Threats posed by using RATs in ICS
#1
Information 
Quote: While conducting audits, penetration tests and incident investigations, we have often come across legitimate remote administration tools (RAT) for PCs installed on operational technology (OT) networks of industrial enterprises. In a number of incidents that we have investigated, threat actors had used RATs to attack industrial organizations. In some cases, the attackers had stealthily installed RATs on victim organizations’ computers, while in other cases, they had been able to use the RATs that were installed in the organization at the time of the attacks. These observations prompted us to analyze the scope of the threat, including the incidence of RATs on industrial networks and the reasons for using them.

Contents:
Full reading: https://securelist.com/threats-posed-by-...ics/88011/
[-] The following 1 user says Thank You to harlan4096 for this post:
  â€˘ silversurfer
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Adobe Acrobat Reader DC 2025.001.20467
Adobe Acrobat Read...harlan4096 — 06:11
GFYI [Official] CheckMAL's AppCheck Pro...
tweet CheckMAL Secu...dhruv2193 — 17:10
Introducing Advanced Chat Privacy: Enhan...
Introducing Advanc...harlan4096 — 11:49
Brave 1.77.101
Release Channel 1....harlan4096 — 11:48
Opera118.0.5461.60
Hello! We are h...harlan4096 — 11:47

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (50)steakelask
avatar (44)Termoplenka
avatar (50)Toligo

[-]
Online Staff
There are no staff members currently online.

>