[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Tag Names and Taxonomies
This thread below from the realm of OPC is relevant to our current thoughts on OBIX tagging and security. Enjoy tc -----Original Message----- From: scadasec-bounces@news.infracritical.com [mailto:scadasec-bounces@news.infracritical.com] On Behalf Of Grant Gilchrist Sent: Friday, July 18, 2014 11:59 AM To: scadasec@news.infracritical.com Subject: Re: [SCADASEC] HAVEX report Something really noticeable from this report is that the scan was able to grab the OPC variable names. Imagine if these were recognizable as in "Twelfth Street Feeder Breaker", or standardized names as in IEC 61850 or power system Common Information Model. Again, the tools we provide to make our engineers' lives easier also make it easier for attackers. Dang. --------------------------------------------------------- Grant Gilchrist, P. Eng. Principal Consultant, Smart Grid Engineering Team EnerNeX p: 403.938.0220 // c: 403.991.5343 e: grant@enernex.com // www.enernex.com -----Original Message----- From: scadasec-bounces@news.infracritical.com [mailto:scadasec-bounces@news.infracritical.com] On Behalf Of Michael Toecker Sent: Friday, July 18, 2014 7:17 AM To: scadasec@news.infracritical.com Subject: Re: [SCADASEC] HAVEX report ... or there are more vendors that weren't found publicly that were infected, and those vendors have quietly replaced their downloads rather than come clean about it. Mike On Fri, Jul 18, 2014 at 1:35 AM, Damiano Bolzoni < damiano.bolzoni@secmatters.com> wrote: > On 17/07/14 17:20, Jake Brodsky wrote: > > > It seems pretty clear to me that this malware is laying the > > groundwork > for > > future surveillance and possibly even attacks. > > On the top of that, I think it's worth noting that the attackers were > aiming for some specific end users. > > This seems to me the only possible explanation why someone would go > after three vendors that, with all due respect, are not exactly major > players. > > Or perhaps they tried Siemens and ABB but those proved to be hard to > breach (which is good news :) > > cheers > > -- > > =============================================== > Selected by Gartner as a "Cool Vendor" for 2014 > =============================================== > > Dr. Damiano Bolzoni, Founder and Business Developer SecurityMatters > B.V. > De Lismortel 31 > 5612AR, Eindhoven, the Netherlands > > e-mail: damiano.bolzoni@secmatters.com Web site: > http://www.secmatters.com PGP key: > http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xB62845440AC79433 > Mobile: +31 629 008724 > _______________________________________________ > To unsubscribe from this mailing list, please visit: > http://news.infracritical.com/mailman/listinfo/scadasec > > To review our usage policy, please visit: > http://www.infracritical.com/usage-scadasec.html > -- Michael Toecker _______________________________________________ To unsubscribe from this mailing list, please visit: http://news.infracritical.com/mailman/listinfo/scadasec To review our usage policy, please visit: http://www.infracritical.com/usage-scadasec.html _______________________________________________ To unsubscribe from this mailing list, please visit: http://news.infracritical.com/mailman/listinfo/scadasec To review our usage policy, please visit: http://www.infracritical.com/usage-scadasec.html
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]