Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Security emergency: the growing danger of VHD malware on ICS systems

Modus operandi and impact of the advanced cyber threat on industrial systems

The article discusses advanced malware called VHD that attacks industrial control systems. This malware is capable of damaging even devices isolated from the network. To counter this, the article highlights the importance of multi-layered cybersecurity strategies.
This pill is also available in Italian language

There is growing concern about the cyber security of Industrial Control Systems (ICS) due to the discovery of sophisticated malware targeting ICS or Air-Gapped systems. This advanced cyberthreat seeks to damage exposed critical control systems by attacking network nodes that should not be vulnerable, as they are physically isolated from networks.

Advanced and persistent malware

Identified as VHD, this next generation malware is an example of APT (Advanced Persistent Threat), an advanced persistent threat that uses sophisticated techniques to stay hidden while compromising the systems that host it. Despite growing interest from the cyber community, the provenance of VHDs remains uncertain. What is known is its unusual behavior: the malware acts in a targeted manner, appears to have specific goals, and does not spread indiscriminately.

Modus operandi of the attack

VHD demonstrates a multi-vector approach to intrusion. First of all, the malware attacks system networks, by bruteforcing techniques on exposed Remote Desktop Protocol (RDP) ports. Once inside, the VHD spreads through internal networks, attempting to infect as many devices as possible. Considering its apparent targets, ICS Air-Gapped systems, the malware employs sophisticated techniques.

Prevention and protection

Once again, these revelations underscore the importance of cyber protection and prevention tactics, especially for those network nodes generally considered safe due to their physical isolation. One of the best ways to deal with these threats is to adopt a layered defense approach that incorporates both vulnerability management and active system monitoring to detect and respond to any attempted unauthorized intrusions. The advance of cyber threats requires constant updating and strengthening of cyber defense strategies.

Follow us on Twitter for more pills like this

07/31/2023 20:29

Marco Verro

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated