The report shows that 1 in 5 of all threats was designed specifically to leverage USB removable media as an attack vector,and more than half the threats were designed to open backdoors,establish persistent remote access or download additional malicious payloads.These findings are indicative of more coordinated attacks,likely attempting to target air-gapped systems used in most industrial control environments and critical infrastructure.
该报告显示,五分之一的威胁是专门设计为利用USB作为攻击媒介,而超过一半的威胁则设计为打开后门、建立持久的远程访问或下载其他恶意负载。这些发现表明存在更多的协同攻击,可能试图针对大多数工业控制环境和关键基础设施中使用的气隙系统。
MITSUBISHI BOARD BN624A220H01 FX52A FX52
MITSUBISHI BOARD FX53A FX53 BN624A240H04
MITSUBISHI TR-15A-BN624B055D USPP TR15ABN624B055D
Mazak Mitsubishi Board FX63A BN624A241H02 FX63
Mitsubishi FX62B Circuit Board BN624A263H03 BN624A263HO
Mitsubishi Mazak Memory Module. BN624A992G51, MC415B, W
Mitsubishi Mazak Circuit Board Card FX27B BN624A246H02