Read Time:1 Minute, 0 Second

We started reaching out to them in 2016. We spoke at conferences about their issues starting in Prague 2017.

Even the Russians Took Notice

In fact, Trend Micro was in the audience (along with a Russian group). Trend Micro took advantage of our talk and started working to get some of this corrected (ICS Cert), unbeknownst to us. We posted decks and reports on and off for a few years. Now we see they are victims of ransomware. We covered this extensively in training classes especially with government, utility, and related industries, in the US, Middle East, Europe, Singapore, and Australia. DW was one of our prime case studies.

https://www.cisa.gov/uscert/ics/advisories-by-vendor?glossary=&page=12

From malware embedded in their hosted software to constant errors on the publications and software downloads website, DW Taiwan was destined to get hit. The amount of malware embedded in software destined for PLCs worldwide was enormous.

Needless to say, our warning intelligence went unheaded. Repeatedly. Now they are just another statistic being reported on by threat intel forms as if this was somehow, intelligence.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
%d bloggers like this: