Critical infrastructure continues to be targeted by cyber-criminals. According to the US Industrial Control Systems Cyber Emergency Response Team’s (ICS-CERT) latest report, over 200 cyber security incidents have been reported across all critical infrastructure sectors in the first half of fiscal year 2013. Of these attacks, 53% targeted the energy sector, followed by the manufacturing sector, which reported 17% of the incidents. Watering hole attacks, SQL Injection, and spear phishing were the most common techniques utilized by the attackers. “Today cybercriminals can change the launch points of their attacks so easily that these types of static IP blocklists are ineffective. Live intelligence is really the only effective solution for IP based threat blocking.”
وَقُل رَّبِّ زِدْنِي عِلْمًا سُبْحَانَكَ لاَ عِلْمَ لَنَا إِلاَّ مَا عَلَّمْتَنَا إِنَّكَ أَنتَ الْعَلِيمُ الْحَكِيمُ
Sunday, June 30, 2013
ICS-CERT Warns of Brute-Force Attacks Against Critical Infrastructure Control Systems
Critical infrastructure continues to be targeted by cyber-criminals. According to the US Industrial Control Systems Cyber Emergency Response Team’s (ICS-CERT) latest report, over 200 cyber security incidents have been reported across all critical infrastructure sectors in the first half of fiscal year 2013. Of these attacks, 53% targeted the energy sector, followed by the manufacturing sector, which reported 17% of the incidents. Watering hole attacks, SQL Injection, and spear phishing were the most common techniques utilized by the attackers. “Today cybercriminals can change the launch points of their attacks so easily that these types of static IP blocklists are ineffective. Live intelligence is really the only effective solution for IP based threat blocking.”