HomeCyber BalkansControl Loop OT Cybersecurity Briefing - 06.26.23

Control Loop OT Cybersecurity Briefing – 06.26.23

Published on

spot_img

The Port of Nagoya, Japan’s busiest ocean terminal, was hit by a ransomware attack on July 4th, causing the port’s operations to be temporarily suspended. An employee noticed anomalies in the system, leading to the discovery of a ransomware infestation. The port authority is working to restore service and expects to have operations back to normal by July 6th. The attack remains under investigation, and no group has claimed responsibility thus far.

In related news, the US Department of Energy (DOE) was targeted by the Cl0p ransomware gang through the exploitation of the recently disclosed MOVEit file-transfer vulnerability. Multiple government agencies were compromised, including two DOE entities: Oak Ridge Associated Universities and the Waste Isolation Pilot Plant in New Mexico. The DOE took immediate steps to prevent further exposure to the vulnerability and notified the Cybersecurity and Infrastructure Security Agency (CISA) about the incident.

Cl0p also breached Schneider Electric and Siemens Energy using the same vulnerability. Siemens confirmed that no critical data was compromised, and operations remained unaffected. Schneider Electric is currently investigating the cyberattack claim.

The manufacturing and production sectors have seen an increase in ransomware attacks, with compromised credentials and exploited vulnerabilities being the top causes. However, the manufacturing industry has shown a lower propensity to pay ransoms, with more organizations opting to use backups for data recovery. Nonetheless, the percentage of organizations paying high ransoms has increased compared to the previous year.

The Canadian Centre for Cyber Security (CSC) recently released a threat assessment, stating that Russia-aligned threat actors are likely to target Canada’s oil and gas sector to weaken support for Ukraine. The CSC identified bottlenecks in the oil transmission and processing stages as potential targets for cyber threat actors.

The US Government Accountability Office (GAO) published a report highlighting the lack of cybersecurity measures in place for nuclear weapons and manufacturing systems. The National Nuclear Security Administration (NNSA) is still in the early stages of addressing cyber risks in its operational technology and nuclear weapons IT environments.

In the realm of cybercrime, a hacker on a Russophone cybercrime forum is allegedly offering access to a Maxar Technologies US military satellite for $15,000. However, the credibility of this claim is questionable.

Dragos, an industrial security company, released four key lessons for securing the electrical power grid. These include the importance of visibility, network segmentation, secure remote access, and avoiding shared credentials.

Finally, an update on the COSMICENERGY malware reveals that it may not be an immediate threat after all. Initially thought to have the potential to disrupt electrical distribution and critical infrastructure, further research suggests that COSMICENERGY may have been a Russian red teaming tool used in exercises to simulate an electric infrastructure attack.

Overall, these developments highlight the growing threat of ransomware attacks in critical sectors such as energy and manufacturing. It is crucial for organizations to strengthen their cybersecurity measures and remain vigilant against evolving cyber threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...