Critical ops hack 20209/12/2023 ![]() ![]() “t’s particularly concerning because … compromising one OEM, depending on where you compromise them, could lead to access to thousands of organizations,” said Lee, a former critical infrastructure threat intelligence analyst for the NSA. It doesn’t mean they can then flip off the lights they have to do more after that.”īut compromising an OEM does magnify the potential risks to infrastructure. “But just because you have access doesn’t mean you know what to do or how to do it. “If an OEM has access to a network, and it’s bi-directional, it’s usually for more sensitive equipment like turbine control, and you could actually do disruptive actions,” Lee told The Intercept. This means that hackers who breached the OEMs could potentially use their credentials to control critical customer processes. They sometimes have remote access to critical parts of customer networks, as well as privileges that let them make changes to those networks, install new software, or even control critical operations. The service companies are known within the industry as original equipment manufacturers, or OEMs.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |