In a startling turn of events, Johnson Controls, a global leader in smart buildings and energy management, has fallen victim to a devastating cyberattack. This attack has left nearly 100,000 Industrial Control Systems (ICS) services exposed to the Internet, putting the company and its customers at significant risk.
The FBI has expressed concerns over this cybersecurity incident, as it anticipates an increase in Chinese and Russian targeting of the energy sector. These nations have long been engaged in cyber espionage and have a track record of exploiting vulnerabilities in critical infrastructure. The latest attack on Johnson Controls highlights the importance of remaining vigilant and implementing robust security measures to protect against such threats.
Adding to the growing concerns is a joint advisory warning issued by cybersecurity experts about Beijing’s “BlackTech” threat activity. This highly sophisticated and organized cybercrime group has been known to target critical infrastructure systems, including those in the energy sector. The advisory serves as a stark reminder of the constant threat posed by state-sponsored cyber actors and the need for proactive defense strategies.
In response to the escalating cyber threats faced by the energy sector and other critical industries, the Cybersecurity and Infrastructure Security Agency (CISA) has emphasized the importance of hardware bills of materials. These bills provide a comprehensive list of all components used in a system, enabling organizations to identify and mitigate potential vulnerabilities. CISA’s push for the implementation of hardware bills of materials is a step towards strengthening the cybersecurity defenses of the US industrial base.
To shed more light on the issue and discuss ways to enhance community defense, Michael Toecker, a Cyber Security Advisor at the United States Department of Energy’s Office of Cybersecurity, Energy Security, and Emergency Response, shares his valuable insights. Toecker emphasizes the importance of a collaborative approach to cybersecurity and highlights the significance of programs like Neighborhood Keeper in fostering a strong sense of community defense.
Meanwhile, on the Learning Lab, Mark Urban invites Alex Baretta, a senior solution architect at Dragos, to delve deeper into the topic of secure remote access. Both experts explore the challenges and best practices associated with enabling secure remote access to critical systems, especially in the context of an increasingly digitized world. Their discussion aims to raise awareness and help organizations make informed decisions when it comes to implementing secure remote access solutions.
The cyberattack on Johnson Controls serves as a stark reminder of the escalating cyber threats faced by critical infrastructure systems. This incident highlights the need for proactive defense strategies and the implementation of robust cybersecurity measures. With the FBI anticipating an increase in targeting by Chinese and Russian actors, it is crucial for organizations in the energy sector and beyond to remain vigilant and fortified against potential attacks.
The joint advisory warning about Beijing’s “BlackTech” threat activity sends a strong message about the sophistication and persistence of state-sponsored cyber actors. This warning serves as a call to action for organizations to strengthen their cybersecurity defenses and adopt proactive measures to detect and mitigate potential threats.
CISA’s emphasis on hardware bills of materials is an important step towards enhancing the cybersecurity posture of the US industrial base. By implementing these bills, organizations can gain a better understanding of the vulnerabilities in their systems and take necessary steps to address them effectively.
The insights shared by Michael Toecker shed light on the significance of community defense and collaborative cybersecurity efforts. Programs like Neighborhood Keeper can play a crucial role in fostering a strong sense of community defense and enabling organizations to pool resources and expertise in the face of cyber threats.
Meanwhile, Mark Urban and Alex Baretta’s discussion on secure remote access provides valuable insights into the challenges and best practices associated with enabling secure access to critical systems. As organizations increasingly rely on remote access solutions, it is vital to implement robust security measures to protect against potential breaches and unauthorized access.
In conclusion, the cyberattack on Johnson Controls serves as a wake-up call for organizations across industries to prioritize cybersecurity and adopt proactive measures to protect against potential threats. The joint advisory warning about Beijing’s “BlackTech” threat activity further underscores the need for heightened vigilance and robust defense strategies. The emphasis on hardware bills of materials by CISA and the insights shared by experts like Michael Toecker and Alex Baretta contribute to the collective efforts aimed at fortifying the cybersecurity defenses of critical infrastructure and the US industrial base.

