We talk a lot about change on Security Breach. Some of itās good and obviously some of it makes us want to tear our hair out. Well, todayās episode, surprisingly, should go easy on the scalp, even though it will focus on the IOCONTROL malware strand recently detected by Noam Moshe and Clarotyās Team82.
The malware is described as a custom-built IoT/OT strand created by the Iran-based hacktivist group, the CyberAv3ngers. The malware targeted OT/IoT devices in Israel and the U.S. Mosheās team detected the malware being used to attack IoT and SCADA/OT devices of various types including IP cameras, routers, PLCs, HMIs and firewalls.
Typically, this is the part of the story that takes us down a dark and frustrating road, but as youāll hear, thatās not necessarily the case this time.
For more information on Team82ās findings on IOCONTROL, click here.
Also, just a bit of housekeeping ā weāre switching the frequency of Security Breach from weekly to bi-weekly. This change will allow me to spend more time on each episode, which will translate to greater depth and expanded coverage on all the pressing topics of industrial cybersecurity.
And remember, this is your podcast ā let me know your thoughts and feelings on the change and anything else youād like to see on the show.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that youād like to have us explore on Security Breach, you can reach me at [email protected].
To download our latest report on industrial cybersecurity, The Industrial Sectorās New Battlefield, click here.