HackDig : Dig high-quality web security articles for hacker

Dragonfly 2.0: the sophisticated attack group is back with destructive purposes

While the first Dragonfly campaigns appear to have been a more reconnaissance phase, the Dragonfly 2.0 campaign seems to have destructive purposes. Symantec has spotted a new wave of cyber attacks against firms in the energy sector powered by the notorious Dragonfly group. The Dragonfly group, also known as Energetic Bear, has been active since at least 2011
Publish At:2017-09-07 16:19 | Read:3517 | Comments:0 | Tags:APT Breaking News Hacking critical infrastructure Dragonfly

Malware posing as Siemens PLC application is targeting ICS worldwide

Findings of the MIMICS project conducted by Dragos Threat Operations Center show a malware posing as Siemens PLC application is targeting ICS worldwide. After the disclosure of the Stuxnet case, the security industry started looking at ICS malware with increasing attention. A malware that infects an industrial control system could cause serious damages and p
Publish At:2017-03-26 01:15 | Read:3923 | Comments:0 | Tags:Breaking News Hacking Malware BlackEnergy Havex ICS malware

SCADA Sssh! Don’t Talk, Filter it

The effects of cyber-attacks against SCADA/ICS are well known, however, there is a great confusion when dealing with mitigation techniques. The Majority are aware of the impact cyber-attacks can have on Industrial Control Systems however, the reality in terms of mitigation techniques are shrouded with confusion and a reactive approach. Recent 0-day vulnerabi
Publish At:2016-11-10 06:35 | Read:4782 | Comments:0 | Tags:Breaking News Hacking Havex ICS Panel Shock SCADA stuxnet ze

Malware Found Inside Downed Ukrainian Grid Management Points to Cyber-attack

The Burshtyn TES power plant in Ivano-Frankivsk Oblast, Ukraine. It’s not clear if Burshtyn was affected, but power outages did affect the grid in the Ivano-Frankivsk Oblast region. Image: Raimond Spekking/Wikimedia Commons Overview On December 23, a Ukrainian power company announced that a section of the country had gone dark. This temporary outage w
Publish At:2016-01-06 06:55 | Read:5215 | Comments:0 | Tags:Cyber Security Cyber Security Research Cyber Warfare Securit

Financial malware poses as ICS/SCADA Software

Researcher Kyle Wilhoit discovered a spike in traditional financial crimeware targeting ICS/SCADA networks attributing it to attack run by cyber criminals. The senior threat researcher with Trend Micro, Kyle Wilhoit, has recently discovered 13 different types of crimeware disguised as new versions for human machine interface (
Publish At:2015-01-11 08:05 | Read:3515 | Comments:0 | Tags:Cyber Crime Malware BlackEnergy crimeware Havex HMI ICS malw

64-bit Version of HAVEX Spotted

The remote access tool (RAT) HAVEX became the focus of the security industry after it was discovered to have played a major role in a campaign targeting industrial control systems (ICS). While observing HAVEX detections (known by different vendors as Dragonfly, Energetic Bear, and Crouching Yeti), we noticed something interesting. The Dragonfly campaign was
Publish At:2014-12-30 12:00 | Read:3728 | Comments:0 | Tags:Malware 64-bit HAVEX targeted attacks

ICS-CERT states that manufacturing organization compromised for several months

Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months. According to the ICS-CERT MONITOR report, which summarizes the Industrial Control Systems Cyber Emergency Response Team’s (ICS-CERT) activities between May – August 2014, threat actors
Publish At:2014-10-15 06:00 | Read:2531 | Comments:0 | Tags:Security critical infrastructure Cyber attacks cyber terrori


Share high-quality web security related articles with you:)


Tag Cloud