Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack

Posted on December 1, 2025December 1, 2025 By CWS

The cybersecurity company CISA has expanded its Recognized Exploited Vulnerabilities (KEV) catalog with an outdated ‘OpenPLC ScadaBR’ flaw that was lately leveraged by hackers to deface what they believed to be an industrial management system (ICS).

OpenPLC is an open supply programmable logic controller (PLC) designed to supply a low-cost industrial automation answer. ScadaBR is an open supply answer that gives human-machine interfaces (HMIs), supporting connections to numerous PLCs, together with OpenPLC. 

The ScadaBR vulnerability, tracked as CVE-2021-26829 and categorised as ‘medium severity’, was patched in June 2021. It has been described as a cross-site scripting (XSS) bug that may be exploited for arbitrary code execution.

CISA added CVE-2021-26829 to its KEV catalog on Friday and instructed authorities companies to handle it by December 19. 

Safety agency Forescout reported in October {that a} pro-Russia hacktivist group named TwoNet had attacked certainly one of its ICS/OT honeypots, which had been set as much as mimic a water remedy plant. 

The hackers defaced the related HMI, disrupted processes, and manipulated different ICS, later boasting concerning the ‘achievement’ on their Telegram channel. 

In keeping with Forescout, TwoNet exploited CVE-2021-26829 to alter the HMI login web page’s description to ‘Hacked by Barlati’, a message that will be displayed in a pop-up window each time the web page is visited by a person.

Because the HMI was faux, the assault didn’t have any real-world affect, however the incident confirmed that hackers could also be focusing on CVE-2021-26829 of their assaults. Commercial. Scroll to proceed studying.

A video printed again in 2021 reveals how straightforward it will be for an attacker to use CVE-2021-26829 to show an arbitrary message every time an HMI web page is visited, by including HTML/JavaScript code to a particular subject on the ‘System settings’ web page.

The identical video additionally confirmed how the XSS vulnerability may be exploited for session hijacking, however TwoNet solely leveraged it for a easy defacement, which signifies that the hackers don’t possess superior hacking abilities.

This isn’t stunning. Hacktivists — and state-sponsored risk teams working below the guise of hacktivism — typically goal ICS/OT within the water sector. Assaults on OT are sometimes most well-liked by hacktivists as a result of the potential affect may be important, and so they can obtain their aim by leveraging easy-to-exploit vulnerabilities corresponding to default or hardcoded credentials.

There don’t seem like another experiences describing in-the-wild exploitation of CVE-2021-26829. It’s unclear if the vulnerability has been exploited by different risk actors. 

Nonetheless, subtle risk actors, working outdoors of the noisy hacktivist sphere, would doubtless exploit such vulnerabilities in extremely focused assaults which might be both by no means found or stay confidential between the sufferer and incident response companies.

Associated: Over 370 Organizations Take Half in GridEx VIII Grid Safety Train

Associated: ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider

Associated: Japan Points OT Safety Steering for Semiconductor Factories

Security Week News Tags:Attack, CISA, Hacktivist, ICS, ScadaBR, Vulnerability, Warns

Post navigation

Previous Post: Kevin Lancaster Joins the usecure Board to Accelerate North American Channel Growth
Next Post: APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities

Related Posts

Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday Security Week News
Cisco Routers Hacked for Rootkit Deployment Security Week News
Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm Security Week News
Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks Security Week News
Beyond the Black Box: Building Trust and Governance in the Age of AI Security Week News
CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark