Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Why are there so many articles about PLCs on the Internet where they specifically say they're vulnerable to attacks from Iran?

Why are there so many articles about PLCs on the Internet where they specifically say they're vulnerable to attacks from Iran?

Scheduled Pinned Locked Moved Uncategorized
36 Posts 13 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cr0w@infosec.exchangeC cr0w@infosec.exchange

    @mttaggart @da_667 @nerdpr0f CISA appears to no longer be any more than three DOGE kids in a trenchcoat with a pile of cocaine. I don't expect citations from them anymore as I don't hardly trust them anymore. We can discuss some of that elsewhere when I get my brain in that mode, but there has been so much advice from CISA that appears to just be "Grok, search for Iran and rehash something to make it sound current and relevant."

    da_667@infosec.exchangeD This user is from outside of this forum
    da_667@infosec.exchangeD This user is from outside of this forum
    da_667@infosec.exchange
    wrote last edited by
    #22

    @cR0w @mttaggart @nerdpr0f

    CISAs haunted

    "what"

    grabs cyber shotgun

    CISAs haunted.

    cr0w@infosec.exchangeC 1 Reply Last reply
    0
    • viss@mastodon.socialV viss@mastodon.social

      @da_667 @rootwyrm @cR0w @nerdpr0f

      oh like target!
      some hvac vendor came in and thats how they got all their registers infected.

      yeah every time theres "big news"(tm) with nation state attackers everyone goes OH NO THEY CAN GO AFTER HYDRO AND POWER AND BANKS AND HOSPITALS

      of course thats where they would go

      all those verticals intentionally avoid security at nearly all cost all the time.

      they're the lowest hanging fruit

      viss@mastodon.socialV This user is from outside of this forum
      viss@mastodon.socialV This user is from outside of this forum
      viss@mastodon.social
      wrote last edited by
      #23

      @da_667 @rootwyrm @cR0w @nerdpr0f when i worked at sempra energy, one of the things i got to do was "vendor security reviews". that means doing assessments on shit rando business units wanted to buy or setup.

      they would OPEN THE DISCUSSION with the phrase:

      "tell me when youre done with your assessment, so we can file the risk acceptance forms".

      meaning they had zero interest in the report, because they were gonna bypass it no matter what was in it

      none@infosec.exchangeN B 2 Replies Last reply
      1
      0
      • da_667@infosec.exchangeD da_667@infosec.exchange

        @cR0w @mttaggart @nerdpr0f

        CISAs haunted

        "what"

        grabs cyber shotgun

        CISAs haunted.

        cr0w@infosec.exchangeC This user is from outside of this forum
        cr0w@infosec.exchangeC This user is from outside of this forum
        cr0w@infosec.exchange
        wrote last edited by
        #24

        @da_667 @mttaggart @nerdpr0f

        Link Preview Image
        1 Reply Last reply
        0
        • viss@mastodon.socialV viss@mastodon.social

          @da_667 @rootwyrm @cR0w @nerdpr0f when i worked at sempra energy, one of the things i got to do was "vendor security reviews". that means doing assessments on shit rando business units wanted to buy or setup.

          they would OPEN THE DISCUSSION with the phrase:

          "tell me when youre done with your assessment, so we can file the risk acceptance forms".

          meaning they had zero interest in the report, because they were gonna bypass it no matter what was in it

          none@infosec.exchangeN This user is from outside of this forum
          none@infosec.exchangeN This user is from outside of this forum
          none@infosec.exchange
          wrote last edited by
          #25

          @Viss @da_667 @rootwyrm @cR0w @nerdpr0f mandatory plug of https://youtu.be/9IG3zqvUqJY

          1 Reply Last reply
          0
          • R relay@relay.mycrowd.ca shared this topic
            R relay@relay.publicsquare.global shared this topic
          • nerdpr0f@infosec.exchangeN nerdpr0f@infosec.exchange

            @cR0w Eh, that's just contextualizing to make the risk seem more immediate. Everyone is worried about Iran right now, so it makes sense for articles intended to increase anxiety to be oriented around them.

            multisn8@mastodon.catgirl.cloudM This user is from outside of this forum
            multisn8@mastodon.catgirl.cloudM This user is from outside of this forum
            multisn8@mastodon.catgirl.cloud
            wrote last edited by
            #26

            @nerdpr0f @cR0w Figuring the same, causality could be the other way around. Iran takes up a lot of collective {mind,news}space right now, leaving writers to think "oh Damn what could They possibly Do to Our Sacred Infrastructure". The leap isn't far to grab the next best thing, it just turns out a general vulnerability is prone to abuse from Iranian hackers as well

            multisn8@mastodon.catgirl.cloudM 1 Reply Last reply
            0
            • multisn8@mastodon.catgirl.cloudM multisn8@mastodon.catgirl.cloud

              @nerdpr0f @cR0w Figuring the same, causality could be the other way around. Iran takes up a lot of collective {mind,news}space right now, leaving writers to think "oh Damn what could They possibly Do to Our Sacred Infrastructure". The leap isn't far to grab the next best thing, it just turns out a general vulnerability is prone to abuse from Iranian hackers as well

              multisn8@mastodon.catgirl.cloudM This user is from outside of this forum
              multisn8@mastodon.catgirl.cloudM This user is from outside of this forum
              multisn8@mastodon.catgirl.cloud
              wrote last edited by
              #27

              @nerdpr0f @cR0w "their heinious foreign hacking" vs "our glorious protective FISA"

              1 Reply Last reply
              0
              • da_667@infosec.exchangeD da_667@infosec.exchange

                @cR0w @nerdpr0f even more important than that for power generation and distribution, it was the wildlife and the climate that was a bigger threat than any of those things.

                gsuberland@chaos.socialG This user is from outside of this forum
                gsuberland@chaos.socialG This user is from outside of this forum
                gsuberland@chaos.social
                wrote last edited by
                #28

                @da_667 @cR0w @nerdpr0f weather, wildlife, and human error. the movie scenarios of mass cyber attacks are nonsense. most of the "cyber" happening with ICS/SCADA environments comes down to regular ransomware shit and phishing. even in the marine sector the biggest threat was pirate groups sending fake emails claiming to be the coastguard or a port authority telling the captain to redirect into unprotected waters, so they could steal the vessel's fuel. it ain't sophisticated at all.

                cr0w@infosec.exchangeC 1 Reply Last reply
                0
                • gsuberland@chaos.socialG gsuberland@chaos.social

                  @da_667 @cR0w @nerdpr0f weather, wildlife, and human error. the movie scenarios of mass cyber attacks are nonsense. most of the "cyber" happening with ICS/SCADA environments comes down to regular ransomware shit and phishing. even in the marine sector the biggest threat was pirate groups sending fake emails claiming to be the coastguard or a port authority telling the captain to redirect into unprotected waters, so they could steal the vessel's fuel. it ain't sophisticated at all.

                  cr0w@infosec.exchangeC This user is from outside of this forum
                  cr0w@infosec.exchangeC This user is from outside of this forum
                  cr0w@infosec.exchange
                  wrote last edited by
                  #29

                  @gsuberland @da_667 @nerdpr0f I'm with you but you have to add the shitty firewall vulns in there in recent years too with ransomware and phishing.

                  gsuberland@chaos.socialG 1 Reply Last reply
                  0
                  • cr0w@infosec.exchangeC cr0w@infosec.exchange

                    @gsuberland @da_667 @nerdpr0f I'm with you but you have to add the shitty firewall vulns in there in recent years too with ransomware and phishing.

                    gsuberland@chaos.socialG This user is from outside of this forum
                    gsuberland@chaos.socialG This user is from outside of this forum
                    gsuberland@chaos.social
                    wrote last edited by
                    #30

                    @cR0w @da_667 @nerdpr0f yeah point being it's overwhelmingly just regular IT stuff where the attackers aren't interested in the OT environments at all. and when they do want something novel, like on the ships, it's never sophisticated. just the most basic technique possible to get the result.

                    cr0w@infosec.exchangeC gsuberland@chaos.socialG 2 Replies Last reply
                    0
                    • gsuberland@chaos.socialG gsuberland@chaos.social

                      @cR0w @da_667 @nerdpr0f yeah point being it's overwhelmingly just regular IT stuff where the attackers aren't interested in the OT environments at all. and when they do want something novel, like on the ships, it's never sophisticated. just the most basic technique possible to get the result.

                      cr0w@infosec.exchangeC This user is from outside of this forum
                      cr0w@infosec.exchangeC This user is from outside of this forum
                      cr0w@infosec.exchange
                      wrote last edited by
                      #31

                      @gsuberland @da_667 @nerdpr0f Ah, I gotcha. Yeah, people tend to think it's either an accident an actor made their way into OT space ( often is ) or they're targeting it and using whatever new mythical version of is discussed in the forums or Telegram channels or whatever.

                      1 Reply Last reply
                      0
                      • gsuberland@chaos.socialG gsuberland@chaos.social

                        @cR0w @da_667 @nerdpr0f yeah point being it's overwhelmingly just regular IT stuff where the attackers aren't interested in the OT environments at all. and when they do want something novel, like on the ships, it's never sophisticated. just the most basic technique possible to get the result.

                        gsuberland@chaos.socialG This user is from outside of this forum
                        gsuberland@chaos.socialG This user is from outside of this forum
                        gsuberland@chaos.social
                        wrote last edited by
                        #32

                        @cR0w @da_667 @nerdpr0f hell even when it's state actors they just pick the simple stuff. IGRC needed to make it hard to navigate when they ("allegedly") stuck a limpet mine to the side of that fuel tanker near the Strait of Hormuz a few years ago. did they use an RCE to get into the ship's OT network, then pivot to the ECDIS to lock out navigation assistance? of course not, they just used a cheap radio jammer to make them lose GPS lock.

                        1 Reply Last reply
                        0
                        • R relay@relay.infosec.exchange shared this topic
                        • viss@mastodon.socialV viss@mastodon.social

                          @da_667 @rootwyrm @cR0w @nerdpr0f when i worked at sempra energy, one of the things i got to do was "vendor security reviews". that means doing assessments on shit rando business units wanted to buy or setup.

                          they would OPEN THE DISCUSSION with the phrase:

                          "tell me when youre done with your assessment, so we can file the risk acceptance forms".

                          meaning they had zero interest in the report, because they were gonna bypass it no matter what was in it

                          B This user is from outside of this forum
                          B This user is from outside of this forum
                          bakachu@infosec.exchange
                          wrote last edited by
                          #33

                          @Viss @da_667 @rootwyrm @cR0w @nerdpr0f i'm at the point now where that kind of honesty is refreshing. even though it's still terrible.

                          B 1 Reply Last reply
                          0
                          • B bakachu@infosec.exchange

                            @Viss @da_667 @rootwyrm @cR0w @nerdpr0f i'm at the point now where that kind of honesty is refreshing. even though it's still terrible.

                            B This user is from outside of this forum
                            B This user is from outside of this forum
                            bakachu@infosec.exchange
                            wrote last edited by
                            #34

                            @Viss @da_667 @rootwyrm @cR0w @nerdpr0f ....buuuuut i'd then say something like 'oh ok and your CRO is going to sign off on that?'

                            1 Reply Last reply
                            0
                            • viss@mastodon.socialV viss@mastodon.social

                              @da_667 @rootwyrm @cR0w @nerdpr0f

                              oh like target!
                              some hvac vendor came in and thats how they got all their registers infected.

                              yeah every time theres "big news"(tm) with nation state attackers everyone goes OH NO THEY CAN GO AFTER HYDRO AND POWER AND BANKS AND HOSPITALS

                              of course thats where they would go

                              all those verticals intentionally avoid security at nearly all cost all the time.

                              they're the lowest hanging fruit

                              tim_lavoie@cosocial.caT This user is from outside of this forum
                              tim_lavoie@cosocial.caT This user is from outside of this forum
                              tim_lavoie@cosocial.ca
                              wrote last edited by
                              #35

                              @Viss @da_667 @rootwyrm @cR0w @nerdpr0f Have you ever tried to convince a doctor in a health care setting, that they actually have to log into things?

                              viss@mastodon.socialV 1 Reply Last reply
                              0
                              • tim_lavoie@cosocial.caT tim_lavoie@cosocial.ca

                                @Viss @da_667 @rootwyrm @cR0w @nerdpr0f Have you ever tried to convince a doctor in a health care setting, that they actually have to log into things?

                                viss@mastodon.socialV This user is from outside of this forum
                                viss@mastodon.socialV This user is from outside of this forum
                                viss@mastodon.social
                                wrote last edited by
                                #36

                                @tim_lavoie @da_667 @rootwyrm @cR0w @nerdpr0f with two exceptions, every medical professional ive ever met or known outside of a professional setting squarely puts the 'tech' of their clinic or hospital into the "someone elses problem" category. their position is it should be up to the 'tech people' to sort that shit out.

                                every hospital/clinic ive ever talked to refused to pay more than $5 for anything IT or security related. like they just outright refuse. completely. every time.

                                1 Reply Last reply
                                0
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups