Cisco Blogs


Cisco Blog > Energy - Oil & Gas and Utilities

Join us at Distributech 2016!

DistribuTECH 2016

We’ll be at DistribuTECH for the seventh year in a row on February 9-11 at the Orlando Convention Center. Meet us in Booth #2047 to learn how we are working with our partners to help utility companies worldwide lower costs and deliver more services on a single, intelligent, and secure platform.

Visit our booth to demo our expanded portfolio:

We'll be ready for you in Florida

A preview of our booth demo

Industrial Cybersecurity: Detect and prevent both internal and external attacks on process control systems, and remediate cybersecurity incidents.

Collaborative Solutions: Reduce the impact of natural disasters on the grid with incident response and workforce enablement solutions. Help first responders collaborate by unifying command and control communications.

Substation Gridblock: Securely manage millions of endpoints over multi-vendor, multi-technology, and multi-service utility communication networks.

Field Area Networks: Address advanced metering infrastructure, distribution automation, and remote workforce management over a single multi-service IP network platform.

Cisco IOx: Develop your own smart applications to capitalize on the power of fog computing. We are enabling developers to create IoT applications such as data aggregation, control systems, and access control – and have them run on edge network devices. Our industry-leading networking operating system Cisco IOS makes this possible together with Linux, the leading open source platform.

In addition to our demos, Read More »

Tags: , , , , , , , ,

Evolution of attacks on Cisco IOS devices

While “SYNful Knock” is the latest identified malware targeting Cisco devices running Cisco IOS, we have identified and investigated six other malware incidents during the last four years that target Cisco devices running Cisco IOS. The nature of threats is evolving and Cisco will continue to adapt technology delivering trustworthy solutions that our customers can rely on. This also means that customers will need to evolve, fully utilizing the security tools that are available, as well as ensuring security best practices are in place.

The malware used in these evolved Cisco IOS attacks show increasing levels of complexity in the type of modifications made to Cisco IOS, the behavior of its Command and Control (C&C) network (when present), and the platforms they target.

Before talking about specifics of each investigated malware incident, it is important to note that in all cases, no evidence has been found that attackers exploited a previously known or unknown vulnerability to install the malware. All available data points suggest either the use of compromised administrator credentials or physical access to the devices or images.

The following table and associated description provides a brief overview of the malware samples, as well as an overview of the actions that Cisco took in response to those findings. The source of this information is internal analysis performed by Cisco forensics teams.

cisco-ios-attacks

Read More »

Tags: ,

Debuting the Autonomic Train at Cisco Live

SONY DSC Today at Cisco Live we started to show a train model that we use as a testing/validation vehicle for applicable train technologies.

At Cisco Live, the train includes our Cisco IE2000 industrial switches (IP67 and non IP67 versions), Cisco-819 M2M router, our target application hosting server-PC with VSMS and an even smaller application hosting server – a Raspberry PI.

Every car also hosts our ruggedized Cisco-IPVSC-6050 cameras and a demo version of a passenger information system (PIS) with both outside-train LCD and top-of-seat LCD panels. This is built on a Arduino/Linux prototype platform. Cameras and PIS-devices are PoE powered from our switches. Read More »

Tags: , , , , , ,

T-7: The Bundle Countdown Begins…

It’s that time of year again—the Cisco IOS Software Security Advisory Bundled Publication will go live in seven days. As a reminder, the Cisco Product Security Incident Response Team (PSIRT) releases bundles of Cisco IOS Software Security Advisories on the fourth Wednesday of March and September each calendar year. As is the case with the vast majority of our advisories, vulnerabilities scheduled for disclosure in these upcoming Security Advisories will normally have a Common Vulnerability Scoring System (CVSS) Base Score from 7.0 to 10.0.

To ensure you’re prepared for the upcoming publication, consider:

  • Creating a text file of all the Cisco IOS Software releases in your network
  • Assembling a simple list of Cisco IOS Software technologies and features you use
  • Noting your Cisco.com username and password
  • Locating the username and password for your Cisco IOS routers and switches
  • Ensuring network operation partners are prepared for the security advisory release
  • Reviewing the benefits of OVAL and CVRF content

Read More »

Tags: , , , ,

Cisco’s onePK Part 2: Reaching out to a Network Element

Exordium

In the previous installment of the onePK series, you received a crash course on Cisco’s onePK. In this article, you’ll take the next step with a fun little exposé on onePK’s C API. You will learn how to write a simple program to reach out and connect to a network element. This is staple onePK functionality and is the foundation upon which most onePK applications are built.

Preambling Details

The following short program “ophw” (onePK Hello World), is a fully functional onePK application that will connect to a network element, query its system description, and then disconnect. It doesn’t do anything beyond that, but it does highlight some lynchpin onePK code: network element connection and session handle instantiation. This is the foundational stuff every onePK application needs before useful work can get done. Read More »

Tags: , , , , , , , , , , ,