The US Cybersecurity and Infrastructure Security Agency (CISA) this week announced a new vulnerability scanning service designed to help water utilities identify and address security holes that could expose their systems to remote attacks.
Water utilities can subscribe to this service for free by sending an email to CISA. The scanning begins within 10 days of the necessary paperwork being done.
The free vulnerability scanning service for water utilities covers both drinking water and wastewater systems. It leverages automated tools to identify internet-exposed assets and discover vulnerabilities in those assets, including newly emerged vulnerabilities, known exploited flaws, and common attack vectors.
Organizations using the service are provided weekly reports with the results of the scan and recommendations for mitigating vulnerabilities. In the case of urgent findings, organizations receive alerts within 24 hours and the target is rescanned every 12 hours.
According to CISA, the benefits of the scanning service include a significant reduction in vulnerabilities in the first few months for newly enrolled organizations.
“CISA’s scanning provides an external, non-intrusive review of internet-accessible systems. The scanning does not reach your private network and cannot make any changes.” CISA explained in a fact sheet.
A recently proposed bipartisan bill proposes to increase cybersecurity funding for rural water systems by $7.5 million dollars per year.
CISA announced a new vulnerability scanning service designed to help water utilities identify and address security holes that could expose their systems to remote attacks.
A joint advisory describes five typical steps involved in planning and executing an attack on Industrial control systems (ICS) and other operational technology (OT) systems
All ICS vendors impacted by the recently-disclosed OT:Icefall vulnerabilities have released advisories to inform customers about the impact of the flaws and to provide mitigations.
A modular ICS attack framework and a collection of custom-made tools, can be used by threat actors to target ICS and SCADA devices, including programmable logic controllers (PLCs) from Schneider Electric and Omron, and OPC UA servers.
How Open Source Intelligence can be applied to reconnaissance on critical infrastructure. In many cases it’s possible to narrow a search to specific buildings like power plants, wastewater plants, or chemical and manufactured facilities. The research consists of 26,000 exposed devices in United States.