Hackers now have the capability to exploit vulnerabilities in General Electric’s (GE) Historian software. Such vulnerabilities could potentially be utilized for industrial espionage, disruption, or other malicious activities. The GE Historian software is designed to maintain a record of data from industrial control systems (ICS) and analysis of these records. With this capability, hackers can gain access to data from automation systems and control mechanisms. The access can then be exploited in various ways, such as to disrupt service, conduct industrial espionage, or even compromise the ICS.
The vulnerability in the GE Historian software was discovered by cybersecurity experts at Positive Technologies. They researchers discovered that the GE Historian has certain algorithms that can be exploited by nefarious actors. If a hacker were to gain access to these algorithms, they could then craft malicious control messages to control any publicly accessible Historian server. By utilizing this vulnerability, the hacker can gain access to industrial secrets, disrupt the service, and even sabotage ICS.
The vulnerability in the GE Historian software is a serious problem for many industrial organizations since the software is essential for maintaining records of industrial processes. Oftentimes, the only way for organizations to detect and mitigate such vulnerabilities is through vigilance and effective cybersecurity measures. As such, it is important for organizations to have a comprehensive cybersecurity plan in place, which includes periodic checks for any potential vulnerabilities to the GE Historian software. Additionally, organizations should provide security trainings to their staff and regularly update the software to ensure that the latest security measures are in place.
In conclusion, hackers can now exploit the vulnerabilities of the General Electric Historian software for malicious activities, such as industrial espionage and disruption. Organizations should, therefore, take all the necessary measures to ensure that security systems are up to date, and that staff is regularly trained in cybersecurity to minimize the risk of exploitation.
This Cyber News was published on www.securityweek.com. Publication date: Sun, 22 Jan 2023 10:48:00 +0000