To facilitate open communication of late breaking news relating to the impact on ICS from the Heartbleed OpenSSL bug, please use hashtag #HeartbleedICS in social circles. To view the latest on Twitter, click here.

The list below identifies those ICS devices that have been identified with the "Heartbleed" OpenSSL vulnerability, along with applicable links for additional information and mitigation recommendations.

Vendor Product(s) Reference
Certes Networks CEP-5, vCEP
Innominate mGuard 8.0.0, 8.0.1 ICSA-14-105-02
Siemens S7-1500 ICSA-14-105-03 | SSA-635659

A resilient cyber security program includes sufficient controls to aid in rapid detection of abnormalities and potential attacks. IDS signatures are available that may provide awareness of an attack of this nature occurring. Example signature rules sets written using the SNORT PERL language (which can be applied to Suricata as well) have been posted by ICS-CERT and the FBI under PIN 140410-001 and PIN 140416-002.

For additional, timely information, you can visit


The next 5-day Advanced course for Europe will be offered June 16-20, 2014 at the Mercure Den Haag Centraal. Registration is being handled with my Training Partner clicking here. Space is limited, so register now.

SCADAhacker was conceived with the idea of providing relevant, candid, mission-critical information relating to industrial security of Supervisory Control and Data Acquisition (SCADA), Distributed Control (DCS) and other Industrial Control Systems (ICS) in a variety of public and social media forums. Since its launch in December 2011, SCADAhacker now has thousands of readers and followers from over 50 countries around the world,  making it one of the leading sources for information sharing and knowledge development specifically devoted to industrial security.

The idea is simple - provide a single point of contact for a wide range of readers covering multiple industry segments for everything related to industrial security.

  • End-Users
  • Asset Owner-Operators
  • ICS Vendors & Suppliers
  • System Integrators
  • Engineering, Procurement &
    Construction Contractors
  • System Integrators
  • Security Researchers
  • Security Solution Providers
  • Oil and Gas
  • Petroleum Refining
  • Bulk Chemicals / Petrochemicals
  • Speciality Chemicals
  • Pulp, Paper & Printing
  • Pharmaceuticals
  • Food & Beverage
  • Power Generation
  • Water/Wastewater
  • Manufacturing

An important aspect of cyber security for critical infrastructure protection focuses on a basic understanding and awareness of real-world threats and vulnerabilities that exist within the industrial automation and control system architectures used in most process industries and manufacturing facilities. These issues face the Distribution Control Systems (DCS) and Supervisory Control and Data Acquisition Systems (SCADA) that comprise most industrial environments, and impact not on the common IT infrastructure like Windows-based computers and network appliances (switches, routers and firewalls), but also embedded "proprietary" equipment such as programmable logic controllers (PLC), remote terminal units (RTU), intelligent electrical device (IED), basic process controllers (BPCS, safety instrumented systems (SIS), operator panels, and ancillary systems that are the basis of most integrated ICS architectures.

One key objective of the SCADAhacker website is to provide vital information that helps visitors understand and secure ICS systems used within most process and manufacturing environments. SCADAhacker provides visitors with a comprehensive collection of security-related resources including tools commonly used to secure and test ICS architectures, information on the latest threats, vulnerabilities, and exploits that exist for ICS architectures, and a comprehensive library of the latest in standards, best practices, guidelines, and ICS-related information that can be used to help improve the security of any ICS system.

Some of the research performed during work on the second edition of "Industrial Network Security" by Eric Knapp and Joel Langill has confirmed some "eye opening" facts that industrial systems are gaining the attention of not only security researchers, but also potential attackers. Data obtained from the Open-Source Vulnerability Database (OSVDB) shows that through the end of 2013, 80% of all ICS vulnerabilities have been disclosed since 2011 - the year following the discovery of Stuxnet. The OSVDB database currently tracks a total of 795 ICS vulnerabilities, with 62 added in 2014. The days of "security by obscurity" are gone, and it is now time to realize the importance of implementing security programs specifically tailored for industrial systems and the operational technologies they utilize.

ICS Vulnerability Disclosures by Year ICS Vulnerability Disclosures by Type

Several dashboards are now available that provide visitors with a real-time look into the global security landscape looking at current threat intelligence, the vectors used to launch attacks, as well as the origin of leading threat agents (sources).

In addition to an extensive library of online information, SCADAhacker also offers public and private awareness and advanced training programs to learn, improve and apply the skills needed in industry today - those skills necessary to specify, design, assess, correct, monitor and maintain vitial industrial automation and control systems.

SCADAhacker is organized into several categories as described below.

One of the biggest challenges facing industry is the shortage of resources that understand not only traditional IT security concepts, but possess knowledge of the design and operation of industrial control systems. An extensive training curriculum is available to improve the knowledge of your team in both offensive (assessments and penetration) and defensive (security controls and audits) roles, covering basic awareness workshops to complete build-assess-secure courses specifically focused in ICS technologies.

Organizations, and even departments within organizations, possess varying levels of understanding with respect to industrial systems and how these operational technologies differ from more common information technologies. Experienced and inexperienced alike need to have easy access to relevant information regarding the latest standards, best practices and technologies available for Industrial security.

Equally important to securing control systems from cyber threats is the research that takes place to both uncover and understand vulnerabilities and other latent weaknesses that could impact the availability of the control system and the manufacturing facility that it controls.  A variety of software tools and environments are available to allow visitors to build test platforms and security labs upon which offensive research and defensive strategies can be analyzed.

Professional services are available to cover the complete lifecycle of control system security including risk assessment, risk classification, threat identification, security control selection, standards compliance, pre-commissioning testing, commissioning assistance, site audits and assessments. In 2014, a separate business entity is being created to support the increasing demand for specific services relating to ICS deployments. All services are performed using a unique "hard hat" approach to ICS security.

Advisories, Notifications & Vulnerability Information

Generated using Twitter Custom Timeline

SCADAhacker News Feed