Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

Submission + - Support Forums Reveal SCADA Infections (securityledger.com)

chicksdaddy writes: "We hear a lot about vulnerabilities in industrial control system (ICS) software. But what about real evidence of compromised SCADA and industrial control systems?
According to security researcher Michael Toecker (@mtoecker), a consultant at the firm Digital Bond, the evidence for infected systems with links to industrial automation and control systems is right under our eyes: buried in public support forums.
Toecker audited support sites like bleepingcomputer.com, picking through data dumps from free malware scanning tools like HijackThis and DDS. He found scans of infected systems that were running specialized ICS software like Schweitzer Engineering Labs (SEL) AcSELerator Software and GE Power’s EnerVista Software (used to configure GE electric power protection products).
The infected end user systems could be the pathway to compromising critical infrastructure, including electrical infrastructure. “With access to a protection relay through a laptop, a malicious program could alter settings in the configuration file, inject bad data designed to halt the relay, or even send commands directly to the relay when a connection was made,” Toecker wrote."

This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Support Forums Reveal SCADA Infections

Comments Filter:

You are in the hall of the mountain king.