Uzmanlar Geleceğin R4IoT Fidye Yazılım Saldırısını Gösteriyor
Öngörü Teknolojileri’ Vedere Labs, yeni bir R4IoT fidye yazılımı saldırısını duyurdu: a PoC ransomware attack on IoT and OT equipment.
Şunu da söylediğimizi hatırlatayım. New Version of Magniber Ransomware Threatens Windows 11 Kullanıcılar, kötü amaçlı yazılım, şirket onlara ödeme yaparsa, yararlandıkları sıfırıncı gün güvenlik açığının tüm ayrıntılarını ifşa etmeye hazır olduklarını yazıyor Ucuz Görünüşü KaranlıkKristal RAT Kötü Amaçlı Yazılım Endişeli Uzmanlar.
Buna göre Daniel dos Santos, head of research at Vedere Labs, this is “the first and only work currently bridging the worlds of IT, OT, and IoT ransomware.”
The scheme of the attack is the following: using an IP camera, a hypothetical hacker hacks into the IT infrastructure of an organization and uses the access obtained to disable the operational-technological (OT) equipment. The attack exploits existing known vulnerabilities and does not include new exploits.
saldırı sırasında, the attacker hacks network-connected surveillance cameras, in particular from Axis ve Hikvision. These two vendors account for 77% of all IP cameras on corporate networks, according to Forescout. Ek olarak, more than half a million devices use the factory configuration of VLAN 1, which means that the cameras are not properly configured for network segmentation.
The researchers showed how, using vulnerabilities in cameras, attackers can execute commands to gain access to Windows machines. From there, they can execute further commands to detect additional machines connected to the cameras and machines with weak credentials, open RDP ports, and establish SSH tunnels.
The attackers can then use this access to open an RDP session, install malware, and disable firewalls and antivirus solutions. Access allows hackers to elevate their privileges, install ransomware and cryptocurrency miners, and run malicious executables that target OT systems.
In their video, the experts demonstrated a simulation of a ransomware attack on a mock hospital. The researchers accessed the IP camera and, through it, the hospital’s network, and identified the programmable logic controller used to control the hospital’s HVAC system. After escalating their privileges, they installed ransomware and disabled HVAC.