38,680 Abibisika (Black Gold) Points
https://www.securityweek.com/35000-solar-power-systems-exposed-to-internet/
Niara, Yaw Pereko and Nnemkadi1 Comment17,004 Abibisika (Black Gold) Points
I am not surprised.
Why unchanged default password exposed industrial devices?
Unchanged default passwords on industrial devices pose a significant security risk for several key reasons:
Ease for Hackers:
Default passwords are often publicly known or easily guessed (e.g., “admin”, “password”, “1234”), making it simple for hackers to gain unauthorized access to industrial control systems (ICS) and operational technology (OT) devices like PLCs and SCADA systems.
Streamlined Attack Process:
Hackers are familiar with default settings, providing a comfortable zone for them to operate and exploit vulnerabilities.
Backdoor for Threat Actors:
Once discovered, these default credentials act as a backdoor to breach vulnerable devices exposed online, allowing attackers to circumvent authentication measures.
Compromised Network Security:
The failure to change these default settings creates a security weakness that attackers can exploit to potentially compromise the security of the organization’s entire network.
Potential for Significant Damage:
Gaining access to critical OT devices like PLCs can lead to disruptive operations, manipulation of data, and even physical harm to infrastructure.
Manufacturer Responsibility:
Cybersecurity agencies like CISA emphasize that technology manufacturers should prioritize eliminating the risk of default password exploitation and build secure devices by design, rather than relying solely on customers to change passwords.
In summary, using default passwords on industrial devices exposes systems to exploitation by providing readily available access points for malicious actors. CISA recommends that manufacturers design products to force password changes on initial setup to mitigate this risk.