An unidentified attacker accessed the computer systems of a water treatment facility in the US, altering sodium hydroxide levels in the potable water supply. With attacks on critical infrastructure increasingly common, this incident should not come as a surprise. Basic cyber-security hygiene could have lessened the likelihood of accessing the systems, but the network of the facility was not adequately secured. Simple attack techniques took advantage of the plant’s security weaknesses, including poor passwords shared across the plant, and widespread use of end-of-life software. These problems are very likely present in other water treatment plants, as well as other critical facilities. This incident casts a spotlight on the need to appropriately secure critical infrastructure systems, which may be mistakenly thought of as well guarded.
Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Acce...
Want To Try Our Digital Risk Protection Tool?Get Started Free
Other content in this Stream
This Solutions Guide to learn how to protect your organizations social footprint with the top Social Media Monitoring use cases Digital Shadows has identified.
The well-established “Mozi” peer-to-peer (P2P) botnet has developed new persistence capabilities.
Digital Shadows reviews and expands on observed ransomware attacks and how security teams can fortify their defenses.
A configurable, malicious Traffic Direction System (TDS) has been enabling widespread malware attacks.
Digital Shadows custom intelligence services allow you to leverage our industry-leading team of global intelligence analysts and security researchers for more custom intelligence requirements.
Ensure you get the most value from SearchLight by providing white glove services for onboarding, technical maintenance, playbooks and automation, and remediation.
ShadowTalk hosts Sean, Ivan, Charles, and CISO Rick Holland bring you the latest in threat intelligence.
A years-long reconnaissance campaign against an employee of a US aerospace defense company was discovered and attributed to “TA456”, an Iranian state-backed advanced persistent threat (APT) group.
ShadowTalk hosts Adam, Dylan and Kim bring you the latest in threat intelligence.
The new “BlackMatter”, “Haron”, and “El_Cometa” ransomware groups, which surfaced in the past three weeks, bear significant similarities to ransomware groups that disappeared last month
This webinar covers the latest research into impersonating domains and provides a demo of SearchLight’s industry-leading domain monitoring capabilities.
A vulnerability in Kaseya’s virtual system/server administrator (VSA) software has been exploited to deliver the “REvil” ransomware to multiple managed service providers.
The 14th Five Year Plan (FYP) adopted by the People’s Republic of China (PRC) in March 2021 has laid out key areas of focus for the country that are likely to prompt nation-state cyber espionage.
This guide outlines what potential data sources, detection methods, context, and remediation actions to consider if you want to effectively monitor domains and mitigate the risk of data loss, exposed
Rick Holland and Sean Nikkel join Phil Langlois and the team behind the Verizon DBIR to understand some of the key cybercrime takeaways for organizations.