sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

579
active users

#hacktivist

0 posts0 participants0 posts today

It's probably a good idea to do another #introduction since people change over time, ideally.

I'm haui. I help people & build things that help people. Big #foss enthusiast, #sysadmin by day and #hacktivist at night.

I think all people (and animals) are born equal and should stay that way.

I oppose #capitalism and embrace alternative systems. I dont care about #corporatedemocracy and manipulated "free speech".

I want thirst, hunger and homelessness gone, for everyone, by any means necessary.

@TheGibson If only we knew some talented #artist folk looking for commissions? :)

I have no idea what a reasonable price would be for a T-shirt design, but if you're out there and the idea of a T-shirt with the slogal "Always Be Noobin'" and #hacktivist culture inspires you, let me know and maybe we can make this happen :)

#CISA today published a bulletin warning operators of critical #infrastructure that Iran-allied attackers are conducting #attacks against PLCs.

This attack in particular is a "#hacktivist" attack originating from #Iran-allied attackers. The entirety of the attack targets a specific brand of programmable logic controllers (PLCs), which are basically system-on-a-chip devices used in industrial settings.

The particular brand is made by a company based in #Israel. The "attack" swaps a graphical image on a web-based login screen with a political statement from the threat actors, and is done by the attackers brute-forcing a password used to manage the #PLC device.

Since this isn't a traditional endpoint, there is no endpoint protection to be leveraged here. The CISA bulletin references an IP address connected to a large hosting ISP based in the Netherlands that the attackers are using to launch the brute-force attacks against internet-facing PLCs.

I would suggest that it is counter to conventional wisdom and generally-accepted guidance to put "internet of things" devices like PLCs facing an unprotected network connection to the public internet. If the PLCs are behind a firewall they will not be reachable by the attackers unless the attackers penetrate the network protection where the PLCs are located, which is a far more serious attack, but the CISA bulletin and its related TTP document does not allege that is taking place.

What I infer from CISA's bulletin is that these devices are not hosted behind a firewall (i.e., not requiring a VPN to reach), and are unprotected from inbound attacks coming from the public internet other than by a password, that the device has no ability to counter #bruteforce password spamming, and ships with a default password that is publicly available. Under those circumstances, there's very little anyone can do to protect the devices other than put them behind a #firewall.

cisa.gov/news-events/cybersecu

Cybersecurity and Infrastructure Security Agency CISAIRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities | CISA