![]() We will continue to provide updates to our white paper as further information comes to light. The latest version of our white paper includes new information, such as details on further components we observed being downloaded onto a compromised machine. CrySyS has issued a statement regarding their analysis here. We have now determined that the originally targeted organization was one of a limited number of targets which include those in the industrial infrastructure industry. Endpoint Security for DeltaV Systems software utilizes elements of the McAfee Endpoint Protection Suite of products to provide endpoint protection (antivirus protection) for key DeltaV system components. We are grateful to CrySyS-sharing their findings allowed us to identify further attacks taking place. Get the Visibility You Need with XDR, Defend Against Threats with Intelligent EDR, and Synchronize Protection from a Single Console. They stated that no data was leaked as part of this attack. This Endpoint Security White Paper outlines the components of an effective cyber security strategy, including both hardware and software tools.Free detailed reports on Endpoint Security are also available. CrySyS identified the infection and observed its similarity to W32.Stuxnet. This research was conducted by the Laboratory of Cryptography and System Security (CrySyS) in the Department of Telecommunications, Budapest University of Technology and Economics. As mentioned in our previous blog, W32.Duqu was first brought to our attention by a research lab who had been investigating a targeted attack on another organization.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |