The Radiflow Cyber Security Blog

Deutsche Telekom Selects Radiflow as Strategic Partner for Securing Industrial Facilities

Hannover, Germany, March 22, 2017 – Deutsche Telekom announced at Cebit earlier this week that it has entered a strategic partnership with Radiflow to collaborate in the field of securing industrial networks. Radiflow was chosen by T-Systems, a subsidiary of Deutsche...

read more

Revealing Web-Connected Critical Devices

Background In my last entry I mentioned shortly the re connaissance stage in ICS attack campaigns. In this post I will present the risks involved, and I will describe one of the tools used for reconnaissance. If you read this post through, you will be able to search on your own for web-connected SCADA controllers. The […]

read more

Yes We SCAN!

Early detection of ICS attacks decreases the probability of causing damage to the network. In this post I will focus on one of the first stages in ICS attacks, where the attacker attempts to scan the network for devices. First, I will explain the motivation behind the scanning stage, followed by a description of the scanning techniques used. Lastly I will present examples of real-world attacks and malware.

read more

Designing an ICS Attack Platform

Early detection of ICS attacks decreases the probability of causing damage to the network. In this post I will focus on one of the first stages in ICS attacks, where the attacker attempts to scan the network for devices. First, I will explain the motivation behind the scanning stage, followed by a description of the scanning techniques used. Lastly I will present examples of real-world attacks and malware.

read more

ICS Firewall Deployment

We take it as a given that it’s essential to deploy firewalls inside ICS networks. However, it is less clear why and which properties should such firewalls have: should they be stateful? DPI? Signature-based? In this post I will try to shed some light on the topic. Consider a typical ICS network, with a main […]

read more