Security Experts believe a new Era of warfare is here that combines destructive military might with malicious cyberattacks. Triton, a sophisticated malware on par with the likes of Stuxnet, that almost took down a petrol chemical plant in Saudi Arabia last August was the first shot across the bow. Triton was able to penetrate the safety system’s firmware at the petrol chemical plant and injected a Remote Access Trojan (RAT) that would allow it to receive instructions from outside the plant through an electronic backdoor. Had it not been for a flaw in the software that cause part of the system to crash, operators would not have known if was there until it was too late. Andrea Carcano, Co-Found and Chief Product Officer at Nozomi Networks commented below.
Andrea Carcano, Co-Found and Chief Product Officer at Nozomi Networks:
“There is evidence of heightened focus from attackers against critical infrastructure with concern that each attempt to infiltrate these networks and systems means mistakes are being learned, and attacks improved. Doing nothing is not an option, nor is it what is happening within these environments particularly with the NIS Directive being implemented in the UK later this year. That said, it’s not without its challenges as much of the Operational Technology environment includes legacy infrastructure designed long before the hybrid and interconnected networks of today were even dreamed possible. Securing the complicated myriad of ‘what ifs’ might seem an insurmountable challenge, but with technical advances, such as machine learning and artificial intelligence, it is possible. As part of an ICS cybersecurity solution, these advances enable proactive threat hunting and behaviour-based anomaly detection to advance at the pace of new and evolving threats. These technologies need to be implemented now before the next cyberattack, state sponsored or otherwise, hits its mark and the general public pays the price.”
ISBuzz Team embodies the collaborative efforts of the dedicated staff at Information Security Buzz, converging a wide range of skills and viewpoints to present a unified, engaging voice in the information security realm. This entity isn't tied to a single individual; instead, it's a dynamic embodiment of a team diligently working behind the scenes to keep you updated and secure. When you read a post from ISBuzz Team, you're receiving the most relevant and actionable insights, curated and crafted by professionals tuned in to the pulse of the cybersecurity world. ISBuzz Team - your reliable compass in the fast-evolving landscape of information security
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.