Threats posed by using RATs in ICS
#1
Information 
Quote: While conducting audits, penetration tests and incident investigations, we have often come across legitimate remote administration tools (RAT) for PCs installed on operational technology (OT) networks of industrial enterprises. In a number of incidents that we have investigated, threat actors had used RATs to attack industrial organizations. In some cases, the attackers had stealthily installed RATs on victim organizations’ computers, while in other cases, they had been able to use the RATs that were installed in the organization at the time of the attacks. These observations prompted us to analyze the scope of the threat, including the incidence of RATs on industrial networks and the reasons for using them.

Contents:
Full reading: https://securelist.com/threats-posed-by-...ics/88011/
[-] The following 1 user says Thank You to harlan4096 for this post:
  â€˘ silversurfer
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Microsoft Defender Antivirus security in...
May-2025 (Platform...harlan4096 — 07:23
Hasleo Backup Suite Free 5.4.2.0
Hasleo Backup Suit...harlan4096 — 07:21
AV-Comparatives: Anti-Phishing Certifica...
AV-Comparatives ha...harlan4096 — 07:20
AV-Comparatives: Mac Security Review/Tes...
AV-Comparatives ha...harlan4096 — 07:18
AV-Comparatives: Mobile Security Review ...
AV-Comparatives ha...harlan4096 — 07:16

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (38)Tedscolo
avatar (45)brakasig
avatar (44)JamesReshy
avatar (46)Francisemefe
avatar (39)leoniDup
avatar (38)Patrizaancem
avatar (38)biobdam
avatar (39)storoBox
avatar (47)kinotHeemn
avatar (38)Ceballos1976
avatar (39)efynu

[-]
Online Staff
There are no staff members currently online.

>