Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Anatomy Of A 'Cyber-Physical' Attack
Newest First  |  Oldest First  |  Threaded View
Kaytana22
Kaytana22,
User Rank: Apprentice
1/29/2015 | 1:03:58 PM
Hmmm
     It is only a matter of time really, the 'hacktivists' responsible are only going to get better at this. Sooner or later there is going to be a breach and things are going to get very messy. I was just talking to my husband about what would happen if they actually got into the system where they can cause a total shutdown or even an explosion of some kind. It always seems that no matter how good our system securities are, there is always someone out there that is better. I just hope we have the people to combat this threat and keep up on it, to keep people out of the places that we don't want them to be in.

-M. Cummings
SgS125
SgS125,
User Rank: Ninja
1/15/2015 | 3:45:33 PM
Wrench in the works
Reminds me of engineers talking about how they had to add bullet proof steel to electrical transformers because hill billys kept shooting holes in them with high power rifles.  Where there is a will.......

 

Or when striking workers at the meat packing plant simply cut the conveyor belts and left the plant.

 

Always a risk no matter where the "attack" comes from.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
1/15/2015 | 12:10:39 PM
Re: Interesting
The physical barrier is significant. But it does make social engineering a much more serious risk..
Whoopty
Whoopty,
User Rank: Ninja
1/15/2015 | 10:45:52 AM
Interesting
It's very interesting to see that some of the stuff that science-fiction warned us about hackers, is potentially possible as hardware becomes smarter and more connected than ever before.

However, here's hoping that the world catches up to taking security seriously enough that only the most determined - and therefore potentially the most likely culprits - will be able to achieve some of the physical barrier crossings that you described. 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31650
PUBLISHED: 2022-05-25
In SoX 14.4.2, there is a floating-point exception in lsx_aiffstartwrite in aiff.c in libsox.a.
CVE-2022-31651
PUBLISHED: 2022-05-25
In SoX 14.4.2, there is an assertion failure in rate_init in rate.c in libsox.a.
CVE-2022-29256
PUBLISHED: 2022-05-25
sharp is an application for Node.js image processing. Prior to version 0.30.5, there is a possible vulnerability in logic that is run only at `npm install` time when installing versions of `sharp` prior to the latest v0.30.5. If an attacker has the ability to set the value of the `PKG_CONFIG_PATH` e...
CVE-2022-26067
PUBLISHED: 2022-05-25
An information disclosure vulnerability exists in the OAS Engine SecureTransferFiles functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to arbitrary file read. An attacker can send a sequence of requests to trigger this vulnera...
CVE-2022-26077
PUBLISHED: 2022-05-25
A cleartext transmission of sensitive information vulnerability exists in the OAS Engine configuration communications functionality of Open Automation Software OAS Platform V16.00.0112. A targeted network sniffing attack can lead to a disclosure of sensitive information. An attacker can sniff networ...