• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
rockwell advises disconnecting internet facing ics devices amid cyber threats

Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats

You are here: Home / General Cyber Security News / Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats
May 22, 2024

Rockwell Automation is urging its shoppers to disconnect all industrial regulate techniques (ICSs) not meant to be linked to the public-facing internet to mitigate unauthorized or malicious cyber activity.

The business said it’s issuing the advisory thanks to “heightened geopolitical tensions and adversarial cyber activity globally.”

To that stop, buyers are demanded to choose instant action to establish whether or not they have devices that are available over the internet and, if so, lower off connectivity for people that are not intended to be still left uncovered.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“People need to never configure their belongings to be right related to the public-going through internet,” Rockwell Automation even more extra.

Cybersecurity

“Getting rid of that connectivity as a proactive stage lessens attack surface area and can right away lessen exposure to unauthorized and malicious cyber activity from external risk actors.”

On top rated of that, companies are required to make sure that they have adopted the needed mitigations and patches to protected against the following flaws impacting their merchandise –

  • CVE-2021-22681 (CVSS score: 10.)
  • CVE-2022-1159 (CVSS score: 7.7)
  • CVE-2023-3595 (CVSS score: 9.8)
  • CVE-2023-46290 (CVSS rating: 8.1)
  • CVE-2024-21914 (CVSS score: 5.3/6.9)
  • CVE-2024-21915 (CVSS score: 9.)
  • CVE-2024-21917 (CVSS rating: 9.8)

The alert has also been shared by the U.S. Cybersecurity and Infrastructure Security Company (CISA), which is also recommending that customers and directors comply with appropriate measures outlined in the assistance to lessen exposure.

This incorporates a 2020 advisory jointly launched by CISA and the Countrywide Security Agency (NSA) warning of malicious actors exploiting internet-accessible operational technology (OT) assets that could pose serious threats to critical infrastructure.

“Cyber actors, which include superior persistent menace (APT) groups, have specific OT/ICS devices in recent years to achieve political gains, financial advantages, and possibly to execute destructive outcomes,” the NSA famous in September 2022.

Adversaries have also been noticed connecting to publicly-exposed programmable logic controllers (PLCs) and modifying the manage logic to trigger unwanted habits.

In fact, recent study presented by a team of academics from the Georgia Institute of Technology at the NDSS Symposium in March 2024 has discovered that it really is feasible to complete a Stuxnet-fashion attack by compromising the web software (or human-device interfaces) hosted by the embedded web servers inside of the PLCs.

Cybersecurity

This entails exploiting the PLC’s web-dependent interface used for distant monitoring, programming, and configuration in purchase to attain original obtain and then consider gain of the reputable application programming interfaces (APIs) to sabotage the underlying real-globe equipment.

“Such attacks contain falsifying sensor readings, disabling protection alarms, and manipulating bodily actuators,” the scientists explained. “The emergence of web technology in industrial control environments has introduced new security fears that are not present in the IT domain or client IoT devices.”

The novel web-primarily based PLC Malware has significant strengths more than present PLC malware methods such as platform independence, relieve-of-deployment, and bigger levels of persistence, permitting an attacker to covertly perform malicious actions with out acquiring to deploy command logic malware.

To protected OT and ICS networks, it can be advised to restrict publicity of process details, audit and safe remote entry details, restrict accessibility to network and control method software applications and scripts to legitimate people, carry out periodic security opinions, and employ a dynamic network surroundings.

Uncovered this posting fascinating? Follow us on Twitter  and LinkedIn to browse more exceptional articles we post.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «the ultimate saas security posture management checklist, 2025 edition The Ultimate SaaS Security Posture Management Checklist, 2025 Edition
Next Post: Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries researchers warn of chinese aligned hackers targeting south china sea countries»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.