Going back to 2009 there was an engagement that used a battle command system.
The opposing force in the exercise found the contractor, downloaded the user and training materials from a web and FTP site, exposed...
1/
Then, they just logged in as privileged users to all the battle systems. You would think that would have been game over (it was a very simple default password).
2/
While the OpFor (opposing force) was frustrated, they said ‘fine’.
They proceeded to essentially fuzz the input and found numerous ways to crash the system. Some of these were probably exploitable, but for the exercise, ...
3/
The engagement continued and promptly the OpFor crippled everyone by crashing the systems.
4/
The bad news is that this happens, and there are a lot of systems that didn’t take ‘cyber’ hardening into account for risk models in development/engineering.
5/
* short term via certain stop gap measures
* medium term via minimization of types of accessibility to input (phys, network, em, ...)
* long term via quantified measurements/transparency of hygiene in contractor deliverables.
Similarly program managers were/are not generally aware of the exposure.
Addressable.