Critical industrial infrastructure is a juicy target for cyberattackers seeking ransom, trade secrets or geopolitical intimidation. But many organizations assume they’re safe because their ICS/SCADA networks are air-gapped. This live hack will show how to exfiltrate reconnaissance data from air-gapped networks with AM radios and specially crafted code injected into programmable logic controllers.
1: See how novel targeted attacks can bypass air-gap security for data exfiltration.
2: Learn how malicious ladder logic code can gather reconnaissance in ICS networks.
3: Learn about sophisticated hacking tools for targeted attacks on ICS networks.
Hackers & Threats
critical infrastructure cyber warfare & cyber weapons hackers & threats operational technology (OT Security) Internet of Things
Share With Your Community