Submitted by Eric Byres on Tue, 2013-11-12 21:00
Submitted by Eric Byres on Thu, 2013-11-07 13:12
If you have been following SCADA news in the last month, you might have noticed an avalanche of reports and blogs on new security vulnerabilities in power industry equipment. So far, vulnerability disclosures for 9 products using the DNP3 protocol have been released by the ICS-CERT, with another 21 SCADA product disclosures on their way.
Submitted by Eric Byres on Fri, 2013-05-03 16:38
Submitted by thomas.nuth on Thu, 2013-04-18 21:00
Three years ago, the concept of industrial cyber security became a popular discussion topic within the industrial networking community. Now the discussion has risen to the level of heads of state within the international community. The Executive Order – Improving Critical Infrastructure Cybersecurity signed by President Obama in February of this year is just one indication of the importance being attached to this issue.
Submitted by Eric Byres on Thu, 2013-04-11 15:43
In my last blog, I shared some secrets on how to successfully use patching in SCADA and control systems.
This week, I’ll look at the pros and cons of using compensating controls as an alternative to patching, and discuss the requirements for success.
Submitted by Eric Byres on Wed, 2012-10-17 13:23
Submitted by Eric Byres on Fri, 2012-10-12 21:00
Yesterday afternoon I received a note from another security expert that has left me a bit stunned. Like most of you, I assumed that if you are patching your Windows computers on your SCADA or ICS system (using some variation of Microsoft Windows Update), then any vulnerable services that can be patched will be patched. Well guess again – you may still have a number of open vulnerabilities that are happily being missed by the Windows update service.
Submitted by rahulsebos on Mon, 2012-02-20 14:38
The first two weeks of February have been exciting times in the Netherlands, with many cyber security incidents making headlines in the news. One of the most worrisome involved keeping my country, a country that is below sea level, dry. This task is delegated to industrial systems - and one would expect the safety of millions of people properly managed and kept up to the highest standards. But is it?
Submitted by Eric Byres on Fri, 2012-01-20 14:08
I am flying home from Digital Bond’s S4 SCADA Security Symposium as I write this (BTW this was a stellar event where, even as a security expert, I learnt an amazing amount). After listening to two days of excellent, but scary talks, the first thing that comes to mind is “SCADA/ICS security is in worse shape than I thought”. Much worse shape…
Submitted by Eric Byres on Fri, 2011-12-16 09:31
On December 12, Rubén Santamarta publicly announced details of multiple vulnerabilities affecting the Schneider Electric Quantum Ethernet Module. These are serious vulnerabilities, involving hard-coded passwords that give an attacker complete access to the device. As Reid Wightman puts it
Submitted by Eric Byres on Thu, 2011-08-04 15:07
My optimism regarding Siemens and its approach to SCADA/ICS security has just taken another big hit. There are major security problems at Siemens and they are not close to fixing them.
I am embarrassed I gave them such high marks in my previous blogs.
Submitted by Eric Byres on Thu, 2011-07-07 14:30
This article continues our review of Siemens’ announcements and posture regarding cyber security as reflected at their Automation Summit last week. Part 1 of this post was published yesterday.
New Siemens Products for Enhanced Cyber Security
Christoph Lehmann, from Siemens Germany, focused on many of the new products and services that Siemens is currently developing (or has recently released) to improve control system security. A few noteworthy ones are mentioned here.
Submitted by Eric Byres on Wed, 2011-07-06 12:44
The Siemens Automation Summit was held last week and both Joel Langill and I attended it, presented at it, and engaged in social media commentary regarding it. This article will summarize our opinion of Siemens’ announcements and posture regarding cyber security as we reflected on the conference. We assign grades to various aspects of Siemens’ cyber security measures or policies, and we will sum it up with a final grade at the end of Part 2.
Submitted by Eric Byres on Mon, 2011-06-13 16:24
Over the past week, I have been digging into the Siemens S7 PLC vulnerabilities that were discovered by Dillon Beresford at NSS Labs in May. In the first blog article, I analyzed the contradictory information being circulated in an attempt to scrape out a few facts and guesses on what PLC products are actually affected and what the nature of the vulnerabilities are.
Submitted by Eric Byres on Fri, 2011-06-10 16:24
In my previous blog, I analyzed the contradictory information being circulated regarding the Siemens S7 PLC vulnerabilities that were discovered by Dillon Beresford at NSS Labs in May. By studying the various Siemens and NSS notices, we were able to scrape out a few facts.
Submitted by Eric Byres on Thu, 2011-06-09 14:32
The recent news that Dillon Beresford at NSS Labs had discovered somewhere between four and six serious vulnerabilities in the Siemens S7 PLC product has created quite a storm of news and concern for critical asset owners. Unfortunately, information on the range and severity of the vulnerabilities has been contradictory.
Submitted by Eric Byres on Tue, 2011-05-31 15:26
Submitted by Eric Byres on Wed, 2011-03-23 10:17
Selling the concept of security for SCADA and ICS might still be struggling, but publishing vulnerabilities for SCADA and ICS equipment seems to be a growth industry.
Thirty-Four SCADA Product Vulnerabilities
On Monday an Italian “Security Researcher” published a raft of vulnerabilities (34 in all) against four SCADA products. Below are the affected products with links to the US-CERT announcements:
Submitted by Eric Byres on Thu, 2011-03-03 12:23
The Oscars are over and the film about Facebook, The Social Network, won three awards. Pretty good – I saw the movie and thought it deserved a few gold statues.
But just as I was getting ready for the Oscar weekend, I received the following email from Facebook:
From: Facebook
Sent: Friday, February 25, 2011 1:17 PM
To: Eric Byres
Subject: Joe Smith posted on your Wall.
Submitted by Eric Byres on Fri, 2011-02-18 09:34
February has not been a good month for ICS and SCADA security, at least not if you want to feel secure.