Mind the Air-Gap: Exfiltrating ICS Data via AM Radios and Hacked PLC Code


Posted on in Presentations

Critical industrial infrastructure is a juicy target for cyberattackers seeking ransom, trade secrets or geopolitical intimidation. But many organizations assume they’re safe because their ICS/SCADA networks are air-gapped. This live hack will show how to exfiltrate reconnaissance data from air-gapped networks with AM radios and specially crafted code injected into programmable logic controllers.

Learning Objectives:
1: See how novel targeted attacks can bypass air-gap security for data exfiltration.
2: Learn how malicious ladder logic code can gather reconnaissance in ICS networks.
3: Learn about sophisticated hacking tools for targeted attacks on ICS networks.


Participants
David Atch

Participant

VP of Research, CyberX

Hackers & Threats

critical infrastructure cyber warfare & cyber weapons hackers & threats operational technology (OT Security) Internet of Things


Topic

Subtopic


Share With Your Community