CharGEN cyberattacks based on the CharGEN protocol

Updated on 31/05/2024, by
INCIBE (INCIBE)
DrDoS attacks based CharGEN
En este post se presentan algunas líneas de actuación que deben seguirse para hacer frente a un ciberataque DrDoS basado en el protocolo CharGEN, describiendo detalladamente las fases de prevención, identificación y respuesta a adoptar.

PLCs security risks

Posted on 30/05/2024, by
INCIBE (INCIBE)
Cover PLCs security risks
En la actualidad, el sector industrial se ha convertido en uno de los blancos más frecuentes de los ciberdelincuentes. Convirtiendo el cibercrimen en uno de los principales riesgos del sector, ya que el objetivo preferido en las redes industriales son los equipos críticos que desempeñan un papel fundamental en el sistema. Por tanto, en este artículo, exploraremos las distintas fases y formas de un ciberincidente en un entorno industrial, para entender el riesgo que representan y como prevenirlos.

Babuk Tortilla: use of recovery tool & processes

Posted on 23/05/2024, by
INCIBE (INCIBE)
Imagen decorativa del blog
Babuk Tortilla is a version of the original Babuk ransomware, which emerged after the leak of its source code, and which attracted attention in the cybersecurity landscape due to the intention of being deployed on vulnerable servers.This article reviews its origin and operation, focusing on its modus operandi and the techniques used to breach the security of data and systems. It also provides key tools and recommendations to identify and neutralize its effect on technological infrastructures, providing users with the necessary knowledge to defend against this significant risk. Understanding how Babuk Tortilla works and its recovery mechanisms is vital.

Wi-Fi communications in ICS

Updated on 06/06/2024, by
INCIBE (INCIBE)
Imagen de planta de una fábrica
Technology adoption in industrial plants is part of the global digital transformation. This evolution provides greater knowledge of all the elements that interact in industrial processes, but it can also incorporate cybersecurity issues if a series of good practices are not followed. The development of this article focuses on the problems introduced by Wi-Fi communications and their growth in industrial environments.

Exploring M-Bus, security and efficiency in telemetry communications

Posted on 16/05/2024, by
INCIBE (INCIBE)
Decorative photo
The M-Bus protocol is a common protocol in the industry in general, it’s daily use can be related to devices for measurements of electricity, gas, water, heating, etc. This protocol has a wireless variant called Wireless M-Bus and works through a hierarchical master/slave system, standardized according to EN13757.