Featured news
Ever since Stuxnet managed to disrupt the workings of the Natanz nuclear facility, the security of industrial control systems (ICS) has deservedly received a lot of attention. Many security researchers have begun analyzing the hardware and software employed in critical infrastructure installations, and have discovered a host of vulnerabilities.The latest of these is an undocumented backdoor that ioActive researcher Reid Wightman discovered in CoDeSys, a piece of software that manages equipment in power plants, military and industrial establishments, and other similarly crucial environments.
The software is ubiquitous, as it is embedded in programmable logic controllers (PLCs) produced and sold by 261 different manufacturers, and allows potential attackers to compromise systems that are connected to the Internet by simply issuing commands through the command shell, without the need to authenticate themselves to it.
Wightman has tested two PLCs so far - one running Microsoft Windows CE on ARM chips, and the other running Linux on Intel-compatible ones - and found them both vulnerable.
He then searched for these devices via the Shodan search engine for finding devices exposed online, and discovered 117 devices connected to the Internet - a figure he suspects would be much higher if he did more refined searches.
According to ars technica, CoDeSys' designers - 3S-Smart Software Solutions - have released an advisory advising users to set a password.
But, Wightman notes, that does nothing to protect access to the backdoor shell.
Wightman's former colleagues at Digital Bond have tested "a handful" of the 261 vendor products, and are currently compiling a list of affected (and not) devices. So far, only one of the vendor's products has passed the test, and that's because the vendor discovered the flaw and fixed it.
As much as the patching and continuous updating of these small but critical devices is difficult, a solution will have to be found - sooner rather than later.

Spotlight
Attackers can bypass Windows' protections by changing a single bit
Among the many vulnerabilities that Microsoft patched on Tuesday is one that can be exploited to bypass all Windows security measures by, curiously enough, modifying a single bit of the Windows operating system.
Google Play flaw opens Android devices to silent malware installation
Android users are in danger of getting malicious apps silently installed on their devices by attackers, warns Rapid7's Tod Beardsley, technical lead for the Metasploit Framework.
Microsoft fixes critical remotely exploitable Windows root-level design bug
The vulnerability could allow remote code execution if an attacker convinces a user with a domain-configured system to connect to an attacker-controlled network.
Which kind of security professional are you?
What does your inner voice say? Which kind of a professional are you? Are you arrogant, haughty and superior? Or humble, modest and respectful?
Corporate users hit with fake Microsoft email delivering sneaky malware
A legit-looking spam email campaign is currently targeting corporate users, ultimately leading the victims to difficult-to-detect malware that downloads additional malicious programs on the target's computer.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.

