NCIIPC Newsletter Oct19
NCIIPC Newsletter Oct19
NCIIPC Newsletter Oct19
NCIIPC Newsletter
October 2019 Message from the NCIIPC Desk
Dear Readers,
3 News Snippets - Threats like Mirai and suspected backdoors in plethora of devices
International need to be addressed on priority. With ubiquitous proliferation of
6 Trends IoT devices and ushering of newer technologies like 5G on the
anvil, the attack surface is going to significantly increase. Reports
8 Malware Bytes
suggest that by 2020, India will have around 1.9 billion connected
11 Learning
IoT devices.
17 Vulnerability Watch
The vanishing divide between OT and the ICT infrastructure
20 Security App
presents a larger attack surface. Most Critical Sectors are heavily
21 NCIIPC Initiatives
dependent on legacy ICS/SCADA systems. The known security
25 Mobile Security gaps need to be looked into.
27 Upcoming Events – Global
We also see the rise of attacks on the financial sector in India
28 Upcoming Events - India especially the use of Dtrack malware. Though the click-through
rates on phishing links have shown a decline, there is a
corresponding increase in the susceptibility of mobile users.
Trends
Latest Technological Trends in Banking and Financial Services in
India
Sectoral Coordinator, BFSI
References:
[1] https://www.enterpriseedges.com/banking-financial-
service-trends-india
[2] https://www.finoit.com/blog/banking-industry-trends-2018-
19/
NCIIPC NEWSLETTER PAGE 7
Malware Bytes
An ongoing Malware Campaign Linked to Threat Actor SWEED
Source: https://blog.talosintelligence.com/
Multiple ICS sectors now face the XENOTIME threat; this means
individual verticals – such as oil and gas, manufacturing, or XENOTIME is the only
electric – cannot ignore threats to other ICS entities because known entity to
they are not specifically targeted. XENOTIME is the only known specifically target
entity to specifically target Safety Instrumented Systems (SIS) for Safety Instrumented
disruptive or destructive purposes. Electric utility environments Systems (SIS) for
are significantly different from oil and gas operations in several disruptive or
aspects, but electric operations still have safety and protection destructive purposes.
equipment that could be targeted with similar tradecraft.
Learning
Medical Device Cyber Security
Sectoral Coordinator (Strategic & Public Enterprises), NCIIPC
References:
[1] https://www.himss.org/file/1317711/download?token=FpOap
XsF
[2] https://www.finoit.com/blog/banking-industry-trends-2018-19/
References
[1] https://www.trendmicro.com/vinfo/in/security/news/intern
et-of-things/the-iot-attack-surface-threats-and-security-
solutions
[2] https://www.adb.org/sites/default/files/publication/350011
/sdwp-48.pdf
References
[1] https://nciipc.gov.in/documents/Rules_procedure_new201
8.pdf
[2] https://www.blackhat.com
[3] https://www.defcon.org
[4] https://www.enisa.europa.eu
[5] https://www.sans.org
[6] https://www.mitre.org
[7] https://nvlpubs.nist.gov
[8] https://blogs.gartner.com
[9] https://www.researchgate.net
Vulnerability Watch
Insecure Implementation of CAN Bus Networks Affecting Aircraft
Source: https://www.us-cert.gov/ics/alerts/ics-alert-19-211-01
Source: https://blog.talosintelligence.com/2019/06/vulnerability-
spotlight-multiple.html
Source: https://hackerone.com/reports/685447
Exploit
Critical Vulnerability in Cisco REST API Virtual Service Container
Source: https://nvd.nist.gov/
Source: https://nvd.nist.gov/
Source: https://www.applied-risk.com/resources/ar-2019-005
Security App
Firefox for Android Added Support for Web Authentication API
Source: https://blog.mozilla.org/security/
Elastic SIEM
Source: https://www.elastic.co/blog/
NCIIPC Initiatives
Guidelines for Identification of Critical Information Infrastructure
https://nciipc.gov.in/documents/Guidelines_for_Identification_of_CII.p
df
http://nciipc.gov.in/RVDP.html
Mobile Security
Cerberus: A New Android Banking Malware in town
Source: https://www.threatfabric.com/blogs/
21
20 22
21 23
22 24
23 25
24 26
25 27
26 • Industrial Control Cyber Security Europe 29-30 Oct
Conference, London
28
27 29
28 30
29 30 31
November 2019
• Cyber Security Asia 2019, Cambodia 4 Nov
NOVEMBER 2019
• SANS DFIRCON 2019, Coral Gables, Florida 4-9 Nov
MAY 2019
S M T W T F S
• Aviation Cyber Security Summit, London 5-6 Nov
S M T W T F
1 S
2
1 2 3 4 • Health IT Summit – Southwest, Houston 14 Nov
3 4 5 6 7 8 9
5 6 7 8 9 10 11 • Operational Resilience in the Financial 18 Nov
10 11 12 13 14 15 16 Sector, London
12 13 14 15 16 17 18
17 18 19 20 21 22 23 • CyberCon 2019, Anaheim, California 19-21 Nov
19 20 21 22 23 24 25
24 25 26 27 28 29 30 • International conference on advanced 20-22 Nov
26 27 28 29 30 31 communication systems and information security 2019,
Marrakech, Morocco
December 2019
• International Cyber Risk Management 4-6 Dec
Conference, Bermuda
• Gartner IT Infrastructure, Operations & Cloud 9-12 Dec
Conference 2019, Las Vegas, Nevada
• Utility Cyber Security Forum, Illinois 11 Dec
• SecureCISO Denver, Denver, Colorado 12 Dec
January 2020
• CPX 360 New Orleans 27-29 Jan
• NextGen SCADA, Berlin 27-31 Jan
PAGE 28 NCIIPC NEWSLETTER
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31
[email protected]
General Help :
[email protected]
Notes
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
Feedback/Contribution
Copyright
NCIIPC, Government of India
Disclaimer
NCIIPC does not endorse any vendor, product or service. The content of
the newsletter is for informational purpose only. Readers may validate
the information on their own.