© 2019 InfraGard National Capital Region Members Alliance.  

WARRANTY DISCLAIMER  The FBI, InfraGard, and its affiliates provide information, including but not limited to software, documentation, training, and other guidance to be known as “materials.” The materials are provided as-is and we expressly disclaim any and all warranties, express or implied, including, and without limitation, the implied warranties of merchantability, fitness for a particular purpose, non-infringement, quiet enjoyment, and integration, and warranties arising out of course of dealing or usage of trade. You agree that, as between you and the FBI, InfraGard, and its affiliates, you are responsible for the outcome of the use of materials made available, including but not limited to adherence to licensing requirements, and taking legal and regulatory considerations into account. There is no guarantee of accuracy, completeness, timeliness, or correct sequencing of the information provided.

OFFICIAL LINKS

  • White LinkedIn Icon
  • Facebook Clean
  • Twitter Clean
Please reload

Recent Posts

I'm busy working on my blog posts. Watch this space!

Please reload

Featured Posts

March Cyber SIG Debrief

June 13, 2016

 

InfraGardNCR's Cyber Security Special Interest Group (Cyber SIG) met last Thursday to discuss the December 2015 cyber attack on Ukraine’s power grid impacting approximately 225,000 customers. The attackers launched a malware attack to the power grid so severe it knocked out internal systems and call centers, disabling visibility to the monitoring center so that operators could not detect where the source of the damage was coming from. A member of the group mentioned that because Ukraine’s power grid is not the most sophisticated, the attack was not as effective as it could have been. The fact that they are using 40 - 50 year old technology actually helped them. Power has since been restored, but power companies continue to run under constrained operations. The attack shines light on the importance of cyber security for US facilities, as the same malware has been found in US industrial control systems. Tests for detecting BlackEnergy malware should be run using the latest published YARA signature, found here. For more information about the Cyber SIG, contact us.

Tags:

Please reload

Follow Us
Please reload

Search By Tags