Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack

Posted on December 1, 2025December 1, 2025 By CWS

The cybersecurity company CISA has expanded its Recognized Exploited Vulnerabilities (KEV) catalog with an outdated ‘OpenPLC ScadaBR’ flaw that was lately leveraged by hackers to deface what they believed to be an industrial management system (ICS).

OpenPLC is an open supply programmable logic controller (PLC) designed to supply a low-cost industrial automation answer. ScadaBR is an open supply answer that gives human-machine interfaces (HMIs), supporting connections to numerous PLCs, together with OpenPLC. 

The ScadaBR vulnerability, tracked as CVE-2021-26829 and categorised as ‘medium severity’, was patched in June 2021. It has been described as a cross-site scripting (XSS) bug that may be exploited for arbitrary code execution.

CISA added CVE-2021-26829 to its KEV catalog on Friday and instructed authorities companies to handle it by December 19. 

Safety agency Forescout reported in October {that a} pro-Russia hacktivist group named TwoNet had attacked certainly one of its ICS/OT honeypots, which had been set as much as mimic a water remedy plant. 

The hackers defaced the related HMI, disrupted processes, and manipulated different ICS, later boasting concerning the ‘achievement’ on their Telegram channel. 

In keeping with Forescout, TwoNet exploited CVE-2021-26829 to alter the HMI login web page’s description to ‘Hacked by Barlati’, a message that will be displayed in a pop-up window each time the web page is visited by a person.

Because the HMI was faux, the assault didn’t have any real-world affect, however the incident confirmed that hackers could also be focusing on CVE-2021-26829 of their assaults. Commercial. Scroll to proceed studying.

A video printed again in 2021 reveals how straightforward it will be for an attacker to use CVE-2021-26829 to show an arbitrary message every time an HMI web page is visited, by including HTML/JavaScript code to a particular subject on the ‘System settings’ web page.

The identical video additionally confirmed how the XSS vulnerability may be exploited for session hijacking, however TwoNet solely leveraged it for a easy defacement, which signifies that the hackers don’t possess superior hacking abilities.

This isn’t stunning. Hacktivists — and state-sponsored risk teams working below the guise of hacktivism — typically goal ICS/OT within the water sector. Assaults on OT are sometimes most well-liked by hacktivists as a result of the potential affect may be important, and so they can obtain their aim by leveraging easy-to-exploit vulnerabilities corresponding to default or hardcoded credentials.

There don’t seem like another experiences describing in-the-wild exploitation of CVE-2021-26829. It’s unclear if the vulnerability has been exploited by different risk actors. 

Nonetheless, subtle risk actors, working outdoors of the noisy hacktivist sphere, would doubtless exploit such vulnerabilities in extremely focused assaults which might be both by no means found or stay confidential between the sufferer and incident response companies.

Associated: Over 370 Organizations Take Half in GridEx VIII Grid Safety Train

Associated: ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider

Associated: Japan Points OT Safety Steering for Semiconductor Factories

Security Week News Tags:Attack, CISA, Hacktivist, ICS, ScadaBR, Vulnerability, Warns

Post navigation

Previous Post: Kevin Lancaster Joins the usecure Board to Accelerate North American Channel Growth
Next Post: APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities

Related Posts

Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited Security Week News
Major US Telecom Backbone Firm Hacked by Nation-State Actors Security Week News
New ClickFix Malware Variant ‘LightPerlGirl’ Targets Users in Stealthy Hack Security Week News
Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names Security Week News
Trustifi Raises $25 Million for AI-Powered Email Security Security Week News
Microsoft to Lay Off About 3% of Its Workforce Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark