Internet-Exposed ICS Devices Raise Alarm for Critical Sectors
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章主要讲的是ICS设备暴露在互联网上带来的风险,特别是使用Modbus这样的不安全协议。这些设备容易被攻击,可能导致破坏、数据泄露甚至物理损害。文章还提到恶意软件如Stuxnet等已经造成过严重后果。 另外,研究显示2024到2025年ICS漏洞披露几乎翻倍,威胁者目标集中在能源、制造和公用事业等领域。暴露的设备分布在多个国家,美国最多。这些设备涉及关键基础设施,比如铁路和电网。 最后,文章建议采取基本安全措施如防火墙、VPN等来保护这些系统,并指出如果不加强安全,工业基础设施将继续成为网络攻击的目标。 现在我需要把这些要点浓缩到100字以内。确保涵盖ICS设备暴露、Modbus协议问题、恶意软件威胁、漏洞增加、设备分布及关键领域影响,以及建议的安全措施。 可能的结构:ICS设备暴露+Modbus问题+恶意软件+漏洞增加+分布情况+关键领域影响+建议措施+后果。 这样组合起来应该能在100字内表达清楚。 </think> 互联网暴露的工业控制系统(ICS)设备和不安全协议(如Modbus)增加了关键基础设施的风险,可能导致破坏、数据访问和潜在破坏。恶意软件(如Stuxnet)已展示对工业设施的威胁。研究显示2024至2025年ICS漏洞披露几乎翻倍。全球扫描发现大量暴露的Modbus设备,涉及铁路、电网等关键领域。缺乏安全措施使攻击者易读取和修改数据。加强防火墙、VPN等安全措施至关重要。 2026-4-9 07:20:8 Author: securityaffairs.com(查看原文) 阅读量:17 收藏

Internet-Exposed ICS Devices Raise Alarm for Critical Sectors

Exposed ICS devices and insecure protocols like Modbus increase risks to critical infrastructure, enabling disruption, data access, and potential sabotage.

Malware targeting industrial control systems (ICS) poses a serious risk to critical infrastructure, with threats like Stuxnet, Industroyer, Triton, Havex, and BlackEnergy already demonstrating the ability to disrupt operations, cause outages, and even inflict physical damage. Recent research shows that ICS vulnerability disclosures nearly doubled between 2024 and 2025, driven in part by increased interest from threat actors targeting sectors such as energy, manufacturing, and utilities.

A key concern is the exposure of ICS devices to the internet, especially those using legacy protocols like Modbus. Widely used in industrial environments to enable communication between sensors and controllers, Modbus lacks basic security features such as encryption and authentication. This makes internet-exposed devices particularly vulnerable, as attackers can both read and modify data without needing credentials.

To better understand the scale of the issue, researchers conducted a global scan for devices responding on port 502, the default port for Modbus. Out of 311 initial responses, 179 were identified as likely real ICS devices after filtering out honeypots and unreliable data. These devices were found across multiple countries, with the United States hosting the largest number (57), followed by Sweden (22) and Turkey (19).

Some of the exposed systems were linked to highly sensitive environments. For example, one device appeared to be part of a national railway network, where ICS systems are used for train routing and signalling—functions critical to both safety and operations. Other devices were tied to national power grids in Europe and Asia, where ICS technology plays a central role in monitoring energy consumption and controlling distribution.

In terms of vendors, many devices did not reveal detailed manufacturer information, which is common for custom or embedded systems. However, among those that did, Schneider Electric devices were the most common, followed by Data Electronics and ABB Stotz-Kontakt.

“The majority of devices (128) only exposed their firmware versions and/or internal IDs without including a vendor string. This is to be expected from custom controllers or embedded modules.” reads the report published by Comparitech. “A total of 54 devices did advertise their manufacturer (though not always their model information). Schneider devices were most prevalent (22 instances), followed by Data Electronics (14 instances) and ABB Stotz-Kontakt (6 instances).”

Examples of exposed equipment included logic controllers, processor modules, energy meters, and power quality loggers—components essential for managing industrial processes and electrical systems.

Exposing device details such as make and model increases the risk further. Attackers can use this information to locate documentation like register maps, which define how data is stored and interpreted within the device. These registers may contain critical operational data such as temperature, voltage, pressure, or system status. In one case, researchers were able to monitor real-time energy consumption of a live system using publicly available documentation.

Even when device details are not explicitly disclosed, attackers may infer their function by analyzing how data values change over time. Since Modbus allows write access without authentication, attackers could alter register values, potentially disrupting operations. Even small changes could have cascading effects on industrial processes that rely on accurate sensor data.

The broader context makes the issue even more urgent. The global ICS market is growing rapidly, expected to more than double in value by 2033. As more devices are connected to networks, the attack surface expands, increasing the likelihood of exploitation if proper security measures are not implemented.

From a defensive standpoint, basic protections such as firewalls, VPNs, network segmentation, and strong authentication are essential to prevent unauthorized access. However, many ICS environments still rely on outdated architectures that were originally designed for isolated networks, not today’s interconnected landscape.

The research highlights how even attackers with limited technical skills could exploit exposed ICS devices, particularly those using insecure protocols like Modbus, DNP3, or BACnet.

“From an attacker’s perspective, devices running protocols like Modbus (as well as DNP3, or BACnet) are particularly vulnerable because they were designed for closed networks and often lack built-in authentication or encryption.” continues the report. “These devices could be exploited by attackers with limited technical expertise if exposed directly to the internet. This is particularly concerning given some ICS devices’ critical role in economic activity and essential infrastructure.”

Given the critical role these systems play in infrastructure and economic activity, their compromise could have wide-ranging consequences, from service disruptions to safety hazards.

In summary, the growing exposure of ICS devices, combined with insecure legacy protocols and increasing attacker interest, creates a high-risk environment. Without significant improvements in how these systems are secured and managed, industrial infrastructure will remain a prime target for cyber threats.

More info is included in the report by Justin Schamotta and Mantas Sasnauskas.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, ICS)




文章来源: https://securityaffairs.com/190525/ics-scada/internet-exposed-ics-devices-raise-alarm-for-critical-sectors.html
如有侵权请联系:admin#unsafe.sh