Claroty Launches Research Arm Team82, Finds Critical Vulnerabilities in Cloud-based ICS Management Platforms

By Tiera Oliver

Associate Editor

Embedded Computing Design

July 21, 2021


Claroty Launches Research Arm Team82, Finds Critical Vulnerabilities in Cloud-based ICS Management Platforms

Claroty launched Team82, its new research arm that provides vulnerability and threat research to Claroty customers and defenders of industrial networks.

Additionally, Team82 released a new report on critical vulnerabilities found in cloud-based management platforms for industrial control systems (ICS), highlighting the rise of ICS in the cloud and the need to secure cloud implementations in industrial environments. 

According to the company, Team82, formerly known as The Claroty Research Team, is known for its development of industrial threat signatures, proprietary protocol analysis, and discovery of ICS vulnerabilities. The team works in ICS vulnerability research, with a total of 146 vulnerability discoveries and disclosures to date, and was the first to develop and release signatures for the Ripple20 and Wibu-Systems CodeMeter vulnerabilities and the threat actors that target them. The team works closely with industrial automation vendors to evaluate the security of their products. 

In its latest report, “Top-Down and Bottom-Up: Exploiting Vulnerabilities in the OT Cloud Era,” Team82 researched the exploitability of cloud-based management platforms responsible for monitoring ICS, and developed techniques to exploit vulnerabilities in automation vendor CODESYS’ Automation Server and vulnerabilities in the WAGO PLC platform. Team82’s research mimics the top-down and bottom-up paths an attacker would take to either control a Level 1 device in order to eventually compromise the cloud-based management console, or the reverse, commandeer the cloud in order to manipulate all networked field devices. 

The new Team82 Research Hub includes the team’s latest research reports, a vulnerability dashboard for tracking the latest disclosures, its coordinated disclosure policy for working with affected vendors, its public PGP Key for securely and safely exchanging vulnerability and research information, and other resources. 

For more information, visit

Tiera Oliver, Associate Editor for Embedded Computing Design, is responsible for web content edits, product news, and constructing stories. She also assists with newsletter updates as well as contributing and editing content for ECD podcasts and the ECD YouTube channel. Before working at ECD, Tiera graduated from Northern Arizona University where she received her B.S. in journalism and political science and worked as a news reporter for the university’s student led newspaper, The Lumberjack.

More from Tiera