🌙
Skip to main content

CRITICAL INFRASTRUCTURE TARGETED: US-China Cyber Conflict Jumps to a New, Terrifying Level

  CRITICAL INFRASTRUCTURE TARGETED: US-China Cyber Conflict Jumps to a New, Terrifying Level Published: October 19, 2025 • CyberDudeBivash ThreatWire • cyberdudebivash.com • cyberbivash.blogspot.com • cyberdudebivash-news.blogspot.com • cryptobivash.code.blog 🔔 Subscribe on LinkedIn The power grid . The financial backbone. The antithesis of downtime. All now squarely in the crosshairs of US-China cyber escalation . Why trust CyberDudeBivash ? We analyse state-level cyber conflict for US/EU/UK/AU/IN orgs and translate geopolitical TTPs into actionable playbooks for enterprise SOC , DFIR & board-level briefing. TL;DR Escalation sign: China accuses the U.S. of cyber-attacks on its critical time-infrastructure (NTSC Xi’an), marking a shift from economic espionage to operational warfare . Why it matter...

EMERGENCY PATCH NOW: Double CVSS 10.0 Flaws in Red Lion RTUs Grant Full Industrial Control.

 

CYBERDUDEBIVASH

Disclosure: We may earn a commission if you purchase through links in this post. This supports CyberDudeBivash investigative reporting. Learn more.

EMERGENCY PATCH NOW: Double CVSS 10.0 Flaws in Red Lion RTUs Grant Full Industrial Control

Two independently exploitable, CVSS 10.0 (Critical) vulnerabilities in industrial cellular RTUs widely deployed by utilities and manufacturers could allow a remote attacker to obtain full control of field devices, modify ladder logic and open/close actuators without authentication. If you operate plants or remote assets across the US, EU, UK, Australia, or India, treat this as a Code Red incident for both CISO and OT/Plant Operations.

Why trust CyberDudeBivash?

  • Executive-first risk translation from exploit notes to business continuity, SLA, and revenue impact.
  • Guidance aligned to CISA ICS Advisories, NIST CSF, IEC 62443, NIS2, NCSC (UK), ACSC (AU), and CERT-In (India).
  • Hands-on OT segmentation, firewall policies, and monitoring playbooks that work in brownfield plants.

What’s at Risk — In One Minute

  • Devices: Industrial RTUs used for water/wastewater (SCADA), power distribution, oil & gas, manufacturing, transport.
  • Impact: Unauthenticated remote code execution + configuration takeover → change setpoints, shutdowns, false telemetry, safety bypass.
  • Blast Radius: From a single RTU pivot to PLC/IED/SCADA servers over Modbus/TCP, DNP3, OPC UA.
  • Business Outcome: Production stoppage, environmental release, regulator fines, and brand damage.

Am I Exposed?

  • RTUs reachable over the Internet (cellular, public IPs, DDNS) or via flat L3 networks between IT and OT.
  • Default or reused credentials, web admin exposed, outdated firmware, or disabled role-based access.
  • Direct connectivity from RTUs to SCADA/Historian without firewalls/ACLs or DPI.

Executive Actions (0–24 Hours)

  • Locate RTUs fast: Export an asset inventory (make/model/firmware/IP/APN). Tag anything with public exposure.
  • Cut exposure: Disable WAN admin; whitelist source IPs; force access via VPN/ZTNA with device posture.
  • Patch in rings: Stage firmware to pilot sites, then critical sites, then fleet. Confirm config & program backups first.
  • Credentials: Rotate all RTU admin/API creds; enforce unique per site; disable shared accounts.
  • Monitoring: Turn on ICS DPI for Modbus/DNP3 anomalies; alert on write function codes and config pushes.

Network Controls (OT Zero Trust)

  • Segment: RTUs in a dedicated OT VLAN behind stateful firewalls; block east-west except approved SCADA IPs/ports.
  • DPI Policies: Allow only necessary function codes (e.g., Modbus 3/4 reads). Block 5/6/15/16 writes from non-SCADA IPs.
  • One-way where possible: Use data diodes or replication to historians; no inbound from IT to RTUs.
  • mTLS/Bastions: Admin access only through jump hosts with MFA and session recording.

Recommended Firmware / Configuration Checklist

  1. Apply latest vendor firmware addressing the auth bypass / RCE pair (check release notes).
  2. Disable legacy web UI and cleartext services (HTTP/Telnet). Enforce HTTPS/SSH with strong ciphers.
  3. Turn off remote management on WAN unless absolutely required; prefer out-of-band with ACLs.
  4. Enforce RBAC, rotate certificates/keys, and enable config integrity checks.
  5. Backup configuration & ladder logic before and after upgrade; store offline.

Detection Content 

Suricata — Block Unauthorized Modbus Write Functions

alert tcp $EXTERNAL_NET any -> $HOME_NET 502 (flow:to_server,established; app-layer-protocol:modbus;
 modbus.func_code 5|06|0f|10; msg:"ICS Modbus write from non-SCADA source"; 
 threshold:type limit, track by_src, count 5, seconds 60; classtype:attempted-admin; sid:990001; rev:1;)

Zeek — Flag Web Admin from Non-Approved Sources

# Add approved admin subnets to allowlist
# Detect HTTP(S) to RTU mgmt from others

SIEM Queries (Generic)

index=ics OR index=network
| stats count by src_ip, dest_ip, dest_port, app
| search dest_port IN (80,443,22,502,20000) app IN ("http","ssl","ssh","modbus")
| lookup scada_assets ip AS dest_ip OUTPUT device_role
| where device_role="RTU" AND NOT cidrmatch("ALLOWLIST_SUBNETS", src_ip)

Plant Ops — Safe Rollout Plan

  • Change window: Coordinate with production; ensure local manual control available.
  • Fail-safe: Confirm safe states for valves/pumps if comms drop during upgrade.
  • Rollback: Keep previous firmware on removable media; verify boot and comms.
  • Validation: After patch, verify setpoints, alarms, historian tags, and remote command rejection.

Compliance & Reporting

  • NIST CSF 2.0: PR.AA-05 access control, PR.MA-01 maintenance, DE.AE-03 anomalies, RS.MI-01 mitigation.
  • IEC 62443: SR 1/2/3 for identification/auth/authz; patch & vulnerability management.
  • NIS2 / EU: Timely risk treatment for essential entities, supply-chain oversight.
  • US (CISA): Report significant incidents; review ICS advisories and KEV list.
  • UK (NCSC) / AU (ACSC) / IN (CERT-In): Follow sector guidance; maintain logs for required retention.

Stay Ahead of OT Zero-Days

 Subscribe to our LinkedIn newsletter ThreatWire for executive-ready, plant-safe patch briefs: CyberDudeBivash — ThreatWire .

 Need a same-day OT runbook? Talk to our response team.

 Vendors: sponsor deep-dives read by US/EU/UK/AU/IN industrial buyers. Advertise.

Editor’s Picks — OT Incident Response Stack


ICS Security · OT Incident Response · Vulnerability Alert · CISO Briefing

Get executive-ready briefs and runbooks, fast: Subscribe to CyberDudeBivash ThreatWire .

#CyberDudeBivash #ICS #OT #SCADA #RTU #RedLion #ZeroDay #CVSS10 #PatchNow #CISO #PlantOperations #Manufacturing #Utilities #Water #Energy #OilAndGas #DNP3 #Modbus #OPCUA #US #EU #UK #Australia #India #CriticalInfrastructure #IndustrialCybersecurity

Comments

Popular posts from this blog

Fal.Con 2025: Kubernetes Security Summit—Guarding the Cloud Frontier

  Introduction Cloud-native architectures are now the backbone of global services, and Kubernetes stands as the orchestration king. But with great power comes great risk—misconfigurations, container escapes, pod security, supply chain attacks. Fal.Con 2025 , happening this week, aims to bring together experts, security practitioners, developers, policy makers, and cloud providers around Kubernetes security, cloud protection, and threat intelligence . As always, this under CyberDudeBivash authority is your 10,000+ word roadmap: from what's being addressed at Fal.Con, the biggest challenges, tools, global benchmarks, and defense guidelines to stay ahead of attackers in the Kubernetes era.  What is Fal.Con? An annual summit focused on cloud-native and Kubernetes security , bringing together practitioners and vendors. Known for deep technical talks (runtime security, network policy, supply chain), hands-on workshops, and threat intel sharing. This year’s themes inc...

CVE-2025-5086 (Dassault DELMIA Apriso Deserialization Flaw) — Targeted by Ransomware Operators

  Executive Summary CyberDudeBivash Threat Intel is monitoring CVE-2025-5086 , a critical deserialization of untrusted data vulnerability in Dassault Systèmes DELMIA Apriso (2020–2025). Rated CVSS 9.0 (Critical) , this flaw allows remote code execution (RCE) under certain conditions.  The vulnerability is already included in CISA’s Known Exploited Vulnerabilities (KEV) Catalog , with reports of ransomware affiliates exploiting it to deploy payloads in industrial control and manufacturing environments. Background: Why DELMIA Apriso Matters Dassault DELMIA Apriso is a manufacturing operations management (MOM) platform used globally in: Industrial control systems (ICS) Smart factories & supply chains Manufacturing Execution Systems (MES) Because of its position in production and logistics workflows , compromise of Apriso can lead to: Disruption of production lines Data exfiltration of intellectual property (IP) Ransomware-enforced downtime V...

Gentlemen Ransomware: SMB Phishing, Advanced Evasion, and Global Impact — CyberDudeBivash Threat Analysis

  Executive Summary The Gentlemen Ransomware group has quickly evolved into one of the most dangerous cybercrime collectives in 2025. First spotted in August 2025 , the group has targeted victims across 17+ countries with a strong focus on SMBs (small- and medium-sized businesses) . Their attack chain starts with phishing lures and ends with full-scale ransomware deployment that cripples organizations. CyberDudeBivash assesses that Gentlemen Ransomware’s tactics—including the abuse of signed drivers, PsExec-based lateral movement, and domain admin escalation —make it a critical threat for SMBs that often lack robust cyber defenses. Attack Lifecycle 1. Initial Access via Phishing Crafted phishing emails impersonating vendors, payroll systems, and invoice alerts. Credential harvesting via fake Microsoft 365 login pages . Exploitation of exposed services with weak authentication. 2. Reconnaissance & Scanning Use of Advanced IP Scanner to map networks. ...
Powered by CyberDudeBivash