"Researcher Shows How Adversaries Can Gather Intel on U.S. Critical Infrastructure"
A researcher known as Wojciech used open source intelligence (OSINT) and a tool that he developed, called Kamerka, to demonstrate the ease at which adversaries can collect intelligence on U.S. critical infrastructure. Through the use of the Kamerka tool, Wojciech was able to discover 26,000 internet-exposed industrial control system (ICS) devices in the U.S. The tool also allowed Wojciech to determine the geographical locations of these industrial controls systems as well as the critical infrastructure targets that would be the most attractive to threat actors. Atlanta, Houston, Chicago, New York, Denver, and Philadelphia are the cities in which the highest percentage of these ICS devices were found. This article continues to discuss Kamerka's capabilities, the discovery of exposed ICS devices in the U.S., the vulnerabilities contained by such devices, and the potential use of OSINT by adversaries to perform reconnaissance on U.S. critical infrastructure.