Ukrainian hacking group Blackjack reportedly utilized a destructive ICS malware named Fuxnet in attacks against Russian infrastructure, as per findings from industrial and enterprise IoT cybersecurity firm Claroty. The group allegedly damaged emergency detection and response capabilities in Moscow and surrounding areas, targeting Moscollector, a Moscow-based company responsible for water, sewage, and communications infrastructure. According to Blackjack's claims on the website ruexfil.com, the attack commenced in June 2023, resulting in the disabling of 87,000 sensors and controls, including those at airports and gas pipelines. The Fuxnet malware was deployed to physically destroy sensory equipment and flood RS485/MBus with random commands. While the attackers boasted about extensive damage, Claroty's analysis contradicts some claims, indicating around 500 sensor gateways were affected. The attack chain involved hackers targeting sensor gateway IPs, distributing malware through remote-access protocols or sensor protocols. Once executed, the malware locked out devices, deleted essential files, disabled remote access services, and erased routing tables. Additionally, it attempted to physically destroy NAND memory chips and disrupt sensors by flooding serial channels with random data. Claroty's report emphasizes the severe disruption caused by the malware's actions, including the destruction of filesystems, directories, and memory chips, leading to extensive operational disruptions. However, the extent of the damage and the attackers' claims remain subject to verification.
A critical vulnerability has been identified in PX4 Autopilot, widely used in drones and autonomous vehicles across global industries. Highlighted by Cybersecurity and Infrastructu...
Cybercriminals are now weaponizing legitimate hotel reservation data to trick travelers into surrendering their payment details. This "Reservation Hijack Scam" stands out b...
A serious security issue has been discovered in nginx-ui, which can allow attackers to take full control of a system. This vulnerability is tracked as CVE-2026-33026. The problem e...