Russia-linked hackers cut heat to 600 Ukrainian apartment buildings in the dead of winter, researchers say
Briefly

Cybersecurity company Dragos identified FrostyGoop as the ninth known malware targeting industrial controllers, specifically focusing on the widely used Modbus protocol.
The attackers exploited a vulnerability in a Mikrotik router to gain access to Lviv's industrial network, subsequently installing a remote access tool over an open internet port.
The malicious code manipulated controller measurements rather than shutting down systems directly, displaying a sophisticated approach to avoid immediate detection.
Dragos maintains a neutral stance in cyberattacks, emphasizing education over assigning blame, although highlighting the techniques used by adversaries in compromising industrial control systems.
Read at Engadget
[
|
]