Tuesday, February 27, 2018

Anatomy of an Attack on the Industrial IoT

Anatomy of an Attack on the Industrial IoT: "During her reconnaissance, she obtained access and visibility to a dozen gas detectors. Due to the Web server interface vulnerability identified in the ICS-CERT advisory, she can bypass the authentication process and make configuration changes to the device, such as altering detection ranges and alarm limits. This access enables her to generate alarms at will."