{"id":3092,"date":"2017-07-10T13:44:00","date_gmt":"2017-07-10T20:44:00","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=3092"},"modified":"2019-08-19T13:41:39","modified_gmt":"2019-08-19T20:41:39","slug":"dhs-fbi-warn-of-attacks-against-us-energy-manufacturing-companies-and-employees","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/brief\/dhs-fbi-warn-of-attacks-against-us-energy-manufacturing-companies-and-employees\/","title":{"rendered":"DHS & FBI warn of attacks against US energy & manufacturing companies and employees"},"content":{"rendered":"
DHS & FBI warn of attacks against US energy & manufacturing companies and employees<\/h5>\n
\n
\n

Issue<\/strong>
\nDHS and the FBI released a TLP:AMBER<\/a> report warning US energy sector and manufacturing companies about ongoing cyber operations. \u00a0These operations include sophisticated physical and cyber attacks, as well as activities targeting employees and operators with the aim of infiltrating air-gapped networks.<\/p>\n

Impact<\/strong>
\nOur customers in the energy sector have seen scanning and attacks increase in the last month, but one interesting twist about the report is the targeting\u00a0of individual employees in order to infiltrate secure networks.\u00a0 Many details regarding the attacks are now known to the public, in part because an irresponsible organization\u00a0shared a TLP:AMBER report with the press. \u00a0The approach of going after operators and employees to target secure networks is reminiscent of how GHCQ hacked into Belgicom\u2019s NOC.
\nThis warning comes almost one month since Robert Lee and his team at Dragos released their research on the \u00a0CRASHOVERRIDE malware, along with ESET\u2019s analysis of Industroyer.\u00a0Keep in mind that Robert Lee will be presenting details on CRASHOVERRIDE at Black Hat in just a few weeks.<\/p>\n

Recommendations<\/strong>
\nYour key operations and security staff should be trained in operational security (opsec). Include physical security\u00a0tests and targeting specific roles and personnel as\u00a0part of your routine security assessments.<\/p>\n

Additional Resources<\/strong><\/p>\n

News regarding recent hacking of nuclear plant:<\/p>\n<\/div>\n