Kaspersky to 1337 haxors: take down our power grid. We dare you

Capture the flag romp will offer chance to do the thing governments everywhere fear


Kaspersky Lab is launching a capture-the-flag event at which hackers will have the chance to pop a simulated power station.

The hacking events are popular with security types who compete to break into specially set-up systems to obtain flags and score points for feats of exploits, cracking, and pivoting.

Kaspersky Lab will set up a power plant complete with simulated critical systems.

"During the competition the teams will perform a number of specific tasks including breaking into IT systems, understand schematics, gain control of a control system, and finally to turn off or disable the various microgrid components," Kaspersky senior developer Kirill Kruglov says in a Russian canned statement.

"We create replicas of systems and equipment used in modern enterprises, and therefore everything that happens ... we can project onto real infrastructure.

"Detection of critical vulnerabilities in industrial systems helps cybersecurity experts to better understand their systems' features and consequently helps to improve attitudes and protection technologies."

Teams of up to five are invited to apply to participate in the second annual Industrial CTF Tournament next month in the fledgling Russian tech city of Innopolis. It will cover some form of travel and accommodation costs and offer high-tech gadgets to winners.

The event is run during Kaspersky's fourth annual APCS conference. ®

Similar topics


Other stories you might like

  • CISA and friends raise alarm on critical flaws in industrial equipment, infrastructure
    Nearly 60 holes found affecting 'more than 30,000' machines worldwide

    Updated Fifty-six vulnerabilities – some deemed critical – have been found in industrial operational technology (OT) systems from ten global manufacturers including Honeywell, Ericsson, Motorola, and Siemens, putting more than 30,000 devices worldwide at risk, according to private security researchers. 

    Some of these vulnerabilities received CVSS severity scores as high as 9.8 out of 10. That is particularly bad, considering these devices are used in critical infrastructure across the oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining and building and automation industries. 

    The most serious security flaws include remote code execution (RCE) and firmware vulnerabilities. If exploited, these holes could potentially allow miscreants to shut down electrical and water systems, disrupt the food supply, change the ratio of ingredients to result in toxic mixtures, and … OK, you get the idea.

    Continue reading
  • 1Password's Insights tool to help admins monitor users' security practices
    Find the clown who chose 'password' as a password and make things right

    1Password, the Toronto-based maker of the identically named password manager, is adding a security analysis and advice tool called Insights from 1Password to its business-oriented product.

    Available to 1Password Business customers, Insights takes the form of a menu addition to the right-hand column of the application window. Clicking on the "Insights" option presents a dashboard for checking on data breaches, password health, and team usage of 1Password throughout an organization.

    "We designed Insights from 1Password to give IT and security admins broader visibility into potential security risks so businesses improve their understanding of the threats posed by employee behavior, and have clear steps to mitigate those issues," said Jeff Shiner, CEO of 1Password, in a statement.

    Continue reading
  • Inside the RSAC expo: Buzzword bingo and the bear in the room
    We mingle with the vendors so you don't have to

    RSA Conference Your humble vulture never liked conference expos – even before finding myself on the show floor during a global pandemic. Expo halls are a necessary evil that are predominatly visited to find gifts to bring home to the kids. 

    Do organizations really choose security vendors based on a booth? The whole expo hall idea seems like an outdated business model – for the vendors, anyway. Although the same argument could be made for conferences in general.

    For the most part, all of the executives and security researchers set up shop offsite – either in swanky hotels and shared office space (for the big-wigs) or at charming outdoor chess tables in Yerba Buena Gardens. Many of them said they avoided the expo altogether.

    Continue reading

Biting the hand that feeds IT © 1998–2022