Remove Antivirus Remove Energy and Utilities Remove Phishing
article thumbnail

Protecting Oil and Gas Industry Infrastructure: Strategies for Resilience

SecureWorld News

To ensure energy security and economic stability, protecting the infrastructure is essential. A report from 2023 revealed that 67% of energy and utility companies faced ransomware attacks, with many incidents exploiting unpatched vulnerabilities. This significantly reduces the risk of unauthorized access.

article thumbnail

SideWinder targets the maritime and nuclear sectors with an updated toolset

SecureList

Moreover, we observed other attacks that indicated a specific interest in nuclear power plants and nuclear energy in South Asia and further expansion of activities into new countries, especially in Africa. Infection flow The attacker sends spear-phishing emails with a DOCX file attached. mshta.exe hxxps://dgtk.depo-govpk[.]com/19263687/trui

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New APT ChamelGang Targets energy and aviation companies in Russia

Security Affairs

ChamelGang APT is a new cyberespionage group that focuses on fuel and energy organizations and aviation industry in Russia. ChamelGang is a new APT group that was first spotted in March by researchers at security firm Positive Technologies, it targets Russian companies in the energy and aviation industry. ” concludes the report.

article thumbnail

ICS cyberthreats in 2023 – what to expect

SecureList

Decreasing CTI quality – unfounded politically motivated cyberthreat attribution, exaggerated threats, lower statement validity criteria due to political pressure and in an attempt to utilize the government’s political narrative to earn additional profits.

article thumbnail

IT threat evolution Q3 2021

SecureList

The attackers obtain initial access to a system by sending a spear-phishing email to the victim containing a Dropbox download link. That library was then loaded by the legitimate MsMpEng.exe by utilizing the DLL side-loading technique. The link leads to a RAR archive that masquerades as a Word document. cents per record).

Malware 133
article thumbnail

Protecting Industrial Control Systems Against Cyberattacks – Part 1

Security Boulevard

This renders the attacks undetectable and able to bypass conventional security solutions such as EDR, antivirus and other traditional security lines of defense. A few years ago, a group of attackers used the Trojan to deploy SCADA-related plugins against victims in energy and ICS/SCADA networks in Ukraine and around the world.

article thumbnail

Best Strategies to Reduce Generative AI Risk

Centraleyes

Cybersecurity measures were developed, including firewalls, encryption, and antivirus software. The Nuclear Age The development of nuclear technology in the mid-20th century brought both tremendous energy potential and existential risks. Public awareness campaigns educated users about safe online practices.

Risk 52