Funding to protect US from Stuxnet-like worm expired Sunday
Briefly

Funding for a critical infrastructure threat detection program expired, preventing Lawrence Livermore National Laboratory from analyzing potential cyberattack indicators. The CyberSentry Program, a public-private partnership managed by CISA, monitors malicious activities on IT and operational technology networks across various sectors. The program seeks to detect nation-state threats, particularly those from adversaries like China. Engineers from LLNL analyze real-time data from participating organizations to create alerts for the critical infrastructure sector. Cyber threats have evolved significantly since Stuxnet, with nine ICS-specific malware variants identified recently.
Participating critical infrastructure owners and operators agree to place sensors on their networks, and Lawrence Livermore National Laboratory engineers monitor that data in real time.
CISA then uses this information to create alerts for the broader US critical infrastructure sector.
We're looking for threats that haven't been seen before, we're looking for threats that exist right now, in our infrastructure.
Since then, OT cybersecurity company Dragos now knows of nine ICS-specific malware variants, CEO Robert Lee testified.
Read at Theregister
[
|
]