The US CISA and the Department of Energy issued guidance on mitigating attacks against uninterruptible power supply (UPS) devices.
The US Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Energy published joint guidance on mitigating cyber attacks against uninterruptible power supply (UPS) devices.
The US agencies warn of threat actors gaining access to a variety of internet-connected uninterruptible power supply (UPS) devices by exploiting default credentials.
UPS devices provide clean and emergency power in a variety of applications when normal input power sources are interrupted for various reasons.
The guidance recommends organizations immediately enumerate all UPSs and similar systems and ensure they are not accessible from the internet. In the case where a UPS device must be accessible online, organizations are recommended to implement the following controls:
- Ensure the devices are accessible through a virtual private network.
- Enforce multifactor authentication.
- Use strong passwords or passphrases in accordance with National Institute of Standards and Technology guidelines (for a humorous explanation of password strength, see XKCD 936)
CISA recommends checking if organizations’ UPS credentials are still set to the factory default.
Additional info, including incident response best practices, are included in the “Mitigating Attacks Against Uninterruptible Power Supply Devices” guidance.
Follow me on Twitter: @securityaffairs and Facebook
(SecurityAffairs – hacking, BazarLoader)
The post CISA and DoE warns of attacks targeting UPS devices appeared first on Security Affairs.
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.