How hackers find a way to successfully gain ?
- Get link
- X
- Other Apps
Hackers have managed to find a way to successfully gain access to uninterruptable power supply (UPS) computer systems, according to a report from The Cybersecurity and Infrastructure Security Agency (CISA).
As reported by Bleeping Computer and Tom’s Hardware, both the Department of Energy and CISA issued a warning to organizations based in the U.S. that malicious threat actors have started to focus on infiltrating UPS devices, which are used by data centers, server rooms, and hospitals.
UPS devices allow companies to rely on emergency power when the central source of power is cut off for any given reason. If the attacks concentrated on these systems come to fruition, Tom’s Hardware points out that the consequences could prove to be catastrophic. In fact, it could cause PCs or their power supplies to burn up. As a result, it can inevitably lead to fires breaking out at data centers and even homes.
Both federal agencies confirmed that hackers have found entry points to several internet-connected UPS devices predominantly via unchanged default usernames and passwords.
Both federal agencies confirmed that hackers have found entry points to several internet-connected UPS devices predominantly via unchanged default usernames and passwords.
“Organizations can mitigate attacks against their UPS devices, which provide emergency power in a variety of applications when normal power sources are lost, by removing management interfaces from the internet,” the report stated.
Other mitigation responses the agencies recommended putting in place include safeguarding devices and systems by protecting them through a virtual private network, applying multi factor authentication, and making use of effective passwords or passphrases that can’t be easily deciphered.
To this end, it stresses that organizations change UPS’s usernames and passwords that have remained on the factory default settings. CISA also mentioned that login timeout and lockout features should be applied as well for further protection.
Severe consequences
The report highlights how UPS vendors have increasingly incorporated a connection between these devices and the internet for power monitoring and routine maintenance purposes. This practice has made these systems vulnerable to potential attacks.
A prime example of hackers targeting UPS systems is the recently discovered APC UPS zero-day bugs exploit. Known as TLStorm, three critical zero-day vulnerabilities opened the door for hackers to obtain admin access for devices belonging to APC, a subsidiary of an electrical company.
If successful, these attacks could severely impact governmental agencies, as well as health care and IT organizations, by burning out the devices and disabling the power source remotely.
The number of cyberattacks against crucial services has been trending upwards in recent years as cybercriminals progressively identify exploits. For example, cyberattacks against health care facilities almost doubled in 2020 compared to 2019.
It’s not just large organizations that are being targeted — online criminals stole nearly $7 billion from individuals during 2021 alone
- Get link
- X
- Other Apps
Popular posts from this blog
Pup Smart Scanner:
Using a scanner is usually not the most user-friendly experience you'll ever have. Since you'll have to find your scanner, which is probably under about 5 boxes. You then have to connect it to your computer, which the drivers are probably either not installed or out of date. Then you have to put each individual document you want to scan into the device and wait about 2 minutes each. The Pup is a super simple scanner that works just like a camera, and takes just seconds to scan each item you want digitized. How it works is, you select the settings beforehand on how you'd like to scan it, and what you'd like to do with it once it's scanned, then you hold the Pup Smart Scanner above what you'd like to scan, and lasers will square off and show you exactly what you're about to scan. Then just press the button to initiate the scan, and a flash will illuminate the document, and it will scan it within seconds. Perfect for keeping your child's dr...
What is Muzo?
Using Billion Sound Technology (BST), the Muzo smart acoustic device attaches to any smooth surface and generates dynamic, realistic sounds, while promising to cancel vibration and outside noise. This way, the company claims that Muzo can turn almost anything into a crystal clear acoustic environment, including windows, walls, and desks and other furniture; improve the quality of your sleep, and even help protect your speech privacy. And it promises to do all of this over three steps: Position Muzo toward the noise and reposition if needed. Gently press the large button on the surface to select your ambient noise (or, use the noise-canceling technology by itself). Rotate the button to adjust soundtrack volume. Together, the company tells us that Muzo’s noise-blocking technology can create a “personal zone creator” that can work as an alternative to sleep aids and costly sound machines. Muzo sure sounds cool, but is it worth the money? Is it even a feasible con...
Comments
Post a Comment