Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CISA Cybersecurity Alerts

CISA Alert AA22-103A – APT Cyber Tools Targeting ICS/SCADA Devices.

13 Apr 2022

Description

The DOE, CISA, NSA, and the FBI are releasing this joint Cybersecurity Advisory to warn that certain APT actors have demonstrated the ability to gain full system access to multiple ICS/SCADA devices, including: Schneider Electric programmable logic controllers, OMRON Sysmac NEX programmable logic controllers, and Open Platform Communications Unified Architecture servers. DOE, CISA, NSA, and the FBI urge critical infrastructure organizations, especially Energy Sector organizations, to implement the detection and mitigation recommendations provided in this CSA to detect potential malicious APT activity and harden their ICS/SCADA devices. The DOE, CISA, NSA, and the FBI would like to thank Dragos, Mandiant, Microsoft, Palo Alto Networks, and Schneider Electric for their contributions to this joint CSA. AA22-103A Alert, Technical Details, and Mitigations Layering Network Security Through Segmentation Stop Malicious Cyber Activity Against Connected Operational Technology NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems Dragos Report: CHERNOVITE’s PIPEDREAM Malware Targeting Industrial Control Systems All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at [email protected] or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or [email protected]. Learn more about your ad choices. Visit megaphone.fm/adchoices

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.