專家演示未來嘅R4IoT勒索軟件攻擊

前偵察技術’ Vedere Labs推出了一種新嘅R4IoT勒索軟件攻擊: a PoC ransomware attack on IoT and OT equipment.

Let me remind you that we also said that New Version of 马格尼伯 Ransomware Threatens Windows 11 用戶, 仲有嗰個 The Appearance of Cheap DarkCrystal RAT Malware Worried Experts.

根據 Daniel dos Santos, head of research at Vedere Labs, this is “the first and only work currently bridging the worlds of IT, OT, and IoT ransomware.”

Vedere Labs demonstrates R4IoT (“Ransomware for IoT” ): a proof of concept for next-generation ransomware that exploits IoT devices for initial access, targets IT devices to deploy ransomware and cryptominers, and leverages poor OT security practices to cause physical disruption to business operations.the company's specialists said.
Daniel dos Santos
Daniel dos Santos

The scheme of the attack is the following: using an IP camera, a hypothetical hacker hacks into the IT infrastructure of an organization and uses the access obtained to disable the operational-technological (OT) equipment. The attack exploits existing known vulnerabilities and does not include new exploits.

During the attack, the attacker hacks network-connected surveillance cameras, in particular from AxisHikvision. These two vendors account for 77% of all IP cameras on corporate networks, according to Forescout. 另外, more than half a million devices use the factory configuration of VLAN 1, which means that the cameras are not properly configured for network segmentation.

The researchers showed how, using vulnerabilities in cameras, attackers can execute commands to gain access to Windows machines. From there, they can execute further commands to detect additional machines connected to the cameras and machines with weak credentials, open RDP ports, and establish SSH tunnels.

The attackers can then use this access to open an RDP session, install malware, and disable firewalls and antivirus solutions. Access allows hackers to elevate their privileges, install ransomware and cryptocurrency miners, and run malicious executables that target OT systems.

In their video, the experts demonstrated a simulation of a ransomware attack on a mock hospital. The researchers accessed the IP camera and, through it, the hospital’s network, and identified the programmable logic controller used to control the hospital’s HVAC system. After escalating their privileges, they installed ransomware and disabled HVAC.

Although the simulated attack is too specific to be directly applied to any one organization, Vedere Labsresearch shows how attackers can cause serious harm to organizations through various types of network-connected equipment.

黑尔加·史密斯

我一直對電腦科學感興趣, 尤其是數據安全和主題, 而家被稱為 "數據科學", 由我十幾歲開始. 在進入病毒清除團隊擔任主編之前, 我曾喺多傢公司擔任網絡安全專家, 包括亞馬遜嘅承包商之一. 另一種體驗: 我在雅頓大學同雷丁大學任教.

留言

本網站使用Akismet嚟減垃圾郵件. 瞭解如何處理評論數據.

“返回頂部”按鈕