Seems SCADA systems (or at least alleged attacks on them) have hit the big time.Wired magazine is running this story on the Illinois Water Attack.See my post over on Unfettered about what's looking more and more like an Attack by the Keystone Cops instead, wh
Nancy Bartels of Control magazine and ControlGlobal.com hijacking Joe's blog here. This story would be funny if it wasn't so scary. Wired magazine has broken the real story (or the latest iteration of the real story). The link is here. So it wasn't evil hackers from Russia after all.
My blog on the Illinois water hack was directly based on a formal disclosure announcement by the Illinois State Terrorism and Intelligence Center - STIC (Note: My blog did not identify the state involved. That disclosure came from DHS).
Per the WaterISAC portal, the WaterISAC (Information Sharing and Analysis Center) is a community of water sector professionals who share a common purpose: to protect public health and the environment. The WaterISAC provides email notifications about threats and any incidents demanding immediate attention.
Last week, a disclosure was made about a public water district SCADA system hack. There are a number of very important issues in this disclosure:
Posted by Joe Weiss:
The industry uses the general term "threat information," but during more detailed discussions, it seems that the information companies seek is more like the traditional military concept of "tactical information."
Users get the security they're willing to pay for...and not any more. #pauto #cybersecurity #opsmanage #NERC
A lot of this will be in my December Editorial:
OK, faced with the Siemens vulnerability, which could have been anybody else's vulnerability just as easily, what should we do?
Auke Huistra,Project manager Cybercrime Information Exchange NICC, posted this on the SCADASEC mailing list: