Recreating the Ukraine 2015 attack - on the latest 2022 firmware

Recreating the Ukraine 2015 attack - on the latest 2022 firmware

Take 1 Ethernet converter, 2 skilled security researchers and 5 days in the lab = Some interesting zerodays!

At the International Industrial Security Conference 14-16 November Casper Bladt, Senior IT/OT Security Consultant in ICSRange & Jens Nielsen, Senior Security Researcher in ICSRange will give insights on the internal research work, EnGarde Security did on the very same device that was (ab)used in the power grid attack in 2015.

Attend the conference, to learn how they were able to duplicate the attack on latest, current firmware... and they will provide a live demo as well!

Sign up here and learn more: https://insightevents.dk/isc-cph/#about

Previous
Previous

Porting a sha256 algorithm from x86 assembly to ARM

Next
Next

Digital Tech Summit in Copenhagen.