• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa urges manufacturers eliminate default passwords to thwart cyber threats

CISA Urges Manufacturers Eliminate Default Passwords to Thwart Cyber Threats

You are here: Home / General Cyber Security News / CISA Urges Manufacturers Eliminate Default Passwords to Thwart Cyber Threats
December 18, 2023

The U.S. Cybersecurity and Infrastructure Security Company (CISA) is urging producers to get rid of default passwords on internet-exposed devices completely, citing intense pitfalls that could be exploited by malicious actors to gain first accessibility to, and go laterally inside of, corporations.

In an inform revealed previous week, the agency called out Iranian threat actors affiliated with the Islamic Groundbreaking Guard Corps (IRGC) for exploiting operational technology devices with default passwords to achieve entry to critical infrastructure programs in the U.S.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Default passwords refer to factory default program configurations for embedded programs, devices, and appliances that are generally publicly documented and identical between all devices inside of a vendor’s solution line.

As a end result, threat actors could scan for internet-exposed endpoints making use of equipment like Shodan and attempt to breach them by way of default passwords, frequently getting root or administrative privileges to conduct put up-exploitation actions based on the type of the program.

“Appliances that appear preset with a username and password mix pose a really serious menace to companies that do not alter it publish installation, as they are easy targets for an adversary,” MITRE notes.

Forthcoming WEBINAR Conquer AI-Powered Threats with Zero Belief – Webinar for Security Experts

Traditional security actions will not minimize it in present-day environment. It is really time for Zero Rely on Security. Protected your info like in no way before.

Be a part of Now

Earlier this month, CISA disclosed that IRGC-affiliated cyber actors using the persona Cyber Av3ngers are actively focusing on and compromising Israeli-designed Unitronics Vision Series programmable logic controllers (PLCs) that are publicly uncovered to the internet through the use of default passwords (“1111”).

“In these attacks, the default password was extensively known and publicized on open up forums wherever danger actors are acknowledged to mine intelligence for use in breaching U.S. units,” the company added.

Default Passwords

As mitigation steps, companies are being urged to stick to safe by design and style principles and give exceptional setup passwords with the merchandise, or alternatively disable these passwords right after a preset time period and need users to help phishing-resistant multi-factor authentication (MFA) solutions.

The agency even more advised vendors to conduct area exams to decide how their shoppers are deploying the goods inside of their environments and if they include the use of any unsafe mechanisms.

“Examination of these area tests will assistance bridge the gap involving developer anticipations and true client utilization of the solution,” CISA pointed out in its advice.

Default Passwords

“It will also assist identify strategies to create the merchandise so clients will be most probable to securely use it—manufacturers should ensure that the best route is the protected one particular.”

The disclosure will come as the Israel Countrywide Cyber Directorate (INCD) attributed a Lebanese threat actor with connections to the Iranian Ministry of Intelligence for orchestrating cyber attacks concentrating on critical infrastructure in the country amidst its ongoing war with Hamas given that October 2023.

The attacks, which include the exploitation of recognised security flaws (e.g., CVE-2018-13379) to attain delicate information and deploy destructive malware, have been tied to an attack group named Plaid Rain (previously Polonium).

Cybersecurity

The improvement also follows the release of a new advisory from CISA that outlines security countermeasures for health care and critical infrastructure entities to fortify their networks towards opportunity malicious action and decrease the chance of area compromise –

  • Implement potent passwords and phishing-resistant MFA
  • Make sure that only ports, protocols, and companies with validated company desires are jogging on every single method
  • Configure Support accounts with only the permissions needed for the expert services they work
  • Transform all default passwords for purposes, functioning programs, routers, firewalls, wireless access details, and other methods
  • Discontinue reuse or sharing of administrative credentials among user/administrative accounts
  • Mandate dependable patch management
  • Carry out network segregation controls
  • Evaluate the use of unsupported components and computer software and discontinue the place attainable
  • Encrypt personally identifiable details (PII) and other sensitive info

On a connected take note, the U.S. Nationwide Security Company (NSA), Place of work of the Director of National Intelligence (ODNI), and CISA printed a listing of recommended practices that companies can adopt in get to harden the software provide chain and make improvements to the security of their open-source computer software administration processes.

“Businesses that do not stick to a reliable and safe-by-design management apply for the open resource software program they make the most of are much more probable to turn out to be vulnerable to recognized exploits in open source deals and experience more trouble when reacting to an incident,” claimed Aeva Black, open up-resource software package security direct at CISA.

Identified this post exciting? Stick to us on Twitter  and LinkedIn to go through much more unique material we article.


Some areas of this article are sourced from:
thehackernews.com

Previous Post: «mongodb suffers security breach, exposing customer data MongoDB Suffers Security Breach, Exposing Customer Data
Next Post: QakBot Malware Resurfaces with New Tactics, Targeting the Hospitality Industry qakbot malware resurfaces with new tactics, targeting the hospitality industry»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.