"Widely Available ICS Attack Tools Lower the Barrier for Attackers"

As the number of publicly available ICS-specific intrusion and attack tools increases, the possibility of successful attacks against ICS grows. FireEye researchers have pointed out that specialized skills are often needed to execute attacks against such systems. However, ICS attack tools are often developed by those that are highly knowledgable about ICS, allowing threat actors to use these tools to launch attacks without having much experience. Researchers found that most publicly available ICS-specific cyber operation tools have been developed in the last ten years, are vendor agnostic, and were created to target solutions widely used by the largest ICS original equipment manufacturers. It essential for organizations to be aware of the increasing availability of ICS cyber operation tools so that they can continue to bolster or develop new cybersecurity defense mechanisms. This article continues to discuss the growing availability of ICS attacks tools, what researchers have discovered about publicly available ICS-specific cyber operation tools, and the importance of raising awareness about the proliferation of these tools. 

Help Net Security reports "Widely Available ICS Attack Tools Lower the Barrier for Attackers"

 

Submitted by Anonymous on