{"id":32290,"date":"2019-12-13T10:51:07","date_gmt":"2019-12-13T10:51:07","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/"},"modified":"2019-12-13T10:51:07","modified_gmt":"2019-12-13T10:51:07","slug":"ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/","title":{"rendered":"Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/07\/12\/homer_simpson.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Siemens industrial control systems designed specifically for energy plant gear are riddled with dozens of security vulnerabilities that are, luckily enough, tricky to exploit from the outside.<\/p>\n<p>The teams at Positive Technologies, Kaspersky Lab, and Biznet Bilisim took credit for finding and reporting 54 CVE-listed flaws <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-451445.pdf\">in the SPPA-T3000<\/a> (PDF), an application server that handles the management of power plant controllers.<\/p>\n<p>According to Siemens this week, the control system is &#8220;mostly used in fossil and large scale renewable power plants.&#8221; The vulnerable components are usually protected by a firewall, meaning a hacker would most likely have to be positioned appropriately on the local network to exploit the bugs. Crucially, the miscreant would need access to a so-called highway component behind the firewall before they could attack the app server.<\/p>\n<p>&#8220;Exploitation of the vulnerabilities described in this advisory requires access to either Application- or Automation Highway,&#8221; Siemens explained. &#8220;Both highways should not be exposed if the environment has been set up according to the recommended system configuration in the Siemens SPPA-T3000 security manual.&#8221;<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/07\/24\/russia_us_energy_grid_hackers\/\" rel=\"noopener noreferrer\">As we have seen<\/a>, getting onto these internal networks is something hackers have been able to do, though.<\/p>\n<p>Among the more serious flaws is CVE-2019-18283 and CVE-2019-18284, flaws that do not require any authentication to exploit. &#8220;The AdminService is available without authentication on the Application Server,&#8221; Siemens said of these flaws. &#8220;An attacker can gain remote code execution by sending specifically crafted objects to one of its functions.&#8221;<\/p>\n<p>Other bugs include CVE-2018-4832 and CVE-2019-18289, two denial of service vulnerabilities (not something you want happening to a power plant control console), and CVE-2019-18288, a code execution bug involving the insecure handling of file uploads.<\/p>\n<p>&#8220;By exploiting some of these vulnerabilities, an attacker could run arbitrary code on an application server, which is one of the key components of the SPPA-T3000 distributed control system,&#8221; said Vladimir Nazarov, head of the Positive Technologies ICS unit that discovered and reported 17 of the flaws.<\/p>\n<p>&#8220;Attackers can thereby take control of operations and disrupt them. This could stop electrical generation and cause malfunctions at power plants where vulnerable systems are installed.&#8221;<\/p>\n<p>So far, Siemens says it has only been able to patch three of the bugs. Siemens recommends administrators lock down the server from any sort of external network access. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1858\/-7813\/how-to-get-more-from-microstrategy-by-optimising-your-data-stack?td=wptl1858\">How to get more from MicroStrategy by optimising your data stack<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2019\/12\/13\/siemens_security_advisory\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Arbitrary code execution in a controller, what could go wrong? Siemens industrial control systems designed specifically for energy plant gear are riddled with dozens of security vulnerabilities that are, luckily enough, tricky to exploit from the outside.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32291,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-32290","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-13T10:51:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"474\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things\",\"datePublished\":\"2019-12-13T10:51:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\\\/\"},\"wordCount\":412,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\\\/\",\"name\":\"Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things.jpg\",\"datePublished\":\"2019-12-13T10:51:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things.jpg\",\"width\":648,\"height\":474},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/","og_locale":"en_US","og_type":"article","og_title":"Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-12-13T10:51:07+00:00","og_image":[{"width":648,"height":474,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things","datePublished":"2019-12-13T10:51:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/"},"wordCount":412,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/","url":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/","name":"Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things.jpg","datePublished":"2019-12-13T10:51:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things.jpg","width":648,"height":474},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ever-wonder-how-hackers-could-possibly-pwn-power-plants-here-are-54-siemens-bugs-that-could-explain-things\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32290"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32290\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32291"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}