Discover and read the best of Twitter Threads about #SCADA

Most recents (7)

If #Russia takes power from #Ukraine, #TeamOneFist will respond!
Op.Gradient: a #cyber strike against a #hydroelectric plant's construction site. Their sensor #SCADA network and #GNSS base station were successfully penetrated, which monitored ground/foundation stability. 1/4
Over the course of a week, I gradually introduced circular error into the GNSS readings, reducing it's accuracy to disrupt their work. At the end of it, both the sensor network and the base station were demolished, to prevent them from fixing the damage caused. 2/4
(3/4)
By the way, this site has been flooded from erosion in the past. This network is vital for RusHydro to ensure that construction is safe, and is following the approved plan. All with Western made @LeicaGeosystems and @MoxaInc devices. Hopefully, this will happen again:
Read 4 tweets
Today we announce a first in #TeamOneFist history - #cyber striking an operational #Russian #AI/#ML (#MachineLearning) model, in addition to a #power #grid #SCADA/#ICS!
This is Op.Neutrino, an electrical counterattack against #SPB, #Russia, and now, it's story is here. 1/4
At 17:00 local time, we assumed control over an @EnstoGroup #grid #automation #controller belonging to the DK Port substation. Timing was chosen to match peak usage hours. In addition to controlling power supply, it was supplying data for Rosenergo's FLISR fault #algorithm 2/4
From the controller, we successfully fed bad data into the FLISR #ArtificialIntelligence model, via the connected sensors. Then, we nuked it!
Every attack against #Ukraine will be avenged, every #RU #data model will be corrupted! 🇺🇦☢️👊3/4 #UkraineWillWin #cybersecurity #infosec
Read 4 tweets
Fire in the hole! #TeamOneFist is celebrating #Kherson with a gift for #Ukraine: Op.Positron.
Supporting the offensive, we launched a strategic #cyber strike against TsARZ in #Yekaterinburg, #Russia. They repair trucks, BTRs, and light armored vehicles for the RF MOD 1/ ImageImageImageImage
We attacked their #SCADA/#ICS, demolishing 8 expensive Schneider M258s #PLC, w/2400 channels & 16 DOF each for complex machines. This led to a fire that erased an entire workshop building, and took 13 trucks to extinguish! According to locals the first 3 arrived without water😂2/ ImageImageImageImage
We also attacked some extra ICS devices that we found, to add to the op's effect!
Today Kherson, tomorrow #Crimea! #UkraineWillWin, and we will keep fighting for a quick, total victory in #cyberspace. Glory to the ZSU! 🇺🇦☢️👊 3/
#UkraineWar #cybersecurity #infosec #cyberwarfare ImageImageImageImage
Read 5 tweets
We have become aware of a large #ICS/#SCADA malware project apparently conducted under a state contract on behalf of the Russian General Staff Main Intelligence Directorate (#GRU), Main Centre for Special Technologies (#GTsST), military unit 74455.
This military unit also known as #Sandworm is located at the GRU Ulitsa Kirova facility in the Khimki suburb of Moscow. In the past Sandworm has targeted ICS/SCADA, one of the most renowned being the #INDUSTROYER2 hacking attempt of a Ukrainian electrical substation in April 22.
The ongoing project is to cost more than 100 million rubles across three phases and undertaken by several technical defense contractors.
Read 5 tweets
Mit Statements von mir für die @AG_KRITIS

Europäische Cyberübung: Digitale Attacken aus „Blauland“

Von @matthimon via @netzpolitik_org

"Fünf Wochen lang simulieren die EU-Mitgliedstaaten Angriffe auf ihre #KRITIS..."
netzpolitik.org/2022/europaeis…
"erstmals soll dabei die Schwelle eines bewaffneten Angriffs überschritten werden. Geprobt wird der Beistand gemäß #EU-Verträgen, außerdem könnte der #NATO-#Bündnisfall eintreten."
"Beteiligt ist auch eine fiktive kriminelle Vereinigung mit dem Namen „#OT-Powner“, die #Schwachstellen in der Steuerung von #Industrieanlagen sucht und den Zugang zu diesen verkauft. Mit dem Eindringen in ein solches #SCADA-System beginnt der erste Angriff aus „Blauland“."
Read 4 tweets
Vamos a usar este tweet para publicar #Dorks de todo tipo, empecemos con este:

inurl:wp-config.php intext:DB_PASSWORD -stackoverflow -wpbeginner -foro -forum -topic -blog -about -docs -articles

#CyberSecurity #dork #BugBounty
intext:"pass" ! "usuario" | "user" | "contraseña" filetype:sql -github
Este es muy bueno, nos permite hacer uploads, ha sido probado con imágenes .jpeg

intitle:"FCKeditor - Uploaders Tests"
Read 63 tweets
Die #IT-Umgebung des indischen #AKW's Kudankulam wurde nicht nur gehackt, sondern als Command and Control Server benutzt.

Hoffentlich war die #OT nicht auch öffentlich am Netz!

#KRITIS Sektor #Energie #nuclear #nuclearsafety #Resilienz #Cyber #Security

Zur Unterscheidung:

IT sind Informationstechnische Systeme (#PC #Laptop #Windows #Office, #Buchhaltung...)

OT sind Operative Systeme (#ICS #SCADA #SPS #HMI #PLC #Steuertechnik...)
Angemessener Stand der Technik #SdT wie in #KRITIS gefordert wurde offenbar im #AKW nicht eingehalten.

Strikte #Trennung zwischen #OT-Steuersystemen und #IT ist eine wesentliche #Sicherheitsmaßnahme!

Weitere #Maßnahmen und #Forderungen finder Ihr hier.

ag.kritis.info/politische-for…
Read 5 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!