您絕對不能錯過的更新:Office 2016 與 Office 2019 支援終止

立即閱讀
我們利用人工智慧進行網站翻譯,雖然我們力求準確性,但它們可能並不總是 100% 精確。感謝您的理解。

Change Default Credentials Now: Hard Lessons from the CERT Polska Energy Sector Report

by OPSWAT 發布
分享此文章

The CERT Polska 2025 Energy Sector Incident Report is a reminder that many cyber incidents don’t start with advanced techniques or unknown exploits. Instead, they start with basic weaknesses that were never fixed. Default credentials. Unmonitored access. Logs that attackers can erase. Backups that don’t include the systems that actually matter.

In several of the incidents described, attackers didn’t need to work hard. The environment was already helping them.

How the Attacks Took Shape

The report outlines multiple incidents where attackers entered through familiar paths. Phishing emails, malicious attachments, compromised websites, and exposed services were all common starting points. Once a single endpoint was compromised, attackers focused on moving quietly, using legitimate tools and standard protocols.

Devices inside internal networks were often assumed to be safe. This assumption turned out to be wrong. Network equipment, management interfaces, and operational systems were sometimes deployed with default or shared credentials. In a few cases, attackers didn’t need exploits at all and simply logged in.

Remote access also played a role. VPN connections were not always reviewed closely, and authentication controls varied across environments. Once connected, attackers used RDP sessions and SMB file sharing to move laterally, blending into normal traffic and avoiding immediate detection.

Why Default Credentials Are Still One of the Biggest Risks

Default credentials remain one of the most avoidable risks, yet they continue to appear in real incidents. The report makes it clear that this isn’t just about internet-facing devices. Internal systems, including OT components and management servers, were left with unchanged credentials or broad admin access.

Attackers look for these gaps first. When they find them, they gain control quickly and quietly.

Changing default credentials, limiting shared accounts, and enforcing accountability for privileged access are not advanced measures, but rather fundamentals. When they are missing, everything else becomes harder.

Why Default Credentials Are Still One of the Biggest Risks

Default credentials remain one of the most avoidable risks, yet they continue to appear in real incidents. The report makes it clear that this isn’t just about internet-facing devices. Internal systems, including OT components and management servers, were left with unchanged credentials or broad admin access.

Attackers look for these gaps first. When they find them, they gain control quickly and quietly.

Changing default credentials, limiting shared accounts, and enforcing accountability for privileged access are not advanced measures, but rather fundamentals. When they are missing, everything else becomes harder.

Detection After Execution Is Too Late

It’s worth noting that in some cases, endpoint security tools did detect malicious activity. This helped limit damage. However, the detection often happened after malware was already running.

Once malware executes, attackers can steal credentials, modify configurations, and establish persistence. At that point, response becomes more complex and more disruptive.

The report highlights the importance of inspecting files before they run. Email attachments, downloads, and files introduced through removable media should be scanned and sanitized before they ever reach operational systems. Stopping threats at the entry point reduces the need for cleanup later.

Monitor What Attackers Actually Use

Several incidents described in the report involved lateral movement rather than flashy exploits: things like RDP sessions between systems, SMB shares used to move tools, and small configuration changes that opened doors over time.

Monitoring internal communication is critical. East-west traffic often gets less attention than internet-facing activity, yet it’s where attackers spend most of their time once inside.

Configuration changes deserve the same focus. Firewall rules, VPN settings, and Active Directory permissions should not change silently. Organizations need clear visibility into what changed, who made the change, and why. Unexpected changes are often the earliest sign of compromise.

Logs and Backups: The Parts Attackers Try to Break

The report also shows how attackers target logging and recovery processes. In some incidents, logs were deleted or altered, slowing investigations and limiting understanding of what happened.

Audit logs should be forwarded to a secure location where attackers cannot modify or erase them. Ideally, logs move in one direction only. If attackers can delete logs, they can hide their tracks.

Backups need the same level of care. Many organizations will back up configurations but overlook firmware, full system images, and endpoint states. When firmware or system binaries are compromised, configuration backups alone are not enough. Clean firmware, server backups, and trusted endpoint images are essential for recovery.

The Real Takeaway

The CERT Polska report doesn’t describe failures caused by a lack of tools. It describes failures caused by neglected basics such as:

  • Default credentials left in place.
  • Remote access not fully monitored.
  • Logs stored where attackers could reach them.
  • Malware detected only after it was active.

It’s fortunate that some attacks were detected before causing major disruption. But luck is not a control.

Energy organizations must reduce risk earlier in the attack chain — before malware runs, before credentials are abused, and before attackers can cover their tracks. The report makes one thing clear: attackers are using predictable paths. And that means defenders can close them.

These fixes aren’t exotic, but they are urgent.

Don’t wait for malware to execute before responding. Learn how OPSWAT MetaDefender prevents threats at the entry point by scanning and sanitizing files before they reach your critical systems.

標籤:

隨時瞭解OPSWAT 的最新資訊!

立即註冊,即可收到公司的最新消息、 故事、活動資訊等。