Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Black Energy malware may be exploiting patched WinCC flaw

Black Energy malware may be exploiting patched WinCC flaw

2014/12/11

Threatpost - (International) The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued an update to a previous alert concerning the Black Energy malware seen targeting human-machine interface (HMI) products, which stated that the malware may be exploiting vulnerabilities in the Siemens SIMATIC WinCC software that was patched by Siemens November 11.

Source: http://threatpost.com/black-energy-malware-may-be-exploiting-patched-wincc-flaw/109835

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:22:45