BROOKINGS, S.D., June 12, 2014 (GLOBE NEWSWIRE) -- Recently, a small number of North Carolina Department of Transportation Daktronics (Nasdaq:DAKT) Vanguard ® dynamic message signs were compromised. As a result, on June 5, 2014, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), a division of the U.S. Department of Homeland Security, issued alert ICS-ALERT-14-155-01A referencing a hardcoded password in the Vanguard controller as the primary cause. The ICS-CERT later clarified the alert on Friday, June 6, 2014, stating the password is not hardcoded but is a default password that display owners should change upon installation. ICS-CERT also communicated mitigation recommendations (reprinted below) within the alert.
While the recommendations provided by the ICS-CERT are commonly known as best practices for all display network owners, the alert itself is only applicable to transportation agencies using variable or dynamic message signs. United States transportation system device standards require manufacturers of variable or dynamic message signs to meet unique specifications that are not applicable to other Daktronics products and control systems. We appreciate our customers' continued trust in Daktronics and look forward to discussing any questions or concerns they may have regarding their Daktronics display.
MITIGATION --------- Begin Update A Part 2 of 2 -------- ICS-CERT is currently coordinating with the Daktronics and the Federal Highway Administration to identify mitigations. Daktronics and the Federal Highway Administration recommend the following:
- Displays should not be on publicly accessible IP addresses. Placing a display on a private network or VPN helps mitigate the lack of security,
- Disable the telnet, webpage, and web LCD interfaces when not needed, and
- Change the default password to a strong password as soon as possible on all installed devices.
--------- End Update A Part 2 of 2---------- ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
- Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet. (ICS-CERT ALERT, http://ics-cert.us-cert.gov/alerts/ICS-ALERT-10-301-01)
- Locate system networks and devices behind firewalls, and isolate them from the business network.
- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.
CONTACT: MEDIA RELATIONS Jody Huntimer Public Relations/Marketing Tel 605-692-0200 Email email@example.com
Select the service that is right for you!COMPARE ALL SERVICES
- $2.5+ million portfolio
- Large-cap and dividend focus
- Intraday trade alerts from Cramer
- Weekly roundups
Access the tool that DOMINATES the Russell 2000 and the S&P 500.
- Buy, hold, or sell recommendations for over 4,300 stocks
- Unlimited research reports on your favorite stocks
- A custom stock screener
- Upgrade/downgrade alerts
- Diversified model portfolio of dividend stocks
- Alerts when market news affect the portfolio
- Bi-weekly updates with exact steps to take - BUY, HOLD, SELL
- Real Money + Doug Kass Plus 15 more Wall Street Pros
- Intraday commentary & news
- Ultra-actionable trading ideas
- 100+ monthly options trading ideas
- Actionable options commentary & news
- Real-time trading community
- Options TV