We talk a lot about change on Security Breach. Some of itβs good and obviously some of it makes us want to tear our hair out. Well, todayβs episode, surprisingly, should go easy on the scalp, even though it will focus on the IOCONTROL malware strand recently detected by Noam Moshe and Clarotyβs Team82.
The malware is described as a custom-built IoT/OT strand created by the Iran-based hacktivist group, the CyberAv3ngers. The malware targeted OT/IoT devices in Israel and the U.S. Mosheβs team detected the malware being used to attack IoT and SCADA/OT devices of various types including IP cameras, routers, PLCs, HMIs and firewalls.
Typically, this is the part of the story that takes us down a dark and frustrating road, but as youβll hear, thatβs not necessarily the case this time.
For more information on Team82βs findings on IOCONTROL, click here.
Also, just a bit of housekeeping β weβre switching the frequency of Security Breach from weekly to bi-weekly. This change will allow me to spend more time on each episode, which will translate to greater depth and expanded coverage on all the pressing topics of industrial cybersecurity.
And remember, this is your podcast β let me know your thoughts and feelings on the change and anything else youβd like to see on the show.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that youβd like to have us explore on Security Breach, you can reach me at [email protected].
To download our latest report on industrial cybersecurity, The Industrial Sectorβs New Battlefield, click here.