HomeCyber BalkansCybersecurity Threat: Hackers Targeting PLC Controllers in US Water Management System for...

Cybersecurity Threat: Hackers Targeting PLC Controllers in US Water Management System for Remote Access

Published on

spot_img

A recent Cybersecurity Advisory (CSA) has issued a warning regarding ongoing exploitation attempts by cyber actors affiliated with the Iranian Islamic Revolutionary Guard Corps (IRGC) utilizing the online alias “CyberAv3ngers.” These actors have been actively targeting and compromising Unitronics Vision Series programmable logic controllers (PLCs), specifically those manufactured by the Israeli company Unitronics.

One of the main areas of concern highlighted by the advisory is the targeting of Water and Wastewater Systems (WWS), which are crucial components of critical infrastructure sectors that have widely adopted these PLCs. Apart from WWS, these PLCs are also used in various other sectors, including the energy industry, food and beverage manufacturing, and healthcare facilities.

The nature of these PLCs being frequently exposed to the internet for remote control and monitoring purposes poses a significant risk. The primary focus of the reported compromise seems to be the user interface (UI) of the PLCs, which could potentially render them inoperable. By gaining unauthorized access to these controllers, the threat actors could disrupt critical processes overseen by the PLCs, leading to potentially severe consequences for the targeted infrastructure.

In response to these ongoing exploitation attempts, the CSA strongly advises organizations utilizing Unitronics Vision Series PLCs to implement a layered cybersecurity approach to mitigate the risks. This includes measures such as network segmentation to isolate PLCs from direct internet connectivity whenever possible. Additionally, if remote access is essential, organizations are urged to utilize secure remote access solutions with multi-factor authentication (MFA) and keep the firmware of PLCs associated with control systems up to date.

Prompt patching of known vulnerabilities is emphasized as a crucial step in reducing the attack surface, along with implementing network segmentation to restrict access to PLCs only to authorized personnel and devices. Strong password enforcement and regular password rotation policies for accounts with access to PLCs are also recommended. Organizations are further encouraged to monitor network activity for any anomalous behavior that may indicate unauthorized access attempts.

By adhering to these proactive defensive measures, organizations can significantly lower the risk of successful compromise by cyber actors affiliated with the IRGC, or any other malicious actors targeting critical infrastructure. It is imperative for businesses and entities relying on these PLCs to remain vigilant and stay ahead of evolving cyber threats to safeguard their operations and data integrity.

In conclusion, addressing cybersecurity vulnerabilities in critical infrastructure components like PLCs is crucial to maintaining operational resilience and protecting against potential cyber threats and disruptions. The collaborative efforts of organizations in adopting robust cybersecurity practices are essential in safeguarding the integrity of critical systems and infrastructure.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...