[ISN] BlackEnergy crimeware coursing through US control systems

http://www.theregister.co.uk/2014/10/29/blackenergy_crimeware_pwning_us_control_systems_cert_warns/ By Darren Pauli The Register 29 Oct 2014 Industrial control systems in the United States have been compromised by the BlackEnergy malware toolkit for at least three years in a campaign the US Computer Emergency Response Team has dubbed “ongoing” and sophisticated. Attackers had compromised unnamed industrial control system operators and implanted BlackEnergy on internet-facing human-machine interfaces including those from GE Cimplicity, Advantech/Broadwin WebAccess, and Siemens WinCC. The latter system was often used by large plant operators including Iran’s Natanz uranium facility at the time it was hosed by Stuxnet, however the latest attacks targeting the platform are suspected but not confirmed. The CERT had not identified attempts to damage or disrupt system processes but had not verified if hackers had pivoted laterally across the victim networks. […]