The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2021-26829 — a cross-site scripting (XSS) flaw in OpenPLC ScadaBR — to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild.
Vulnerability Details
- Type: Cross-Site Scripting (XSS)
- CVSS Score: 5.4 (medium severity)
- Affected Versions:
- OpenPLC ScadaBR ≤ 1.12.4 (Windows)
- OpenPLC ScadaBR ≤ 0.9.1 (Linux)
- Attack Vector: Exploitable via
system_settings.shtm
Exploitation in the Wild
- Actor: Pro-Russian hacktivist group TwoNet
- Incident: September 2025 honeypot breach (mistaken for a water treatment facility).
- Attack chain:
- Initial access via default credentials
- Persistence: created new user account
"BARLATI" - Exploited CVE-2021-26829 to deface HMI login page (“Hacked by Barlati”)
- Disabled logs and alarms via system settings
- Focus: Web application layer only; no privilege escalation or host exploitation.
Broader Threat Context
- TwoNet evolution: Began with DDoS attacks on Telegram (Jan 2025), expanded to industrial targeting, doxxing, RaaS, hack-for-hire, and initial access brokerage.
- Affiliations claimed: CyberTroops, OverFlame.
- Tactics: Mix of legacy web exploitation with industrial system defacement for attention.
OAST Infrastructure Observed
- Operator: Unknown actor leveraging Google Cloud-hosted OAST endpoints.
- Activity: ~1,400 exploit attempts across 200 CVEs, regionally focused on Brazil.
- Indicators:
- OAST callbacks to
*.i-sh.detectors-testing[.]com(active since Nov 2024). - Java class file
TouchFile.classat34.136.22[.]26expanding Fastjson RCE exploit.
- OAST callbacks to
- Implication: Long-lived scanning infrastructure using off-the-shelf tooling (Nuclei) to spray exploits and blend into normal traffic.
Required Mitigation
- Deadline for FCEB agencies: December 19, 2025
- Actions:
- Patch OpenPLC ScadaBR to latest secure versions.
- Audit for unauthorized accounts (e.g., “BARLATI”).
- Monitor for defacement attempts and disabled logging/alarm settings.
- Block suspicious OAST domains and Google Cloud IPs linked to exploit infra.
- Harden credentials (disable defaults, enforce strong auth).
Takeaway
This case highlights how hacktivist groups weaponize industrial control system (ICS) software flaws for disruptive impact and propaganda. The addition of CVE-2021-26829 to the KEV catalog means defenders must treat it as high-priority patchwork, especially in environments where ScadaBR/OpenPLC is deployed.
Leave a Reply