

Real world stories of incident response and threat intelligence.
Aug 23, 2023
Today's guest, Lesley Carhart, shares real-world incident response and threat intelligence stories. Topics discussed include manipulated radiation sensor reports, malware attack on a power generator, APT-31 attacks on industrial systems, maritime cyber risk regulations, CODESYS vulnerabilities, and the role of firewalls in OT and IT environments.
AI Snips
Chapters
Transcript
Episode notes
Chernobyl Sensor Manipulation
- Radiation sensor data from Chernobyl's exclusion zone was likely manipulated during the 2022 Russian occupation.
- This manipulation caused inexplicable radiation spikes, highlighting the safety risks of corrupted sensor data in industrial systems.
Chinese Infrastructure Attack Staging
- CISA Director Jen Easterly warns of Chinese threat actors preparing to attack US critical infrastructure.
- This preparation focuses on espionage and maintaining undetected access, especially in sectors like communications and utilities.
CodeSYS Vulnerabilities
- Apply CodeSYS patches promptly to mitigate denial-of-service and remote code execution vulnerabilities.
- These vulnerabilities, while severe, require authentication and deep CodeSYS knowledge, reducing widespread grid shutdown risks.