Whitepaper: PIPEDREAM: Chernovite's Emerging Malware Targeting Industrial Control Systems
Threats to industrial infrastructure security are an extremely sensitive matter. Given the unique realities of industrial operations it is often harder for defenders to react than for adversaries to leverage public information. The more time the community has to implement mitigations before new malicious capabilities become public, the better the effects of any attempted attacks can be reduced.
PIPEDREAM is the seventh known Industrial Control Systems (ICS)-specific malware and fifth specifically developed to disrupt industrial processes. PIPEDREAM demonstrates significant adversary research and development focused on disruption, degradation, and potentially destruction of industrial environment and physical processes. It can disrupt, degrade, and potentially destroy industrial environments and processes.
Download this whitepaper for actions you can take to mitigate impacts in your environment.
Read More
By submitting this form you agree to Dragos contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Dragos web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
Related Categories: Applications, Backups, Cloud, Collaboration, Compliance, Connectivity, Enterprise Resource Planning (ERP), ERP, Firewall, Hardware, IIOT, IOT, Linux, Malware, Network, SAN, Server, Software
More resources from Dragos
Executive Summary: ICS/OT Cybersecurity 2021 ...
In 2021, the industrial community attracted high-profile
attention. Major cybersecurity incidents struck industrial organizations in a range ...
Report: ICS/OT Cybersecurity 2021 Year in Rev...
Dragos is excited to present the fifth year of the annual Dragos Year In Review report on Industrial Control System (ICS)/ Operational Technology (...
Whitepaper: How Dragos Activity Groups Obtain...
As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders ...