Siemens Software Infected with Stuxnet, Still Packed with Dangerous Flaws
Siemens industrial software targeted by Stuxnet malware is still full of security flaws, according to Russian researcher Sergey Gordeychik. His Defcon security paper was cancelled in July after the electronics and engineering giant filed a request, reports IDG News Service`s Jeremy Kirk.
In the summer, Siemens asked researchers to postpone the presentation so they can fix their WinCC software, a Supervisory Control and Data Acquisition system (SCADA) they use to manage industrial processes.
“It’s easy to find vulnerability in WinCC,” Positive Technologies CTO Sergey Gordeychik said. “You can just point at it.”
The security bugs are so many that Siemens has worked out a roadmap to patch them all, according to Gordeychik, who has found more than 50 vulnerabilities in WinCC’s latest version. Most of the bugs could allow hackers to remotely take over the system.
The electronics company has been very receptive to the Russian researcher`s findings, according to Gordeychik. “I’m really surprised,” Positive Technologies CTO said. “Other SCADA vendors don’t want to talk about security at all.”
Details from the cancelled Defcon presentation were revealed today in Seoul, where Sergey Gordeychik presented an overview of the paper at the Power of Community security conference with his colleague from the penetration testing team, Gleb Gritsai.
Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US
July 16, 2021
How to protect yourself against cyberstalking
July 06, 2021
The Top Five Security Risks Smartphone Users Face Today
July 02, 2021
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials
July 02, 2021
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger
June 30, 2021
Mobile security threats: reality or myth?
June 13, 2021
FOLLOW US ON
You might also like
July 23, 2021
July 22, 2021
July 20, 2021