leaks, or help international smuggling of radioactive material. Ruben Santamarta, a security consultant at Seattle-based IOActive, at the Black Hat conference on Wednesday, saying that radiation monitors supplied by Ludlum, Mirion and Digi contain multiple vulnerabilities. There are many kinds of radiation monitors used in many different environments. IOActive concentrated its research on portal monitors, used at airports and seaports; and area monitors, used at Nuclear Power Plants (NPPs).

Critical Vulnerabilities Found in Nuke Plant Radiation Monitors 
http://www.securityweek.com/critical-vulnerabilities-found-nuke-plant-radiation-monitors

In a paper (PDF) delivered by Ruben Santamarta, principal security consultant at Seattle-based IOActive, at Black Hat Wednesday, it was disclosed that radiation monitors supplied by Ludlum, Mirion and Digi contain multiple vulnerabilities. 

Patching will be difficult since these are design flaws rather than software bugs; and the vendors&#039; early response to IOActive&#039;s discoveries was, in each case, to decline to work on patches. Since then, Digi has told IOActive that it is collaborating with Mirion to patch the critical vulnerabilities. 

Nevertheless, IOActive concludes, &quot;we should acknowledge these issues are not currently patched, so increasing awareness of the possibility of such attacks will help to mitigate the risks.&quot; It is likely that the same flaws will be present in other vendors&#039; radiation monitoring devices.

 &quot;the initial analysis revealed a complete lack of security in these devices, so further testing wasn&#039;t necessary to identify significant vulnerabilities,&quot; notes the report.

In the Ludlum Model 53 personnel portal, IOActive found a backdoor password that granted the highest privilege. With this, malicious personnel could bypass authentication and take control of the device, preventing the triggering of proper alarms.

In the Ludlum Model 4525 gate monitor, IOActive discovered a complete lack of security in the communication between the gate and the controller Windows device.

In fact, adequately resourced attackers could fine-tune their malware, says IOActive, to deploy &quot;an advanced payload that hides specific isotopes from detectors, while providing the expected readings for others.&quot;

In the first, under normal working conditions, attackers could simulate a radiation leak by inserting a dataset of falsified readings. Although this on its own is unlikely to cause a reactor shutdown (because of the need for human intervention), it could lead to an evacuation of the site.]]></description>
		<content:encoded><![CDATA[<p>Researchers Discover Critical Security Flaws Found In Nuke Plant Radiation Monitors<br />
<a href="https://hardware.slashdot.org/story/17/07/28/006215/researchers-discover-critical-security-flaws-found-in-nuke-plant-radiation-monitors?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+Slashdot%2Fslashdot%2Fto+%28%28Title%29Slashdot+%28rdf%29%29" rel="nofollow">https://hardware.slashdot.org/story/17/07/28/006215/researchers-discover-critical-security-flaws-found-in-nuke-plant-radiation-monitors?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+Slashdot%2Fslashdot%2Fto+%28%28Title%29Slashdot+%28rdf%29%29</a></p>
<p>Researchers have discovered multiple unpatched vulnerabilities in radiation monitoring devices that could be leveraged by attackers to reduce personnel safety, delay detection of radiation leaks, or help international smuggling of radioactive material. Ruben Santamarta, a security consultant at Seattle-based IOActive, at the Black Hat conference on Wednesday, saying that radiation monitors supplied by Ludlum, Mirion and Digi contain multiple vulnerabilities. There are many kinds of radiation monitors used in many different environments. IOActive concentrated its research on portal monitors, used at airports and seaports; and area monitors, used at Nuclear Power Plants (NPPs).</p>
<p>Critical Vulnerabilities Found in Nuke Plant Radiation Monitors<br />
<a href="http://www.securityweek.com/critical-vulnerabilities-found-nuke-plant-radiation-monitors" rel="nofollow">http://www.securityweek.com/critical-vulnerabilities-found-nuke-plant-radiation-monitors</a></p>
<p>In a paper (PDF) delivered by Ruben Santamarta, principal security consultant at Seattle-based IOActive, at Black Hat Wednesday, it was disclosed that radiation monitors supplied by Ludlum, Mirion and Digi contain multiple vulnerabilities. </p>
<p>Patching will be difficult since these are design flaws rather than software bugs; and the vendors&#8217; early response to IOActive&#8217;s discoveries was, in each case, to decline to work on patches. Since then, Digi has told IOActive that it is collaborating with Mirion to patch the critical vulnerabilities. </p>
<p>Nevertheless, IOActive concludes, &#8220;we should acknowledge these issues are not currently patched, so increasing awareness of the possibility of such attacks will help to mitigate the risks.&#8221; It is likely that the same flaws will be present in other vendors&#8217; radiation monitoring devices.</p>
<p> &#8220;the initial analysis revealed a complete lack of security in these devices, so further testing wasn&#8217;t necessary to identify significant vulnerabilities,&#8221; notes the report.</p>
<p>In the Ludlum Model 53 personnel portal, IOActive found a backdoor password that granted the highest privilege. With this, malicious personnel could bypass authentication and take control of the device, preventing the triggering of proper alarms.</p>
<p>In the Ludlum Model 4525 gate monitor, IOActive discovered a complete lack of security in the communication between the gate and the controller Windows device.</p>
<p>In fact, adequately resourced attackers could fine-tune their malware, says IOActive, to deploy &#8220;an advanced payload that hides specific isotopes from detectors, while providing the expected readings for others.&#8221;</p>
<p>In the first, under normal working conditions, attackers could simulate a radiation leak by inserting a dataset of falsified readings. Although this on its own is unlikely to cause a reactor shutdown (because of the need for human intervention), it could lead to an evacuation of the site.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/03/10/the-future-of-scadaics-ransomware/comment-page-1/#comment-1550174</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 08 Jun 2017 09:15:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=53338#comment-1550174</guid>
		<description><![CDATA[Security Incidents Can Cost Industrial Firms $500K Per Year: Kaspersky
http://www.securityweek.com/security-incidents-can-cost-industrial-firms-500k-year-kaspersky

While a majority of industrial companies claim they are well prepared to handle a cyber security incident, many have admitted experiencing at least one incident in the past 12 months, and the annual cost can be as high as half a million dollars, according to a new report from Kaspersky Lab.

The security firm has conducted a survey of 359 industrial cybersecurity practitioners across 21 countries, mainly from the manufacturing, construction and engineering, and oil and gas sectors.

A majority of the respondents (83%) said they were prepared to deal with cybersecurity incidents within their industrial control systems (ICS) environment, and 86 percent claimed they had a dedicated policy or program in place.]]></description>
		<content:encoded><![CDATA[<p>Security Incidents Can Cost Industrial Firms $500K Per Year: Kaspersky<br />
<a href="http://www.securityweek.com/security-incidents-can-cost-industrial-firms-500k-year-kaspersky" rel="nofollow">http://www.securityweek.com/security-incidents-can-cost-industrial-firms-500k-year-kaspersky</a></p>
<p>While a majority of industrial companies claim they are well prepared to handle a cyber security incident, many have admitted experiencing at least one incident in the past 12 months, and the annual cost can be as high as half a million dollars, according to a new report from Kaspersky Lab.</p>
<p>The security firm has conducted a survey of 359 industrial cybersecurity practitioners across 21 countries, mainly from the manufacturing, construction and engineering, and oil and gas sectors.</p>
<p>A majority of the respondents (83%) said they were prepared to deal with cybersecurity incidents within their industrial control systems (ICS) environment, and 86 percent claimed they had a dedicated policy or program in place.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
