Author: Waterfall Team

Recent shutdowns of the Colonial Pipeline and JBS meat packing plants are only the latest evidence of a continuing trend. Ransomware is responsible for all OT shut-downs due to cyber attacks since at least the beginning of 2020. New Article by Andrew Ginter, VP Industrial Security, Waterfall Securit

Defeating a a jump host with 2-factor authentication. Attackers use spear-phishing and custom malware attachments to target technicians authorized to log into a jump host. A technician activates their VPN and logs in using two-factor authentication. This activates the malware, giving attackers contr

Cell phone supply chain attack - attackers write a free cell-phone app. When cell phones with the app are carried into industrial control systems, the app scans for WiFi access points and reports the details over the Internet. Attackers then use phishing to extract the passwords for these networks a

Attackers write their own RAT malware & deploy on the IT network of a services company known to service the real target. The attackers compromise the laptops of personnel who routinely visit the real target and gain a foothold on the real target’s IT network, ultimately propagating to the ICS netw

An organized crime group develops a history of routine speculation on futures markets for gasoline. Then they damage equipment at a refinery by using known vulnerabilities on internet facing IT equipment. This cripples the supply, makes prices spike, and attackers profit from their speculation.

Nation state attackers use more sophisticated tools such as the BlackEnergy trojan to ultimately take over equipment on the ICS network and disable protective relays. The attack group then sends control commands to very quickly connect and disconnect power flows to parts of the grid, destroying larg

Press Release: Kaspersky and Waterfall partnership. The joint solution provides non-intrusive industrial network traffic inspection and deep packet inspection (DPI), while providing industrial networks with hardware-enforced unidirectional protection for safe and reliable operations. Read more

An attack group similar to the “Shadow Brokers” steals a list of zero days from a nation-state adversary and sells the list to an organized crime group. That group creates autonomous ransomware that jumps through firewalls via encrypted connections to file shares, causing an emergency shutdown a

Zero trust is a new way of thinking about cybersecurity for connected systems. Let's explore what zero trust means for industrial / ICS / OT networks. New blog post by Blase Janov, Director of Business Development at Waterfall Security Solutions

Watch Waterfall Security’s video for a brief explanation on how to achieve safe IT/OT integration and 100% protection from remote cyber threats with Unidirectional Security Gateways. Protect your industrial and OT network perimeter from remote cyber threats using the strongest cyber protection ava