Preface Recently, GitHub's Security Incident Response Team (SIRT) published an article saying that a set of Github code repositories were serving open-source projects that were infected with malicious code (https://securitylab.github.com/research/octopus-scanner-malware-open-source-supply-chain). According to the article, attackers submitted malicious code to the open-source projects, which were referenced by other open-source projects. After...
Category: DDoS Mitigation
Annual IoT Security Report 2019-5
This section presents the exposure of IPv6 assets on the Internet and methods for recon of these assets. IPv6 Evolution With the IoT and 5G gaining ground, the demand of network applications for IP addresses is undergoing an explosive growth. However, the IPv4 address space has been depleted and IPv4...
Analysis of the 2020 H1 IoT Security Trend
Overview 2020 H1 witnessed nine Internet of Things (IoT) security events that deserved close attention: Ripple20 0-day vulnerabilities were discovered and affected hundreds of millions of networked devices in various industries across the globe.A high-risk 0-day vulnerability was detected in dozens of Netgear router products.A group of Industrial Control System...
Annual IoT Security Report 2019-4
Introduction As we indicated in the 2018 Annual IoT Security Report, network addresses on the Internet constantly change. Use of historical data to delineate exposure of assets will result in a deviation from reality, presenting a value higher than the actual number. Therefore, to accurately reflect the reality of a...
Annual IoT Security Report 2019-3
LockerGoga Ransomware Alleged to Repeatedly Attack Plants On January 24, 2019, France-based Altran Technologies was allegedly hit by LockerGoga ransomware. On March 19, Norsk Hydro, one of the largest aluminum companies worldwide, was hit by an extensive cyberattack, having machines around the globe infected with malware and some unable to...
Attack and Defense Around PowerShell Event Logging
0x00 Overview PowerShell has been a focus of concern for network defense. The fileless PowerShell, featuring LotL and excellent ease of use, is widely used in various attack scenarios. In order to capture PowerShell-based attacks, an increasing number of security professionals tend to, through PowerShell event log analysis, extract attack...



