<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ilias Sidqui, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/ilias-sidqui/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/author/ilias-sidqui/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 02 Jan 2020 10:30:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Ilias Sidqui, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/en/author/ilias-sidqui/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Industrial Control Systems Cybersecurity News #2 &#8211; Radiology of the cybersecurity level of the healthcare sector</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/06/ics-news-2-en/</link>
		
		<dc:creator><![CDATA[Ilias Sidqui]]></dc:creator>
		<pubDate>Tue, 05 Jun 2018 13:18:33 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[manuf & industry 4.0]]></category>
		<category><![CDATA[Newsletter]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10822/</guid>

					<description><![CDATA[<p>&#62;&#62;FOCUS Last year, the National Health Service England (NHS) faced its most important cybersecurity crisis due to the Wannacry ransomware attack. In October 2017, the National Audit Office (NAO) published a report showing that at least 34% of trusts in...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/06/ics-news-2-en/">Industrial Control Systems Cybersecurity News #2 &#8211; Radiology of the cybersecurity level of the healthcare sector</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>&gt;&gt;FOCUS</h2>
<p>Last year, the National Health Service England (NHS) faced its most important cybersecurity crisis due to the Wannacry ransomware attack. In October 2017, the National Audit Office (NAO) published a <a href="https://www.nao.org.uk/report/investigation-wannacry-cyber-attack-and-the-nhs/">report</a> showing that at least 34% of trusts in England were disrupted, and around 19,494 patient appointments canceled including canceled patient operations. This was mainly due to the fact that the information system managing the appointments, the patients’ records or test results were infected by the ransomware.</p>
<p>However, the report points out that medical devices such as MRI scanners (that have Windows XP embedded within them) were also locked by the ransomware. Only 1,220 devices were infected representing 1% of the overall amount, because several equipments were disconnected to avoid the ransomware propagation. So why the healthcare sector suffered from such an attack and how come the ransomware spread that easily?</p>
<h3>Healthcare cybersecurity: Low maturity level</h3>
<p>The NAO report highlighted the challenges that the NHS had to face to tackle the attack. These challenges seem similar to the ones that several industries and manufacturers have been facing showing that an analogy of the healthcare information systems and the industrial control systems (ICS) have the same weaknesses.</p>
<p>Indeed, both ICS and Health Information Systems (HIS)face the same cybersecurity challenges, among them:</p>
<ul>
<li>The wide use of legacy devices and operating systems (such as Windows XP);</li>
<li>The length of the window of exposure of these systems (the window of exposure is the time between the vulnerability disclosure and the patching of the system): the vendors support or the quality guidelines and regulations may represent obstacles for a fast patching (a recent <a href="https://www.hipaajournal.com/study-reveals-poor-patching-practices-in-healthcare/">survey</a> conducted on 3000 security professionals working for healthcare and pharmaceutical organizations, show that 57% of the respondents had experienced at least a data breach which was conducted after the exploitation of a vulnerability for which a patch had been previously released);</li>
<li>Critical and unsecure devices directly connected to the Internet exposing the medical network. For example, McAfee published a <a href="https://securingtomorrow.mcafee.com/mcafee-labs/mcafee-researchers-find-poor-security-exposes-medical-data-to-cybercriminals/">report</a> explaining how they exploited an unsecure and connected Picture Archiving and Communication System (PACS – device that stores and shares images coming from imaging devices such as scanners) to use personal medical data;</li>
<li>Lack of security by design: several organizations and researchers have been alerting on several flows affecting medical devices such as pacemakers (<a href="http://www.bbc.com/news/technology-41099867">Cyber-flaw affects 745,000 pacemakers – BBC</a>), insulin pumps (<a href="https://www.reuters.com/article/us-johnson-johnson-cyber-insulin-pumps-e-idUSKCN12411L">J&amp;J warns diabetic patients: Insulin pump vulnerable to hacking – Reuters</a>) or infusion pumps (<a href="https://www.blackhat.com/docs/eu-17/materials/eu-17-Harit-Breaking-Bad-Stealing-Patient-Data-Through-Medical-Devices.pdf">Black hat conference [PDF]</a>)</li>
</ul>
<figure id="post-10823 media-10823" class="align-none"><img fetchpriority="high" decoding="async" class="size-full wp-image-10823 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1.png" alt="" width="809" height="511" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1.png 809w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1-302x191.png 302w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1-768x485.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1-62x39.png 62w" sizes="(max-width: 809px) 100vw, 809px" /></figure>
<h3>A growing threat on the healthcare sector</h3>
<p>The low cybersecurity maturity level of the healthcare sector combined with the continuous interest of some actors on personal data or life threatening made the threat skyrocket these past few years. Indeed, several cybersecurity companies have been alerting on a growing number of cyber threat actors who are targeting healthcare sector, for example:</p>
<ul>
<li>In the last newsletter was reported that a US hospital was hit by Samsam ransomware in January 2018. Samsam is only one of the numerous ransomware that targeted hospitals among them Locky;</li>
<li>In March 2018, <a href="https://www.kaspersky.com/about/press-releases/2018_chinese-speaking-apt-actor-caught-spying-on-pharmaceutical-organizations">Kaspersky researchers</a> discovered that a Chinese-speaking group used PlugX malware (remote access tool which has been used previously by several groups since 2012) in pharmaceutical organizations for stealing information;</li>
<li>In April 2018, <a href="https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia">Symantec</a> identified a new attack group named Orangeworm. This group has been targeting healthcare sector companies (equipments manufactures, pharmaceutical, health organizations) for several years. Orangeworm has been using a backdoor called Kwampirs which collects data in the infected systems. This malware propagates easily in Windows XP devices.</li>
</ul>
<figure id="post-10825 media-10825" class="align-none"><img decoding="async" class="size-full wp-image-10825 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-2.png.jpg" alt="" width="721" height="437" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-2.png.jpg 721w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-2.png-315x191.jpg 315w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-2.png-64x39.jpg 64w" sizes="(max-width: 721px) 100vw, 721px" /></figure>
<h3 class="align-none">Protecting against</h3>
<p>In order to curb the number of security incidents in the healthcare sector, several measures can be, and in some cases have already been, implemented among them:</p>
<ul>
<li>Design of a global cybersecurity governance by implementing a cybersecurity policy;</li>
<li>Conduction of awareness campaigns towards the hospital staff on the cybersecurity threats;</li>
<li>Implementation of patch management procedure in order to reduce the window of exposure of the system (a combined work with the vendors and the regulation organizations may be required so the patching covers the largest amount of device as possible);</li>
<li>Network segregation into several levels of protection matching the level of criticality (medical devices should be highly protected).</li>
</ul>
<figure id="post-10827 media-10827" class="align-none"><img decoding="async" class="size-full wp-image-10827 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="(max-width: 565px) 100vw, 565px" /><em>Several governmental agencies and institutions have been publishing reports and guidelines in order to help healthcare organizations and the medical devices suppliers in securing their network or providing more secure medical devices. You will find here after some of the documents:</em></figure>
<ul>
<li><a href="https://www.enisa.europa.eu/publications/cyber-security-and-resilience-for-smart-hospitals">Cyber security and resilience for Smart Hospitals &#8211; ENISA</a></li>
<li><a href="https://www.enisa.europa.eu/publications/security-and-resilience-in-ehealth-infrastructures-and-services">Security and Resilience in eHealth Infrastructures and Services &#8211; ENISA</a></li>
<li><a href="http://esante.gouv.fr/sites/default/files/Guide_Pratique_Dispositif_Connecte.pdf">Guide Pratique : Règles pour les dispositifs connectés d’un Système d’Information de Santé &#8211; Agence des systèmes d’information partagés de santé [PDF]</a></li>
<li><a href="https://www.fda.gov/RegulatoryInformation/Guidances/ucm070634.htm">Information for Healthcare Organizations about FDA&#8217;s &#8220;Guidance for Industry: Cybersecurity for Networked Medical Devices Containing Off-The-Shelf (OTS) Software&#8221; &#8211; FDA</a></li>
<li><a href="https://www.fda.gov/AboutFDA/CentersOffices/OfficeofMedicalProductsandTobacco/CDRH/CDRHReports/ucm604500.htm">The U.S Food &amp; Drug Administration released its Medical Device Safety Action Plan in April 2018</a></li>
</ul>
<figure id="post-10827 media-10827" class="align-none"><img decoding="async" class="size-full wp-image-10827 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="(max-width: 565px) 100vw, 565px" /></figure>
<h2>&gt;&gt;Latest news</h2>
<table width="0">
<tbody>
<tr>
<td width="206">
<figure id="post-10862 media-10862" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10862" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-4.png-4.jpg" alt="" width="187" height="105" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-4.png-4.jpg 187w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-4.png-4-69x39.jpg 69w" sizes="auto, (max-width: 187px) 100vw, 187px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Aerial tramway with security holes</strong></p>
<p><em>Golem.de, April 19t<sup>h</sup></em></p>
<p>Two white hackers found the control system of a new aerial tramway in the internet without any security measures. According to them, the commands were sent unencrypted, the authentication wasn’t provided and the web application was vulnerable to cross-site scritping and HTTP header injection attacks. <a href="https://www.golem.de/news/patscherkofel-gondelbahn-mit-sicherheitsluecken-1804-133930.html">Link to the article</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10864 media-10864" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10864" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-5.png-1.jpg" alt="" width="184" height="41" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-5.png-1.jpg 184w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-5.png-1-71x16.jpg 71w" sizes="auto, (max-width: 184px) 100vw, 184px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Patch Plugs More Than a Dozen Vulnerabilities Affecting Industrial Secure Router Series</strong></p>
<p><em>Tripwire, April 16<sup>th</sup></em></p>
<p>Cisco Talos published a report revealing several vulnerabilities affecting the Moxa EDR-810 industrial secure router with firewall/NAT/VPN and manager layer 2 switch functions. This router sets perimetric security for critical assets such as pumping/treatment systems in water stations, Distributed Control Systems (DCS) in oil and gas stations … Many of the flaws received a CVSS score of 8.8. Moxa released an updated version of the firmware. <a href="https://www.tripwire.com/state-of-security/latest-security-news/patch-plugs-more-than-a-dozen-vulnerabilities-affecting-industrial-secure-router-series/">Link to the article</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10866 media-10866" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10866" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-6.png-1.jpg" alt="" width="185" height="60" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-6.png-1.jpg 185w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-6.png-1-71x23.jpg 71w" sizes="auto, (max-width: 185px) 100vw, 185px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Advisory: Hostile state actors compromising UK organisations with focus on engineering and industrial control companies</strong></p>
<p><em>NCSC, April 5th</em></p>
<p>The National Cyber Security Centre (NCSC) published an advisory revealing that several ongoing attacks have been targeting mainly engineering and industrial control companies since March 2017. The attacks are involving the harvesting of credentials using strategic web compromises and spear-phishing. The advisory also refers to the Department of Homeland Security (DHS) and FBI joint Technical Alert (see below for more information). <a href="https://www.ncsc.gov.uk/alerts/hostile-state-actors-compromising-uk-organisations-focus-engineering-and-industrial-control">Link to the advisory</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10868 media-10868" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10868" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-7-1.png" alt="" width="175" height="37" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-7-1.png 175w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-7-1-71x15.png 71w" sizes="auto, (max-width: 175px) 100vw, 175px" /></figure>
<figure id="post-10870 media-10870" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10870" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-72.png" alt="" width="387" height="48" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-72.png 387w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-72-71x9.png 71w" sizes="auto, (max-width: 387px) 100vw, 387px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Sentryo Provides Anomaly Detection Technology to Siemens to Address the Cybersecurity Challenges of industrial infrastructures</strong></p>
<p><em>Sentryo, April</em></p>
<p>Siemens and Sentryo signed an agreement in which Siemens AG will provide Sentryo ICS CyberVision solution to its clients among Siemens products and services. Sentryo’s solution is an asset management and anomaly detection tool designed for Industrial Control Systems. <a href="https://www.sentryo.net/wp-content/uploads/2018/04/CP_Partenariat-Sentryo-Siemens_FR.pdf">Link to the press release [FR][PDF]</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10872 media-10872" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10872" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-8-1.png" alt="" width="191" height="181" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-8-1.png 191w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-8-1-41x39.png 41w" sizes="auto, (max-width: 191px) 100vw, 191px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>ISA announces newly published ISA/IEC 62443-4-1-2018 security standard</strong></p>
<p><em>Automation.com, March 28<sup>th</sup></em></p>
<p>The international Society of Automation released the Part 4-1 of the ISA/IEC 62443 standard. This part tackles the Product Security Development Life-Cycle Requirements. “It defines a secure development life-cycle for developing and maintaining secure products.” This includes several concepts such as security by design, patch management and product end-of-life. <a href="https://www.automation.com/automation-news/industry/isa-announces-newly-published-isaiec-62443-4-1-2018-security-standard">Link to the article</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10874 media-10874" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10874" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-9-1.png" alt="" width="187" height="75" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-9-1.png 187w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-9-1-71x28.png 71w" sizes="auto, (max-width: 187px) 100vw, 187px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Schneider Electric Launches Cybersecurity Virtual Academy</strong></p>
<p><em>ISS Source, March 27<sup>th</sup></em></p>
<p>Schneider Electric launched the Cybersecurity Virtual Academy which is a website that provides several materials to raise the awareness of the cybersecurity risks in the industrial control systems. <a href="http://www.isssource.com/schneider-electrics-cybersecurity-virtual-academy/">Link to the article</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10876 media-10876" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10876" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-10-1.png" alt="" width="192" height="104" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-10-1.png 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-10-1-71x39.png 71w" sizes="auto, (max-width: 192px) 100vw, 192px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Threat landscape for industrial automation systems in H2 2017</strong></p>
<p><em>Kaspersky lab, March 26<sup>th</sup></em></p>
<p>Kaspersky has published a report on the threat landscape over the industrial control systems during the second semester of 2017. In the report, Kaspersky analyses the vulnerabilities discovered by the ICS-CERT and the ones identified by Kaspersky Lab ICS Cert. Here are some figures given in the report:</p>
<ul style="list-style-type: disc;">
<li>322 vulnerabilities were identified by ICS-CERT and more than 50% of them are impacting the energy sector;</li>
<li>3,3% of industrial automation system computers were attacked by cryptocurrency mining programs during the period from February 2017 to January 2018;</li>
<li>10,8% of all ICS systems were attacked by botnet agents during 2017. The mains sources of botnet agent attacks on ICS systems in 2017 were internet, removable media and email messages;</li>
</ul>
<p>The Kaspersky figures show also a certain decrease on the number of attacks on ICS systems between 2016 and 2017. This can be explained by the fact that more and more companies are training their employees and began implementing simple cybersecurity measures. <a href="https://ics-cert.kaspersky.com/reports/2018/03/26/threat-landscape-for-industrial-automation-systems-in-h2-2017/">Link to the report</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10878 media-10878" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10878" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-11-1.png" alt="" width="176" height="46" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-11-1.png 176w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-11-1-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-11-1-175x46.png 175w" sizes="auto, (max-width: 176px) 100vw, 176px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Draft NIST Special Publication 800-160 Volume 2, Systems Security Engineering: Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems</strong></p>
<p><em>NIST, March 21<sup>st</sup></em></p>
<p>The National Institute of Standards and Technology (NIST) released a public draft of the NIST SP 800-160 Volume 2, Systems Security Engineering: Cyber Resiliency Considerations for the engineering of Trustworthy Secure Systems. This document aims to provide guidelines to organizations on how to apply cyber resiliency concepts during the engineering of systems. These guidelines may be applied on new systems, modification of systems, Critical infrastructure systems … <a href="https://csrc.nist.gov/news/2018/draft-sp-800-160-vol-2-released">Link to the release</a> | <a href="https://csrc.nist.gov/CSRC/media/Publications/sp/800-160/vol-2/draft/documents/sp800-160-vol2-draft.pdf">Link to the document</a> [PDF]</td>
</tr>
<tr>
<td width="206">
<figure id="post-10880 media-10880" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10880" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-12.png-1.jpg" alt="" width="190" height="159" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-12.png-1.jpg 190w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-12.png-1-47x39.jpg 47w" sizes="auto, (max-width: 190px) 100vw, 190px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors</strong></p>
<p><em>US-CERT, March 15<sup>th</sup></em></p>
<p>The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published a joint Technical Alert in which give details on how the Russian government targeted several American organizations operating in the energy, nuclear, water, commercial facilities aviation and critical manufacturing sectors (DHS and FBI have already warned about this threat in another alert published in <a href="https://www.us-cert.gov/ncas/alerts/TA17-293A">October</a>). The alert analyzed the attacks using the <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">Lockheed Cyber Kill Chain</a> (stage1:reconnaissance, stage 2: weaponization, stage 3: delivery, stage 4: exploitation, stage 5: installation, stage 6: command &amp; control, stage 7: actions and objectives). The threat actors after gaining access to their victims information system, they conducted reconnaissance operations within the network. They mainly focused on identifying and browsing file servers. They viewed information and files regarding Industrial Control Systems (ICS) or Supervisory Control And Data Acquisition (SCADA) systems. <a href="https://www.us-cert.gov/ncas/alerts/TA17-293A">Link to the alert</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10882 media-10882" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10882" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-13.png-1.jpg" alt="" width="130" height="184" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-13.png-1.jpg 130w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-13.png-1-28x39.jpg 28w" sizes="auto, (max-width: 130px) 100vw, 130px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>‘Cyber event’ disrupts power in Mich. – but don’t blame hackers</strong></p>
<p><em>E&amp;E News, March 8<sup>th</sup></em></p>
<p>An employee of a public utility that provides electricity in Michigan (Consumers Energy) inadvertently cut the electricity to about 15000 consumers. During an “internal testing” the employee overstepped his authority in a control center leading to the outage. The utility the event as a “cyber event” and reported it to the department of Energy even tought the outage had nothing to do with a malware or cyber attack. Since the event, the company adjusted the access controls. <a href="https://www.eenews.net/energywire/stories/1060075765/print">Link to the news</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10884 media-10884" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10884" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-14.png-1.jpg" alt="" width="187" height="141" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-14.png-1.jpg 187w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-14.png-1-52x39.jpg 52w" sizes="auto, (max-width: 187px) 100vw, 187px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>A Qualitative View of 2017 Across vulnerabilities, threats, and lessons learned in hunting and incident response</strong></p>
<p><em>Dragos, March</em></p>
<p>Dragos published 3 reports in which they reveal their findings and analysis regarding the industrial control systems vulnerabilities during 2017, the industrial threat landscape incident response and hunting lessons. Some of the results of these reports are the following:</p>
<ul style="list-style-type: disc;">
<li> “64% of 2017 ICS-related vulnerability patches don’t fully eliminate the risk because the components were insecure by design”;</li>
<li>5 activity groups are working on developing tools and malwares (as Crashoverride that attacked the Ukrainian electric grid in 2016);</li>
<li>The main infection vectors are: unprotected interconnectivity with IT systems, removable media, unprotected interfacility connection and phishing.</li>
</ul>
<p><a href="https://dragos.com/media/2017-Review-Industrial-Control-Vulnerabilities.pdf">Link to the Vulnerabilities report [PDF]</a></p>
<p><a href="https://dragos.com/media/2017-Review-Industrial-Control-System-Threats.pdf">Link to the threat activity groups report [PDF]</a></p>
<p><a href="https://dragos.com/media/2017-Review-Hunting-and-Responding-to-Industrial-Intrusions.pdf">Link to the hunting and responding report [PDF]</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10886 media-10886" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10886" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-15-1.png" alt="" width="175" height="37" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-15-1.png 175w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-15-1-71x15.png 71w" sizes="auto, (max-width: 175px) 100vw, 175px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Siemens report: Mideast’s oil and gas sector needs readiness boost as cyber risk grows</strong></p>
<p><em>Siemens, March</em></p>
<p>A recent report published by Siemens shows that the Middle East facing more and more attacks targeting Operational Technology (OT) (according to the report 30% of the attacks are targeting OT). The report gives the results of a survey on 176 individuals working in the Middle East who are responsible for overseeing the cybersecurity of their organisations. Here are some figures:</p>
<ul style="list-style-type: disc;">
<li>“75% of organizations have suffered at least one security compromise that resulted in the loss of confidential information or disruption to operations in the OT environment over the past 12 months”;</li>
<li>“68% of respondents say the top cyber security threat is the negligent of careless insider”;</li>
<li>“31% of respondents say their organization’s industrial control systems” protection and security are adequate”.</li>
</ul>
<p><a href="http://www.middleeast.siemens.com/me/en/news_events/news/news_2018/siemens-report-mideasts-oil-and-gas-sector-needs-readiness-boost-as-cyber-risk-grows.htm">Link to the press release</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10888 media-10888" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10888" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-16.png-1.jpg" alt="" width="192" height="54" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-16.png-1.jpg 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-16.png-1-71x20.jpg 71w" sizes="auto, (max-width: 192px) 100vw, 192px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>NERC Full Notice of Penalty regarding Unidentified Registered Entity</strong></p>
<p><em>NERC, February 28<sup>th</sup></em></p>
<p>The North American Electric Reliability Corporation (NERC) files a Notice of Penalty of two million seven hundred thousand dollars ($ 2,700,000), in accordance with the Federal Energy Regulatory Commission (FERC), regarding noncompliance by an Unidentified Registered Entity (URE).</p>
<p>Indeed, a third-party URE contractor failed to comply with the information protection program and copied very sensitive data, including records associated with Critical Computer Assets (CCA), from the URE environment on its own unsecured environment. While the data was on the contractor&#8217;s network, a subset of data was available online without the need to enter a username or password for a total of 70 days.</p>
<p>This exposed information increases the risk of a malicious</p>
<p>attacker gaining both physical and remote access to URE&#8217;s systems and access to internal CCAs. <a href="https://www.nerc.com/pa/comp/CE/Enforcement%20Actions%20DL/Public_CIP_NOC-2569%20Full%20NOP.pdf">Link to the article</a></td>
</tr>
</tbody>
</table>
<figure id="post-10828 media-10828" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10828" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /></figure>
<h2>&gt;&gt;Main ICS vulnerabilities</h2>
<table width="100%">
<tbody>
<tr>
<td style="text-align: center;" width="7%"><strong>Date</strong></td>
<td style="text-align: center;" width="13%"><strong>CVSS v3 score</strong></td>
<td style="text-align: center;" width="27%"><strong>Equipment</strong></td>
<td style="text-align: center;" width="34%"><strong>Vulnerability</strong></td>
<td style="text-align: center;" width="16%"><strong>Link to the advisory</strong></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Schneider Electric InduSoft Web Studio and InTouch Machine Edition</td>
<td style="text-align: center;" width="34%">Stack-based Buffer Overflow</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">10.0</td>
<td style="text-align: center;" width="27%">Schneider Electric Triconex Tricon</td>
<td style="text-align: center;" width="34%">Improper Restriction of Operations within the Bounds of a Memory Buffer</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-02">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Rockwell Automation Stratix Services Router</td>
<td style="text-align: center;" width="34%">Improper Input Validation, Improper Restriction of Operations within the Bounds of a Memory Buffer, Use of Externally-Controlled Format String</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Rockwell Automation Stratix and ArmorStratix Switches</td>
<td style="text-align: center;" width="34%">Improper Input Validation, Resource Management Errors, Improper Restriction of Operations within the Bounds of a Memory Buffer, Use of Externally-Controlled Format String</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Rockwell Automation Stratix Industrial Managed Ethernet Switch</td>
<td style="text-align: center;" width="34%">Improper Input Validation, Resource Management Errors, 7PK – Errors, Improper Restriction of Operations within the Bounds of a Memory Buffer, Use of Externally-Controlled Format String</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 5<sup>th</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">10.0</td>
<td style="text-align: center;" width="27%">Rockwell Automation MicroLogix</td>
<td style="text-align: center;" width="34%">Improper Authentication</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-095-01">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 3<sup>rd</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Siemens Building Technologies Products (Update A)</td>
<td style="text-align: center;" width="34%">Stack-based Buffer Overflows, Security Features, Improper Restriction of Operations within the Bounds of a Memory Buffer, NULL Pointer Dereference, XML Entity Expansion, Heap-based Buffer Overflow, Improper Access Control</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-093-01">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Mar. 29<sup>th</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Siemens TIM 1531 IRC</td>
<td style="text-align: center;" width="34%">Missing Authentication for Critical Function</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-088-02">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Mar. 20<sup>th</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Geutebruck IP Cameras</td>
<td style="text-align: center;" width="34%">Improper Authentication, SQL Injection, Cross-Site Request Forgery, Improper Access Control, Server-Side Request Forgery, Cross-site Scripting</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-079-01">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Mar. 13<sup>th</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">9.3</td>
<td style="text-align: center;" width="27%">OSIsoft PI Web API</td>
<td style="text-align: center;" width="34%">Permissions, Privileges, and Access Controls; Cross-site Scripting</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-072-04">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Mar. 1<sup>st</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Moxa OnCell G3100-HSPA Series</td>
<td style="text-align: center;" width="34%">Reliance on Cookies without Validation and Integrity Checking, Improper Handling of Length Parameter Inconsistency, NULL Pointer Dereference</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-060-02">Link</a></td>
</tr>
</tbody>
</table>
<figure id="post-10828 media-10828" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10828" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /></figure>
<h2>&gt;&gt;Upcoming ICS events</h2>
<table style="width: 600px;">
<tbody>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></figure>
<p>Jun. 30-1</td>
<td style="width: 431px; text-align: center;"><a href="https://nuitduhack.com/en/?utm_source=infosec-conferences-com&amp;utm_medium=directory&amp;utm_campaign=free-listing">Nuit du Hack</a></p>
<p>Paris, France</td>
</tr>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png" alt="" width="50" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png 99w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-30x30.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-50x50.png 50w" sizes="auto, (max-width: 50px) 100vw, 50px" /></figure>
<p>Jun. 18</td>
<td style="width: 431px; text-align: center;"><a href="https://weblab.ing.unimore.it/smartindustries/18/?utm_source=infosec-conferences-com&amp;utm_medium=directory&amp;utm_campaign=free-listing">IEEE Workshop on Smart Industries (IEEE SIW)</a></p>
<p>Taormina, Italy</td>
</tr>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png" alt="" width="50" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png 99w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-30x30.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-50x50.png 50w" sizes="auto, (max-width: 50px) 100vw, 50px" /></figure>
<p>Jun. 15</td>
<td style="width: 431px; text-align: center;"><a href="http://www.shipcybersecurity.com/index.htm">European Maritime Cyber Risk Management Summit</a></p>
<p>London, UK</td>
</tr>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png" alt="" width="50" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png 99w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-30x30.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-50x50.png 50w" sizes="auto, (max-width: 50px) 100vw, 50px" /></figure>
<p>May. 22-23</td>
<td style="width: 431px; text-align: center;"><a href="http://industrialcontrolsecuritynuclear.com/?utm_source=infosec-conferences-com&amp;utm_medium=directory&amp;utm_campaign=free-listing">Annual Nuclear Industrial Control Cybersecurity and Resilience Conference (ICCS)</a></p>
<p>Warrington, UK</td>
</tr>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png" alt="" width="50" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png 99w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-30x30.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-50x50.png 50w" sizes="auto, (max-width: 50px) 100vw, 50px" /></figure>
<p>May. 3-4</td>
<td style="width: 431px; text-align: center;"><a href="http://www.global-engage.com/event/cyber-security-summit/?utm_source=infosec-conferences-com&amp;utm_medium=directory&amp;utm_campaign=free-listing">Global Cyber Security in Healthcare &amp; Pharma Summit</a></p>
<p>London, UK</td>
</tr>
</tbody>
</table>
<figure id="post-10828 media-10828" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10828" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/06/ics-news-2-en/">Industrial Control Systems Cybersecurity News #2 &#8211; Radiology of the cybersecurity level of the healthcare sector</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Industrial Control System Cybersecurity News #1 &#8211; What to remember from 2017?</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/03/ics-news-1-en/</link>
		
		<dc:creator><![CDATA[Ilias Sidqui]]></dc:creator>
		<pubDate>Mon, 26 Mar 2018 16:47:21 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[manuf & industry 4.0]]></category>
		<category><![CDATA[Newsletter]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10498/</guid>

					<description><![CDATA[<p>&#62;&#62;Editorial: What to remember from 2017? Industrial Control Systems (ICS) are complex systems that aim to control industrial processes. ICS can be found in several sectors: energy, nuclear, transport, chemistry… In brief these systems control many of the critical productive assets...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/ics-news-1-en/">Industrial Control System Cybersecurity News #1 &#8211; What to remember from 2017?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>&gt;&gt;Editorial: What to remember from 2017?</h2>
<p><em>Industrial Control Systems (ICS) are complex systems that aim to control industrial processes. ICS can be found in several sectors: energy, nuclear, transport, chemistry… In brief these systems control many of the critical productive assets of companies or states making their compromise by adversaries a high risk on the environment or people’s lives.</em></p>
<p>Thus, the <strong>cybersecurity of these systems is crucial</strong>. Moreover, securing these systems may be challenging due to their complexity (mainly because ICS are a mix of technologies and their lifetime is longer than usual information systems’).</p>
<p>In order to meet our clients’ needs and answer to their future concerns, Wavestone has been conducting an <strong>ICS cybersecurity watch where every recent study</strong>, attack or incident and report regarding the security of Industrial Control Systems are studied. In 2017, more than <strong>80 news</strong> were reported from which we can retrieve a lot of teachings.</p>
<h3>So, what did we notice this year?</h3>
<p>First of all, <strong>ICS had its share of attacks</strong>. However, this year’s attacks, more than the other years’, had an unusual worldwide impact. Indeed, while ICS attacks were usually localized on a device (for instance on health devices), factory (for example a cryptomining malware found in a water utility – for more information see below) or a region (Dallas emergency sirens ignition in April 2017), 2017’s attacks started locally and spread quickly impacting several production lines in the world (WannaCry and NotPetya).</p>
<figure id="post-10499 media-10499" class="align-none">
<figure id="post-10573 media-10573" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-10573" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter.png" alt="" width="912" height="539" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter.png 1272w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter-323x191.png 323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter-768x454.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter-66x39.png 66w" sizes="auto, (max-width: 912px) 100vw, 912px" /></figure>
</figure>
<p>&nbsp;</p>
<p>During 2017, many attacks have been reported in the news. Moreover, we noticed that several national agencies, governments or political figures alerted on ongoing attacks or attempts on critical infrastructure. The sector that was the most targeted seems to be the Energy sector. Indeed, several news were reported from Turkey (in January), USA (in March, July), Baltic States (in May), UK (in July) and Ireland (in July) showing that this sector was a privileged target by hackers (state sponsored or not).</p>
<p>The <strong>energy sector wasn’t the only hot topic of the year</strong>, as a matter of fact, <strong>autonomous cars</strong> cybersecurity hit many times the headlines (even if that topic may or may not be considered as related to industrial control systems). This is mainly due to the fact that cars’ cybersecurity is a new market. Therefore, cybersecurity experts and researchers try to find vulnerabilities and exploits (for example vulnerability found in airbag control units), while car manufacturers launch partnerships and initiatives showing that cybersecurity is now one of their main concerns (for example GM invited ethical hackers to try and hack its cars).</p>
<p>Finally, the ICS cybersecurity market tends to grow as demonstrated by the several fundraisings and partnerships signed during this year. In a broader perspective, we can notice t<strong>hree kinds of actors</strong> in the ICS cybersecurity market:</p>
<ul>
<li><strong>ICS cybersecurity companies</strong>: usually small-sized companies or start-ups. They are pure-players that develop and put in the market ICS-dedicated solutions (Sentryo, CyberX, Nozomi …);</li>
<li><strong>ICS vendors</strong>: we noticed last year, some vendors that conceive ICS launched partnerships with ICS cybersecurity companies to improve their systems’ security (for example Siemens-PAS partnership in September, Schneider-Claroty partnership in August);</li>
<li><strong>IT security companies</strong>: these companies (well known in the IT world) tailor their solutions for industrial context. They show a growing interest for ICS by publishing reports and attack analysis (for example Kaspersky, McAfee).*</li>
</ul>
<h3>So, what is coming next?</h3>
<p>It may be easy to say that the ICS cybersecurity will still (unfortunately) hit the headlines. Especially with alerts of attacks targeting life threatening system such as the safety instrumented systems controllers. But, we may see more and more news on specific sectors such as maritime, transport, health… that weren’t somehow as exposed in the media as the energy or nuclear sector. The ICS cybersecurity market may continue to grow especially with partnerships and acquisitions. Industrial Control Systems will continue to face new threats, challenges and changes.</p>
<h2>&gt;&gt;Latest news:</h2>
<figure id="post-10532 media-10532" class="align-none"></figure>
<table style="width: 701px; height: 3639px; border-color: #ffffff; border-right-color: #ffffff;" border="1" cellpadding="10">
<tbody>
<tr>
<td style="width: 156.91px;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10506" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image1-1.png" alt="" width="326" height="138" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image1-1.png 326w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image1-1-71x30.png 71w" sizes="auto, (max-width: 326px) 100vw, 326px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>CyberX raises $18 million in series B funding to combat rising threats to IIoT and critical infrastructure, bringing total funding to $30 million (CyberX, February 27<sup>th</sup>)</strong></p>
<p>CyberX announced that the company raised $18 million dollars to develop threat detection in the Industrial Internet of Things (IIoT) and critical infrastructures. The company develops a threat monitoring and risk mitigation platform that includes ICS-specific threat intelligence. <a href="https://cyberx-labs.com/en/press-releases/cyberx-raises-18-million-series-b-funding-combat-rising-threats-iiot-critical-infrastructure-bringing-total-funding-30-million/">Link to the press release</a></td>
</tr>
<tr>
<td style="width: 156.91px;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10510" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image2.png-437x114.jpg" alt="" width="437" height="114" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image2.png-437x114.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image2.png-71x19.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image2.png.jpg 447w" sizes="auto, (max-width: 437px) 100vw, 437px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Fun with Modbus 0x5A (<em>Security Insider, February 9th</em>)</strong></p>
<p>During the last edition of Defcon in Las Vegas, Wavestone presented its latest study regarding the ModBus protocol cybersecurity and specifically the function 90. An attacker may thanks to this function start, stop a controller or force it to send a determined output value,  <a href="http://www.securityinsider-wavestone.com/2018/02/fun-with-modbus-0x5a.html">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10512" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3-268x191.jpg" alt="" width="268" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3-268x191.jpg 268w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3-55x39.jpg 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3-345x245.jpg 345w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3.jpg 409w" sizes="auto, (max-width: 268px) 100vw, 268px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>ICS detection challenge results (<em>Dale Peterson, February 7th</em>)</strong></p>
<p>At the S4x18 in January, took place the ICS Detection Challenge. The 4 companies that completed the challenge are: Claroty, Gravwell, Nozomi Networks and Security Matters. The first part of the challenge consists on evaluating the ICS Detection class of 3 products which are: Claroty, Nozomi Networks and Security Matters. It was won by Claroty over Nozomi Networks and Security Matters. The competitors&#8217; products had to detect cyber-attacks and incidents occurring on an oil&amp;gas company. <a href="https://dale-peterson.com/2018/02/11/ics-detection-challenge-results-part-1/">Link to the results</a></p>
<p>The second part which consists in the asset detection phase was also won by Claroty even though Nozomi provided the most details in their asset inventory. <a href="https://dale-peterson.com/2018/02/13/ics-detection-challenge-part-ii/?utm_content=buffer46f44&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer">Link to the results</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10514" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image4-287x191.jpg" alt="" width="287" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image4-287x191.jpg 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image4-59x39.jpg 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image4.jpg 720w" sizes="auto, (max-width: 287px) 100vw, 287px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Water utility in Europe hit by cryptocurrency malware mining attack (<em>eWeek, February 7th</em>)</strong></p>
<p>The security firm Radiflow discovered a cryptocurrency mining malware in the network of a water service provider in Europe. The malware was downloaded from a malicious advertising site infecting the Human Machine Interface and then spread to the SCADA network that was still running Microsoft Windows XP OS. The malware degraded the system performance. Tough the degradation wasn’t noticed by the operators. <a href="http://www.eweek.com/security/water-utility-in-europe-hit-by-cryptocurrency-malware-mining-attack">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10516" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5-323x191.jpg" alt="" width="323" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5-323x191.jpg 323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5-66x39.jpg 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5.jpg 436w" sizes="auto, (max-width: 323px) 100vw, 323px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Ukraine power distributor plans cyber defense system for $20 million (<em>Reuters, February 6th</em>)</strong></p>
<p>Ukraine’s state-run power distributor Ukrenergo, which was a target for cyber-attacks in the past two years (December 2016 and December 2017), will invest up to $20 million in a new cyber defense system. The acting head of Ukrainian state power distributor Ukrenergo, told that the company and international consultants had identified about 20 threats that would be eliminated with the new system. The main goal of this system is to make “physically impossible for external threats to affect the Ukrainian energy system”. <a href="https://www.reuters.com/article/us-ukraine-cyber-ukrenergo/ukraine-power-distributor-plans-cyber-defense-system-for-20-million-idUSKBN1FQ1TD">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10518" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image6.jpg" alt="" width="297" height="178" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image6.jpg 297w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image6-65x39.jpg 65w" sizes="auto, (max-width: 297px) 100vw, 297px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Increasing number of industrial systems accessible from web (<em>study Security Week, February 2nd</em>)</strong></p>
<p>According to a new report published by Positive Technologies, the number of industrial control systems (ICS) accessible from the Internet has increased significantly during the past year. Most of vulnerabilities of these systems could be exploited remotely without needing to obtain any privileges in advance. The most common types of vulnerabilities were remote code execution (24%), information disclosure (17%), and buffer overflows (12%).Most of these systems are accessible via HTTP, followed by the Fox building automation protocol associated with Honeywell’s Niagara framework, Ethernet/IP, BACnet, and the Lantronix discovery protocol. <a href="https://www.securityweek.com/increasing-number-industrial-systems-accessible-web-study">Link to the article</a> | <a href="https://www.securityweek.com/increasing-number-industrial-systems-accessible-web-study">Link to the report</a> [PDF]</td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10520" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image7-337x191.jpg" alt="" width="337" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image7-337x191.jpg 337w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image7-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image7.jpg 454w" sizes="auto, (max-width: 337px) 100vw, 337px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Flaws in gas station software let hackers change prices, steal fuel, erase evidence (<em>Motherboard, January 31st</em>)</strong></p>
<p>Security researchers were able to connect to a web interface that manages gas station thanks to Shodan (search engine of connected devices). After using the default admin login and password, and then a hardcoded username and password, the researchers were able to shut down fuel pumps, hijack credit card payments, and steal card numbers. <a href="https://motherboard.vice.com/en_us/article/43qkgb/flaws-in-gas-station-software-let-hackers-change-prices-steal-fuel-erase-evidence">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10522" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image8-340x191.jpg" alt="" width="340" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image8-340x191.jpg 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image8-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image8.jpg 433w" sizes="auto, (max-width: 340px) 100vw, 340px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Government warns critical industry firms to prepare for cyberattacks (<em>Sky news, January 29th</em>)</strong></p>
<p>All companies which are involved in critical industry and essential services, such as energy, transport, water, health and digital infrastructure, have been warned by the British government that they face sanctions if they do not include cybersecurity rules in their systems.The fines come as the government implements the Network and Information Systems (NIS) Directive, which would cover events such as the WannaCry attack. <a href="https://news.sky.com/story/government-warns-critical-industry-firms-to-prepare-for-cyberattacks-11226555">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10524" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image10-148x191.png" alt="" width="148" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image10-148x191.png 148w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image10-30x39.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image10.png 311w" sizes="auto, (max-width: 148px) 100vw, 148px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Gemalto licensing tool exposes ICS, corporate systems to attacks (<em>Security week, January 22nd</em>)</strong></p>
<p>Kaspersky Lab researchers found 14 vulnerabilities in Gemalto Sentinel LDK (software) and the associated USB Dongle (SafeNet). The USB dongle is used to activate the software. When connected, drivers are installed and the port 1947 is added to the list of exceptions in the Windows firewall. This port can be exploited to identify remotely accessible devices. <a href="https://www.securityweek.com/gemalto-licensing-tool-exposes-ics-corporate-systems-attacks">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10526" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11-316x191.png" alt="" width="316" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11-316x191.png 316w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11-768x464.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11.png 1046w" sizes="auto, (max-width: 316px) 100vw, 316px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>SamSam ransomware hits hospitals, city councils, ICS firms (<em>Bleeping Computer, January 19th</em>)</strong></p>
<p>Samsam ransomware hit several hospitals, city councils and an ICS firm. Hancock Health admitted paying the ransom ($55.000) even though they had backups. The Samsam ransomware spread by brute forcing RDP connections. <a href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/?utm_source=dlvr.it&amp;utm_medium=twitter">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10528" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image12.jpg" alt="" width="376" height="169" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image12.jpg 376w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image12-71x32.jpg 71w" sizes="auto, (max-width: 376px) 100vw, 376px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Industrial systems scrambling to catch up with Meltdown, Spectre (<em>The Register, January 18th</em>)</strong></p>
<p>Meltdown and Spectre vulnerabilities also had an impact on industrial control systems. Some vendors decided to publicly communicate about their vulnerable products (OSISoft for example), other vendors like Emerson and General electric keep the information only for their customers and finally some vendors are still investigating if their products are vulnerable to Meltdown and Spectre. <a href="https://www.theregister.co.uk/2018/01/18/ics_cert_meltdown_responses/">Link to the article</a><br />
<em>For more information on Meltdown and Spectre vulnerabilities, you can read this <a href="http://www.securityinsider-wavestone.com/2018/01/meltdown-spectre-attaques-par-canaux-auxilliaires.html">post by Wavestone on Security Insider</a> [French]</em></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10530" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image13-287x191.jpg" alt="" width="287" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image13-287x191.jpg 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image13-59x39.jpg 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image13.jpg 350w" sizes="auto, (max-width: 287px) 100vw, 287px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Researchers find 147 vulnerabilities in 34 SCADA mobile applications (<em>SC Magazine, January 11th</em>)</strong></p>
<p>IoActive and Embedi researchers found 147 vulnerabilities in 34 mobile applications used in tandem with Supervisory Control and Data Acquisition (SCADA) systems. The top vulnerabilities were: code tampering flaws, insecure authorization, insecure data storage&#8230; This security weaknesses could allow an attacker to compromise industrial network infrastructure by exploiting the vulnerable applications. <a href="https://www.scmagazine.com/the-top-security-weaknesses-were-code-tampering-flaws-which-were-found-in-94-percent-of-apps/article/736656/">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10532" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image14.png" alt="" width="246" height="72" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image14.png 246w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image14-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image14-245x72.png 245w" sizes="auto, (max-width: 246px) 100vw, 246px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Industrial Cybersecurity Firm Nozomi Networks Raises $15 Million (<em>Security Week, January 10th</em>)</strong></p>
<p>Nozomi is an industrial cybersecurity firm that has recently raised $23.8 million. Nozomi’s offering which is “SCADAguardian”, consists on using machine learning and behavioral analysis to detect zero-day attacks in real-time. This technology allows rapid response to alerts by ICS incident alerting and notification systems. The company said the additional funding will be used to support worldwide expansion of marketing, sales, support and product innovation. <a href="https://www.securityweek.com/industrial-cybersecurity-firm-nozomi-networks-raises-15-million">Link to the article</a></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2>&gt;&gt;Main ICS vulnerabilities</h2>
<table style="height: 705px; width: 701px; border-color: #ffffff;" cellpadding="3">
<tbody>
<tr style="height: 26px; background-color: #d1cdcd;">
<td style="width: 67.6042px; height: 26px; text-align: center;"><strong>Date</strong></td>
<td style="width: 66.4931px; height: 26px; text-align: center;"><strong>CVSS v3</strong></td>
<td style="width: 128.715px; height: 26px; text-align: center;"><strong>Equipment</strong></td>
<td style="width: 308.715px; height: 26px; text-align: center;"><strong>Vulnerability</strong></td>
<td style="width: 82.0486px; height: 26px; text-align: center;"><strong>Advisory</strong></td>
</tr>
<tr style="height: 53px;">
<td style="width: 67.6042px; height: 53px; text-align: center;">Feb. 15<sup>th</sup></td>
<td style="width: 66.4931px; height: 53px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 53px;">Nortek Linear eMerge E3 Series</td>
<td style="width: 308.715px; height: 53px;">Command Injection</td>
<td style="width: 82.0486px; height: 53px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-046-02">Link</a></td>
</tr>
<tr style="height: 74px;">
<td style="width: 67.6042px; height: 74px; text-align: center;">Feb. 15<sup>th</sup></td>
<td style="width: 66.4931px; height: 74px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 74px;">GE D60 Line Distance Relay</td>
<td style="width: 308.715px; height: 74px;">Stack-based Buffer Overflow, Improper Restriction of Operations within the Bounds of a Memory Buffer</td>
<td style="width: 82.0486px; height: 74px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-046-02">Link</a></td>
</tr>
<tr style="height: 98px;">
<td style="width: 67.6042px; height: 98px; text-align: center;">Feb. 13<sup>th</sup></td>
<td style="width: 66.4931px; height: 98px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 98px;">Wago PFC200 Series</td>
<td style="width: 308.715px; height: 98px;">Execution of some unauthenticated commands such as reading, writing, or deleting arbitrary files, or manipulate the PLC application during runtime.</td>
<td style="width: 82.0486px; height: 98px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-044-01">Link</a></td>
</tr>
<tr style="height: 54px;">
<td style="width: 67.6042px; height: 54px; text-align: center;">Feb. 8<sup>th</sup></td>
<td style="width: 66.4931px; height: 54px; text-align: center;">9.9</td>
<td style="width: 128.715px; height: 54px;">Gemalto Sentinel License Manager</td>
<td style="width: 308.715px; height: 54px;">Null Pointer Dereference, Buffer Overflows, Improper Access Control.</td>
<td style="width: 82.0486px; height: 54px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-032-03">Link</a></td>
</tr>
<tr style="height: 74px;">
<td style="width: 67.6042px; height: 74px; text-align: center;">Feb. 1<sup>st</sup></td>
<td style="width: 66.4931px; height: 74px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 74px;">3S-Smart Software Solutions GmbH Codesys Web Server</td>
<td style="width: 308.715px; height: 74px;">Stack-based Buffer Overflow.</td>
<td style="width: 82.0486px; height: 74px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-032-02">Link</a></td>
</tr>
<tr style="height: 12.042px;">
<td style="width: 67.6042px; height: 12.042px; text-align: center;">Jan. 25<sup>th</sup></td>
<td style="width: 66.4931px; height: 12.042px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 12.042px;">Nari PCS-9611</td>
<td style="width: 308.715px; height: 12.042px;">Improper Input Validation.</td>
<td style="width: 82.0486px; height: 12.042px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-025-01">Link</a></td>
</tr>
<tr style="height: 54px;">
<td style="width: 67.6042px; height: 54px; text-align: center;">Jan. 11<sup>th</sup></td>
<td style="width: 66.4931px; height: 54px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 54px;">Phoenix Contact FL Switch</td>
<td style="width: 308.715px; height: 54px;">Improper Authorization, Information Exposure.</td>
<td style="width: 82.0486px; height: 54px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03">Link</a></td>
</tr>
<tr style="height: 74px;">
<td style="width: 67.6042px; height: 74px; text-align: center;">Jan. 9<sup>th</sup></td>
<td style="width: 66.4931px; height: 74px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 74px;">General Motors and Shanghai OnStar (SOS) iOS Client.</td>
<td style="width: 308.715px; height: 74px;">Cleartext Storage of Sensitive Information, Man-in-the-Middle, Improper Authentication.</td>
<td style="width: 82.0486px; height: 74px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-17-234-04">Link</a></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2>&gt;&gt;Recent and upcoming ICS events</h2>
<figure id="post-10532 media-10532" class="align-none"></figure>
<table style="height: 679px; width: 701px;" border="1" cellpadding="10">
<tbody>
<tr>
<td style="width: 104.688px; text-align: center;">
<figure id="post-10556 media-10556" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></figure>
<p>Apr. 24-26</td>
<td style="width: 558.021px;"><a href="https://icscybersecurity.iqpc.co.uk/">ICS Cyber security</a></p>
<p>London, UK</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Apr. 24-26</td>
<td style="width: 558.021px;"><a href="https://www.industrialiotseries.com/europe/">Industrial control systems (ICS) Cyber Security Conference</a></p>
<p>Singapore</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Apr. 9-10</td>
<td style="width: 558.021px;"><a href="https://www.cs4ca.com/mena/">Cyber Security for critical assets MENA</a></p>
<p>Dubai, UAE</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Mar. 27-29</td>
<td style="width: 558.021px;"><a href="https://cybersecurityme.iqpc.ae/">Cyber Security for Energy &amp; Utilities</a></p>
<p>Abu Dhabi, UAE</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Mar. 13-14</td>
<td style="width: 558.021px;"><a href="https://www.maritimecybersec.com/">Maritime Cyber Security</a></p>
<p>London, U.K</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Mar. 6-7</td>
<td style="width: 558.021px;"><a href="https://www.cs4ca.com/usa/">Cyber Security for critical assets USA</a></p>
<p>Houston, USA</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/ics-news-1-en/">Industrial Control System Cybersecurity News #1 &#8211; What to remember from 2017?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
