Safeguarding Against Cyber-Physical Threats: SIGA’s Level 0 Monitoring in Light of Mandiant’s Revelations

In the wake of the recent cyber-physical attack on Ukraine's electrical grid in October 2022, as detailed in the Mandiant report, the imperative for robust cybersecurity measures is more evident than ever. This blog post explores how SIGA's Level 0 monitoring, inspired by insights from Mandiant's revelations, emerges as a pivotal solution in defending critical infrastructure against such sophisticated attacks. Mandiant's Insights: Unraveling the Cyber-Physical Attack Mandiant's report sheds light on the intricacies of the cyber-physical attack that targeted Ukraine's electrical grid in October 2022. The Russia-linked threat actor, Sandworm, employed novel techniques, including Living off the Land (LotL) tactics, to disrupt the operational technology (OT) infrastructure, leading to an unplanned power outage and subsequent chaos. As the threat landscape evolves, defending ...
קרא עוד

SHIELDS-UP

In light of the waging Russian war on Ukraine over the past two months and the recent collaborative “ Pipedream Malware”  advisory, the Biden administration has publicly announced the ever-growing likelihood of severe Russian cyberattacks against the US’s critical infrastructure. https://www.whitehouse.gov/ briefing-room/statements- releases/2022/03/21/statement- by-president-biden-on-our- nations-cybersecurity/ Jen Easterly, the Cybersecurity and Infrastructure Security Agency’s (CISA) director urges companies to quickly scale-up to protect themselves from such potential attacks, as she further explains: “ that’s why we’ve been telling everybody consistently, shields up. What does that mean? It means assume there will be disruptive cyber activity and make sure you are prepared for it.”. The repercussions of such Russian attacks can be disastrous, as ...
קרא עוד

THE NOTORIOUS PIPEDREAM MALWARE

A new advisory based on a joint federal and private sector investigation sheds light on a substantial threat to Industrial Control Systems (ICS). According to the advisory recently published by the Department of Energy, the Cybersecurity and Infrastructure Security Agency, the NSA, the FBI, and privately owned companies, the aggressive toolkit allows hackers to disrupt or even take over Schneider’s and OMRON’s PLC’s, which are the beating hearts of our most critical infrastructure. Some even referred to the new threat as “the most extensive attack tool ever documented for industrial control systems.” The advisory mentions that the malware ( also known as “Pipedream”) exploits the software Codesys, which is employed by other PLC manufacturers, in order to take control over the PLC. Hence, every ICS can potentially be targeted and compromised by this attack. The ...
קרא עוד

ROCKWELL PLCS VULNERABILITIES YET TO FURTHER EMPHASIZE THE IMPORTANCE OF LEVEL- 0 MONITORING

A new advisory based on a joint federal and private sector investigation sheds light on a substantial threat to Industrial Control Systems (ICS). According to the advisory recently published by the Department of Energy, the Cybersecurity and Infrastructure Security Agency, the NSA, the FBI, and privately owned companies, the aggressive toolkit allows hackers to disrupt or even take over Schneider’s and OMRON’s PLC’s, which are the beating hearts of our most critical infrastructure. Some even referred to the new threat as “the most extensive attack tool ever documented for industrial control systems.” The advisory mentions that the malware ( also known as “Pipedream”) exploits the software Codesys, which is employed by other PLC manufacturers, in order to take control over the PLC. Hence, every ICS can potentially be targeted and compromised by this attack. The ...
קרא עוד

“THE NEXT EVOLUTION OF OT CYBER SECURITY”

A new advisory based on a joint federal and private sector investigation sheds light on a substantial threat to Industrial Control Systems (ICS). According to the advisory recently published by the Department of Energy, the Cybersecurity and Infrastructure Security Agency, the NSA, the FBI, and privately owned companies, the aggressive toolkit allows hackers to disrupt or even take over Schneider’s and OMRON’s PLC’s, which are the beating hearts of our most critical infrastructure. Some even referred to the new threat as “the most extensive attack tool ever documented for industrial control systems.” The advisory mentions that the malware ( also known as “Pipedream”) exploits the software Codesys, which is employed by other PLC manufacturers, in order to take control over the PLC. Hence, every ICS can potentially be targeted and compromised by this attack. The ...
קרא עוד

NEW REGULATORY FRAMEWORK BY ISRAEL MINISTRY OF ENVIRONMENTAL – CYBERSECURITY MONITORING AT ICS LEVEL 0

Highlights the significance of Cybersecurity Monitoring at ICS Level 0. Regulation compliance targeted at 1,600 Israeli entities handling hazardous materials In any given state or country, there are thousands of manufacturing plants and facilities which hold and use hazardous materials as part of their production processes. Failures in the production, storage or transportation systems of these plants may result in severe damage to public health and the environment. In most cases, these systems are operated, automated and controlled by computerized systems, or ICS (Industrial Control Systems), so a cyber event can potentially cause a failure or disruption in the computerized system and lead to a catastrophic hazardous materials event. Examples of hazardous events that may occur due to a cyber incident: Emissions of gases that endanger the public Explosions ...
קרא עוד