• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
rockwell advises disconnecting internet facing ics devices amid cyber threats

Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats

You are here: Home / General Cyber Security News / Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats
May 22, 2024

Rockwell Automation is urging its shoppers to disconnect all industrial regulate techniques (ICSs) not meant to be linked to the public-facing internet to mitigate unauthorized or malicious cyber activity.

The business said it’s issuing the advisory thanks to “heightened geopolitical tensions and adversarial cyber activity globally.”

To that stop, buyers are demanded to choose instant action to establish whether or not they have devices that are available over the internet and, if so, lower off connectivity for people that are not intended to be still left uncovered.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“People need to never configure their belongings to be right related to the public-going through internet,” Rockwell Automation even more extra.

Cybersecurity

“Getting rid of that connectivity as a proactive stage lessens attack surface area and can right away lessen exposure to unauthorized and malicious cyber activity from external risk actors.”

On top rated of that, companies are required to make sure that they have adopted the needed mitigations and patches to protected against the following flaws impacting their merchandise –

  • CVE-2021-22681 (CVSS score: 10.)
  • CVE-2022-1159 (CVSS score: 7.7)
  • CVE-2023-3595 (CVSS score: 9.8)
  • CVE-2023-46290 (CVSS rating: 8.1)
  • CVE-2024-21914 (CVSS score: 5.3/6.9)
  • CVE-2024-21915 (CVSS score: 9.)
  • CVE-2024-21917 (CVSS rating: 9.8)

The alert has also been shared by the U.S. Cybersecurity and Infrastructure Security Company (CISA), which is also recommending that customers and directors comply with appropriate measures outlined in the assistance to lessen exposure.

This incorporates a 2020 advisory jointly launched by CISA and the Countrywide Security Agency (NSA) warning of malicious actors exploiting internet-accessible operational technology (OT) assets that could pose serious threats to critical infrastructure.

“Cyber actors, which include superior persistent menace (APT) groups, have specific OT/ICS devices in recent years to achieve political gains, financial advantages, and possibly to execute destructive outcomes,” the NSA famous in September 2022.

Adversaries have also been noticed connecting to publicly-exposed programmable logic controllers (PLCs) and modifying the manage logic to trigger unwanted habits.

In fact, recent study presented by a team of academics from the Georgia Institute of Technology at the NDSS Symposium in March 2024 has discovered that it really is feasible to complete a Stuxnet-fashion attack by compromising the web software (or human-device interfaces) hosted by the embedded web servers inside of the PLCs.

Cybersecurity

This entails exploiting the PLC’s web-dependent interface used for distant monitoring, programming, and configuration in purchase to attain original obtain and then consider gain of the reputable application programming interfaces (APIs) to sabotage the underlying real-globe equipment.

“Such attacks contain falsifying sensor readings, disabling protection alarms, and manipulating bodily actuators,” the scientists explained. “The emergence of web technology in industrial control environments has introduced new security fears that are not present in the IT domain or client IoT devices.”

The novel web-primarily based PLC Malware has significant strengths more than present PLC malware methods such as platform independence, relieve-of-deployment, and bigger levels of persistence, permitting an attacker to covertly perform malicious actions with out acquiring to deploy command logic malware.

To protected OT and ICS networks, it can be advised to restrict publicity of process details, audit and safe remote entry details, restrict accessibility to network and control method software applications and scripts to legitimate people, carry out periodic security opinions, and employ a dynamic network surroundings.

Uncovered this posting fascinating? Follow us on Twitter  and LinkedIn to browse more exceptional articles we post.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «the ultimate saas security posture management checklist, 2025 edition The Ultimate SaaS Security Posture Management Checklist, 2025 Edition
Next Post: Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries researchers warn of chinese aligned hackers targeting south china sea countries»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.