HomeCyber BalkansCybersecurity Threat: Hackers Targeting PLC Controllers in US Water Management System for...

Cybersecurity Threat: Hackers Targeting PLC Controllers in US Water Management System for Remote Access

Published on

spot_img

A recent Cybersecurity Advisory (CSA) has issued a warning regarding ongoing exploitation attempts by cyber actors affiliated with the Iranian Islamic Revolutionary Guard Corps (IRGC) utilizing the online alias “CyberAv3ngers.” These actors have been actively targeting and compromising Unitronics Vision Series programmable logic controllers (PLCs), specifically those manufactured by the Israeli company Unitronics.

One of the main areas of concern highlighted by the advisory is the targeting of Water and Wastewater Systems (WWS), which are crucial components of critical infrastructure sectors that have widely adopted these PLCs. Apart from WWS, these PLCs are also used in various other sectors, including the energy industry, food and beverage manufacturing, and healthcare facilities.

The nature of these PLCs being frequently exposed to the internet for remote control and monitoring purposes poses a significant risk. The primary focus of the reported compromise seems to be the user interface (UI) of the PLCs, which could potentially render them inoperable. By gaining unauthorized access to these controllers, the threat actors could disrupt critical processes overseen by the PLCs, leading to potentially severe consequences for the targeted infrastructure.

In response to these ongoing exploitation attempts, the CSA strongly advises organizations utilizing Unitronics Vision Series PLCs to implement a layered cybersecurity approach to mitigate the risks. This includes measures such as network segmentation to isolate PLCs from direct internet connectivity whenever possible. Additionally, if remote access is essential, organizations are urged to utilize secure remote access solutions with multi-factor authentication (MFA) and keep the firmware of PLCs associated with control systems up to date.

Prompt patching of known vulnerabilities is emphasized as a crucial step in reducing the attack surface, along with implementing network segmentation to restrict access to PLCs only to authorized personnel and devices. Strong password enforcement and regular password rotation policies for accounts with access to PLCs are also recommended. Organizations are further encouraged to monitor network activity for any anomalous behavior that may indicate unauthorized access attempts.

By adhering to these proactive defensive measures, organizations can significantly lower the risk of successful compromise by cyber actors affiliated with the IRGC, or any other malicious actors targeting critical infrastructure. It is imperative for businesses and entities relying on these PLCs to remain vigilant and stay ahead of evolving cyber threats to safeguard their operations and data integrity.

In conclusion, addressing cybersecurity vulnerabilities in critical infrastructure components like PLCs is crucial to maintaining operational resilience and protecting against potential cyber threats and disruptions. The collaborative efforts of organizations in adopting robust cybersecurity practices are essential in safeguarding the integrity of critical systems and infrastructure.

Source link

Latest articles

Australia’s Social Media Ban Faces Scrutiny

Australia’s Social Media Ban for Minors Faces Scrutiny Amid New Research Findings Australia's recent initiative...

PlugX USB Worm Spreads Across Continents Through DLL Sideloading

New PlugX USB Worm Variant Drives Global Infection Waves A recently identified variant of the...

CISA Expands List of Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software by Adding Six Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently expanded its Known Exploited Vulnerabilities...

Malicious Chrome Extensions Campaign Exposes User Data

A significant cybersecurity breach has come to light, involving the discovery of 108 malicious...

More like this

Australia’s Social Media Ban Faces Scrutiny

Australia’s Social Media Ban for Minors Faces Scrutiny Amid New Research Findings Australia's recent initiative...

PlugX USB Worm Spreads Across Continents Through DLL Sideloading

New PlugX USB Worm Variant Drives Global Infection Waves A recently identified variant of the...

CISA Expands List of Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software by Adding Six Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently expanded its Known Exploited Vulnerabilities...