Electronic Control Systems And Its Effects On The Internet

1065 Words5 Pages
ERIPP/SHODAN The ERIPP and SHODAN search engines can be easily leveraged to search for Internet facing ICS devices, allowing attackers to identify potential attack targets. These search engines are being actively utilized to find ICS access control systems over the Internet. Using these tools together with exploitation techniques and tactics, attackers can identify and access control systems with significantly less effort than ever before. ICS-CERT has issued an advisory warning the ICS community of these tools. A sharp increase in interest has been shown by a variety of threat actor groups, including hacktivist and anarchist groups toward Internet accessible ICS devices. These groups are notorious for publicly posting IP address to…show more content…
This tool is open source and is named Conpot ICS/SCADA Honeypot. This statement on the developers website describes the product; “Conpot is a low interactive server side Industrial Control Systems honeypot designed to be easy to deploy, modify and extend. By providing a range of common industrial control protocols we created the basics to build your own system, capable to emulate complex infrastructures to convince an adversary that he just found a huge industrial complex. To improve the deceptive capabilities, we also provided the possibility to server a custom human machine interface to increase the honeypots attack surface. The response times of the services can be artificially delayed to mimic the behavior of a system under constant load. Because we are providing complete stacks of the protocols, Conpot can be accessed with productive HMI 's or extended with real hardware.” A video showing this product is also available. SECURING ICS DEFINE YOUR ICS Document the ICS network infrastructure and all components, applications, databases and connections that are critical to your ICS system. Perform a baseline security analysis for ongoing risk management, and set corresponding security requirements. Establish security roles, responsibilities and authorization levels for IT,
Open Document