Comments
As Stuxnet Anniversary Approaches, New SCADA Attack Is Discovered
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
6/27/2014 | 11:10:40 PM
Re: Stuxnet is another thing
I agree that the level of complexity is very different. Regardless, I think it underscores the importance of limiting the attack surface and locking those systems down as much as possible. No question that these attacks are going to continue to go up.

BP
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
6/27/2014 | 3:23:24 AM
Stuxnet is another thing
Hi guys I'm reading on the internet that some colleagues are comparing this attack to the Stuxnet case. Be aware the only factor in common is that both targeted an ISC/SCADA system, but the level of complexity behind the operation is totally different.

Stuxnet is considerable a cyber weapon exploited by governments to hit Iranian critical infrastructure, its development as requested a huge effort in terms of money, resources and skills. I don't want to go deep into the details of Stuxnet architecture, but the malware used in the recent attacks is considerable a game if compared to Stuxnet. The dangerous aspect of the story is that the number of cyber attacks against critical infrastructures is increasing and it is even easier to find open on the internet all the necessary to hit vital component in critical processes.

I afraid that we will see an explosion of similar attacks in the next months, in the majority of the cases they will go undetected and this is a real problem.

Give a look to a recent presentation I made with the popular hacker Raoul Chiesa at Security Summit in Rome

http://securityaffairs.co/wordpress/25984/security/xp-critical-infrastructure.html

http://securityaffairs.co/wordpress/26092/cyber-crime/cyber-espionage-havex.html
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/26/2014 | 10:07:10 PM
Admin Accounts
Again, it's these "watering hole" events, that make it crucial to have a standard account and an admin account with no internet capabilities. I know this isn't the main goal for this specific information gathering, however, if they wanted to they could use the spoofed app to pull credentials and gain industry information, change configurations, and potentially do major future damage. 

Just something to point out to help mitigate the risk of attacks that involve the watering hole event and potentientially stunt major detrimental damage.
David Wagner
50%
50%
David Wagner,
User Rank: Black Belt
6/26/2014 | 5:35:20 PM
Ominous
Wow, this isn't frightening at all. Just gathering intelligence for a future attack? Too-well-funded for anything but organized crime or a government?

Lovely.

So are Americans lucky here, or are we the next target?



WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: White Privelege Day
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17282
PUBLISHED: 2018-09-20
An issue was discovered in Exiv2 v0.26. The function Exiv2::DataValue::copy in value.cpp has a NULL pointer dereference.
CVE-2018-14592
PUBLISHED: 2018-09-20
The CWJoomla CW Article Attachments PRO extension before 2.0.7 and CW Article Attachments FREE extension before 1.0.6 for Joomla! allow SQL Injection within download.php.
CVE-2018-15832
PUBLISHED: 2018-09-20
upc.exe in Ubisoft Uplay Desktop Client versions 63.0.5699.0 allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of URI ha...
CVE-2018-16282
PUBLISHED: 2018-09-20
A command injection vulnerability in the web server functionality of Moxa EDR-810 V4.2 build 18041013 allows remote attackers to execute arbitrary OS commands with root privilege via the caname parameter to the /xml/net_WebCADELETEGetValue URI.
CVE-2018-16752
PUBLISHED: 2018-09-20
LINK-NET LW-N605R devices with firmware 12.20.2.1486 allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.