SCADA Hacking: Hackers-Arise First to Reveal Vulnerability Now Recognized by Schneider Electric and

Once again, Hackers-Arise receives international recognition in SCADA Hacking! On March 28, 2017, OTW detailed here how an attacker can get the Schneider Electric Modicom TM221 to spew out key information that an attacker can use to exploit the system. You can read about it here. Today, April 10, 2017, that vulnerability was recognized by […]

Continue Reading

Hackers-Arise Gets International Recognition for Exploiting SCADA System Vulnerability

October 25, 2016, Voice of America (VOA) News (voanews.com) ran an article about the vulnerability of SCADA/ICS systems. In that article in the second paragraph titled “Headline Grabbers”, it cited: Because of the potential for catastrophic damage, some hackers have long targeted ICS networks in hopes of grabbing headlines. Just last month, an anonymous hacker […]

Continue Reading

SCADA Hacking: SCADA/ICS Protocols (Profinet/Profibus)

One of the challenges of hacking/pentesting SCADA/ICS has been that the protocols employed by this industry are different and distinct from “normal” IT. SCADA/ICS installations use a wide variety of protocols that often share little with the well-known Ethernet and TCP/IP protocols. For years, this difference has shielded these installations from security issues as a […]

Continue Reading

SCADA Hacking: SCADA/ICS Risk Assessment and Management, Part 1

Introduction One of the most crucial activities involved in securing SCADA/ICS systems is the initial Risk Assessment. Risk assessment is considered one of the industry’s Best Practices. If you presently work in information security, you are probably aware that risk assessment can be slippery and nebulous concept. Identifying and quantifying risk in any information technology […]

Continue Reading