28.8 C
Dubai
Friday, November 8, 2024
spot_img

Report Finds High Cyber ​​Threat Vulnerabilities in Energy Sector

[ad_1]

The latest OT/IoT security report from Nozomi Networks Labs found that energy and manufacturing are the industries most vulnerable to cyber threats, followed by healthcare and commercial facilities.

During the first six months of 2022, CISA published 560 Common Vulnerabilities and Exposures (CVEs) (down 14% from the second half of 2021), while the number of affected vendors increased by 27%. Affected products also increased by 19% compared to the second half of 2021.

The report, titled “OT/IoT Security Report: Cyber ​​Warfare Insights, Threats and Trends, Remediation,” revealed that wiper malware, IoT botnet activity, and the Russia/Ukraine war impacted the threat landscape in the first half of 2022.

Since the Russian invasion of Ukraine in February 2022, researchers at Nozomi Networks Labs have uncovered the activity of multiple threat actors, including hacker activists, nation-state APTs, and cybercriminals.

They also observed robust use of the Wiper malware and witnessed the emergence of an Industroyer variant called Industroyer2, which was designed to abuse the IEC-104 protocol commonly used in industrial environments.

Additionally, malicious IoT botnet activity is on the rise in the first half of 2022 and is becoming more sophisticated.

Nozomi Networks Labs has set up a series of honeypots to attract these malicious botnets and capture their activity in order to learn more about how threat actors are targeting the Internet of Things.

In this study, analysts at Nozomi Networks Labs uncovered a growing security issue with Internet interfaces for hard-coded passwords and end-user credentials.

From January 2022 to June 2022, the Nozomi Networks honeypot found that March was the most active month, collecting nearly 5,000 unique attacker IP addresses.

The main attacker IP addresses are associated with China and the United States, while “root” and “admin” credentials are most commonly targeted and used in several variants as a way for threat actors to access all system commands and user accounts Way.

“This year’s cyber threat landscape is complex,” said Roya Gordon, OT/IoT security research evangelist at Nozomi Networks.

“Many factors, including the growing number of connected devices, the sophistication of malicious actors, and shifting motivations for attacks, are increasing the risk of data breaches or cyber-physical attacks. Fortunately, security defenses are also evolving. Available now, it provides critical infrastructure organizations the network visibility, dynamic threat detection and actionable intelligence they need to minimize risk and maximize resiliency.” –OGN

[ad_2]

Source link

Related Articles

Sheikh Mohammed Unveils Bold UAE Investment Strategy: AED 2.2 Trillion FDI Goal to Drive Innovation and Sustainable Growth by 2031

Sheikh Mohammed Unveils Bold UAE Investment Strategy: Aiming for AED 2.2 Trillion in FDI to Power Innovation and Sustainable Growth by 2031 In a significant...

Pioneering AI Innovations with Abis Ali, Co-Founder of Raen AI

Pioneering AI Innovations with Abis Ali, Co-Founder of Raen AI In an era where artificial intelligence is transforming industries worldwide, Raen AI stands out as...

From Vision to Reality How Harshit Aggarwal’s Novamax Industries is Redefining Cooling Solutions

In the fast-evolving world of startups, where passion meets perseverance, Harshit Aggarwal has carved out an impressive path with Novamax Industries LLP. Founded in...

8 Tips for Choosing the Right Pet Insurance in Dubai

As a pet owner in Dubai, you want to be sure that your companion receives the best care possible. But we understand that vet...

The Journey of Berrylush: A Story of Passion, Perseverance, and Purpose

In 2018, Berrylush was born from the shared vision of two IIM graduates, AnushaChandrashekar and Alok Paul, who saw a glaring gap in the...

Latest Articles