» » ABB Oil and Gas Flow Computer Hack Can Prevent Utilities From Billing Customers

ABB Oil and Gas Flow Computer Hack Can Prevent Utilities From Billing Customers

ABB Oil and Gas Flow Computer Hack Can Prevent Utilities From Billing Customers

Residence › ICS/OT

ABB Oil and Fuel Move Laptop Hack Can Forestall Utilities From Billing Clients

By Eduard Kovacs on November 10, 2022

Tweet

Oil and gasoline circulation computer systems and distant controllers made by Swiss industrial know-how agency ABB are affected by a severe vulnerability that might enable hackers to trigger disruptions and forestall utilities from billing their prospects, based on industrial cybersecurity agency Claroty.

Utilities depend on circulation computer systems to calculate oil and gasoline circulation charges and quantity. These gadgets, which are sometimes used within the electrical energy sector, play an vital position in course of security, in addition to billing.

Researchers at Claroty confirmed how an attacker with entry to a focused circulation laptop can bypass authentication utilizing a brute-force assault, after which exploit a path traversal vulnerability to learn the machine’s shadow password file to acquire its root account password. The identical vulnerability can be utilized to change the SSH configuration file to allow password authentication and permit the attacker to entry the machine with root privileges.

This complete exploit chain can enable a distant, unauthenticated attacker to execute arbitrary code with root privileges. The hacker can take full management of the machine and disrupt its skill to measure oil and gasoline circulation, which might forestall the sufferer from billing prospects.

One good instance of the significance of billing techniques is offered by the 2021 Colonial Pipeline ransomware assault, the place the corporate reportedly halted operations not as a result of the hackers hit operational know-how (OT) techniques, however as a result of its billing system was compromised.

Claroty reported its findings to ABB, which introduced the discharge of firmware patches for affected merchandise in July. The trail traversal vulnerability is tracked as CVE-2022-0902 and it has been assigned a ‘excessive severity’ ranking.

ABB has decided that its XFC G5 and uFLO G5 circulation computer systems, RMC-100, XRC G5, and XIO distant controllers, in addition to the Totalflow Common Knowledge Controller (UDC) are impacted. The seller stated in its July advisory that it was not conscious of any assaults exploiting the vulnerability.

Claroty has printed a weblog submit detailing its analysis, in addition to a video displaying how an attacker might hack a tool.

Associated: iBoot Energy Distribution Unit Flaws Enable Hackers to Remotely Shut Down Gadgets

Associated: New Vulnerabilities Enable Stuxnet-Type Assaults In opposition to Rockwell PLCs

Associated: Moxa MXview Vulnerabilities Expose Industrial Networks to Assaults

Get the Each day Briefing

 
 
 

  • Most Current
  • Most Learn
  • ABB Oil and Fuel Move Laptop Hack Can Forestall Utilities From Billing Clients
  • No Cyberattacks Affected US Vote Counting, Officers Say
  • Microsoft Patches MotW Zero-Day Exploited for Malware Supply
  • Safety Posture Administration Agency Veriti Emerges From Stealth With $18.5M in Funding
  • Gaping Authentication Bypass Holes in VMWare Workspace One
  • Google Pays $45,000 for Excessive-Severity Vulnerabilities Present in Chrome
  • Attackers Utilizing IPFS for Distributed, Bulletproof Malware Internet hosting
  • Citrix Patches Vital Vulnerability in Gateway, ADC
  • Intel, AMD Tackle Many Vulnerabilities With Patch Tuesday Advisories
  • SAP Patches Vital Vulnerabilities in BusinessObjects, SAPUI5

Searching for Malware in All of the Unsuitable Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Laptop Says About You

Be in a Place to Act Via Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

The way to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Engaging

The way to Defend In opposition to DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles