Critical industrial infrastructure is a juicy target for cyberattackers seeking ransom, trade secrets or geopolitical intimidation. But many organizations assume they’re safe because their ICS/SCADA networks are air-gapped. This live hack will show how to exfiltrate reconnaissance data from air-gapped networks with AM radios and specially crafted code injected into programmable logic controllers.
Learning Objectives: 1: See how novel targeted attacks can bypass air-gap security for data exfiltration. 2: Learn how malicious ladder logic code can gather reconnaissance in ICS networks. 3: Learn about sophisticated hacking tools for targeted attacks on ICS networks.