• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

NSA Reveals “Hackers’ Playbook” for OT Attacks

You are here: Home / General Cyber Security News / NSA Reveals “Hackers’ Playbook” for OT Attacks
September 23, 2022

Two of the US government’s prime security organizations have introduced a specific new report outlining the measures proprietors of operational technology (OT) and industrial manage systems (ICS) can take to protected critical infrastructure.

These assets are significantly a goal for APT teams keen to realize political and economic gain. A lot of attacks are developed for information theft or reconnaissance, but at times danger actors purpose for a little something a lot more harmful.

The NSA and Cybersecurity and Infrastructure Security Agency (CISA) are hoping that the mitigations outlined in their report, Management Procedure Defense: Know the Opponent, will aid OT administrators protect against malicious actors from achieving their aims.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Traditional ICS belongings are challenging to safe due to their style and design for maximum availability and safety, coupled with their use of decades-outdated methods that usually lack any modern security updates,” the report described.

“Newer ICS assets may perhaps be equipped to be configured far more securely, but typically have an improved attack surface area due to incorporating Internet or IT network connectivity to facilitate distant management and functions. The net impact of the convergence of IT and OT platforms has improved the risk of cyber-exploitation of regulate systems.”

The report lists five important mitigations:

  • Limit exposure of technique info in general public message boards to disrupt the early intelligence-collecting period of the cyber kill chain
  • Establish and secure remote access details to lower the attack area
  • Limit accessibility to network and manage system application resources and scripts to legitimate end users accomplishing respectable duties on the management program
  • Perform standard unbiased security audits, particularly of third-party vendor accessibility points and programs
  • Implement a dynamic network environment to restrict the chances for intelligence-accumulating, long-expression access and bespoke device enhancement that static networks afford

“Owners and operators of these programs have to have to fully recognize the threats coming from point out-sponsored actors and cyber-criminals to greatest protect against them,” claimed Michael Dransfield, NSA regulate programs protection specialist.

“We’re exposing the malicious actors’ playbook so that we can harden our programs and avoid their future try.”


Some pieces of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Europol “Hackathon” Identifies Scores of Human Trafficking Victims
Next Post: How to secure your hybrid workforce how to secure your hybrid workforce»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.