25 Years, Same Question

25 Years, Same Question

Why don't we see more OT cyber incidents?

My first exposure to OT security was a security assessment of a water SCADA system in 2000. It was a disaster from a security perspective. Old OS and apps that hadn't been touched since install. Poor network segmentation, Admin accounts used by all with default passwords, and unauthenticated, insecure by design control protocols and PLCs and RTUs.

Little changed from 2000 - 2010 except for a few pioneers who started to address these issues. When people learned of the OT security state they asked the question . . . If these ICS are so vulnerable, why don't we see OT cyber attacks and cyber incidents?

OT security awareness went mainstream in the 2010 - 2020 decade. Pioneers gave way to early adopters and even the early majority for some basic OT security controls. Still the majority of OT systems were far from secure. Far from even implementing whatever you would call the basic security controls and consequence reduction to reduce OT cyber risk. Attack and vulnerability content was widely distributed and hyped, but still the number and impact of OT cyber incidents was small. Tiny, a mere blip compared to other causes of OT outages, physical damage, and safety incidents.

The question being asked that decade was why don't we see more OT cyber incidents?

In 2025, 25 years after my first OT security gig, the question is still being asked. I've never had a great answer, anything more than conjecture. I haven't heard a great answer from anyone else.

Is it because criminals have easier ways of making money through cyber attacks?

Is it because criminals, nation states, and non-state actors worry about the potential retribution if they take out critical infrastructure? We saw a bit of this fear in the Colonial Pipeline incident.

Is it because the criminals and organizations who might want to damage OT systems through cyber attacks lack the knowledge? This may have been believable up to 2020, but seems hard to believe now. It does take process and automation knowledge to cause a specific type of damage, but it is not required to take a system down. Some OT that "must never go down" is incredibly fragile.

Is it happening a lot more than is publicly disclosed because a) the affected asset owner doesn't want to disclose or b) the affected asset owner knew there was an incident but didn't know it was caused by a cyber attack?

I don't have an evidence based answer. We can be happy that whatever the reason, we, society, hasn't suffered the expected number and impact, yet.

BTW, that water system from 2000 has never had an outage caused by a cyber incident. And they have an impressive OT security program after 25 years of continued improvement. There are a growing number of asset owners properly addressing OT cyber risk in every sector. Maybe we can get lucky, for whatever reasons, for another 5 or 10 years and the majority will have addressed OT cyber risk.

Vytautas (Vytas) Butrimas

Industrial cybersecurity Consultant, Performed Cyber Risk Study of the ICS used in the NATO CEPS.

1 个月

It is a false question. Same as asking why since 1945 have we not seen nuclear weapons used (besides testing) on civilians. The capability is there and being further developed in a world that seems to be getting more dangerous as we speak. We often think of Colonial Pipeline and not enough about what was demonstrated in Stuxnet. A sophisticated capability whose development was not motivated by financial return with the willingness to use it. Things since then have not been standing still. BTW the great computer in Hitchhiker'sGuideToTheGalaxy gave the answer as "42" but also said you have to understand the question. Today the answer seems to be "OT" which is not clearly defined. As long as we lack a commonly accepted defintion for the technologies used to monitor and control processes governed by the laws of physics and chemistry we will continue to ask the question. It is good we continue to ask, for we ignore it at our peril. It must mean something that the question about incidents has not gone away. Ignore it at your peril.

回复
Rossella Mariotti-Jones

OT Security Engineer

1 个月

Well.... Events have to first be identified, then categorized as incidents, then reported to even count.... Could it be that this is not happening much yet in OT?

回复
Bruce Rosenthal

Grid Stability Modeling and Simulation, Energy Transformation / Power Grid Modernization Solution Development and Delivery Services, Water Treatment Resiliency and Security Solutions Delivery.

1 个月

Design in and deploy mixtures of analog based components and systems along with digital/programmable components. Reduces overall system resiliency.

回复
Sinclair Koelemij

Cyber-Physical Risk Expert | Founder Cyber-Physical Risk Academy | Consultant, Speaker, Trainer, Publisher | Operational Technology | Masterclasses | Training | 45+ years in process automation. OT security focus.

1 个月

Perhaps we should also reconsider the definition of what constitutes an OT cyber incident. If we include malware infections, there have been thousands, but most have had limited impact. These could be seen as the “near misses” of OT security, offering lessons on vulnerabilities without causing major disruptions. A significant number of cyber incidents remain unreported, especially when their impact is confined to financial losses or when no clear evidence of compromise has been identified. This underreporting skews our understanding of the broader threat landscape. There is also a critical distinction between actual attacks and risk evaluation, particularly when contrasting statistical risk with threat-based risk. In threat-based risk analysis, it is essential to account not only for incidents that have occurred but also for non-events, as they provide valuable insights into both the likelihood and potential impact of potential future incidents. Both process safety and OT security require a prosctive approach.

Joe Lam, P.Eng, M.Eng, GICSP

Automation Manager (IT, OT, ICS, Cybersecurity, Automation & Process Control Optimization)

1 个月

One compelling reason may lie in the attacker’s cost-benefit analysis. Many attackers find what they perceive as a "pot of gold" in enterprise (stage 1 attack) environments and stop there. Financially motivated cybercriminals often prioritize quicker wins—stealing data, deploying ransomware, or committing fraud—over the more complex and resource-intensive process of pivoting into OT networks. Reaching stage 2 (ICS) requires overcoming segmentation (if implemented), understanding proprietary protocols, and navigating the unique characteristics of OT systems. For many attackers, this effort may not yield additional value proportional to the risk and time, especially if the initial breach of the enterprise network already delivers a lucrative outcome.

要查看或添加评论,请登录

Dale Peterson的更多文章

  • Gartner's OT Visibility Magic Quadrant

    Gartner's OT Visibility Magic Quadrant

    Advisory services vendor Gartner put out their magic quadrant for "CPS Protection Platforms" on February 12th. (Right…

    17 条评论
  • Week 10: Understand What Success Means In Your Company

    Week 10: Understand What Success Means In Your Company

    It’s critical to know what your organization is trying to achieve and how success is measured if you are going to…

  • S4x25 Keynote: Your Value As An OT Security Professional

    S4x25 Keynote: Your Value As An OT Security Professional

    Here's the text version of my S4x25 keynote delivered on Feb 12th. Of course you don't get the seesaw that you have in…

    34 条评论
  • Week 9: Identify And Plan Your Career Growth Area

    Week 9: Identify And Plan Your Career Growth Area

    One last, but not least, task to complete your S4 month is to plan what area you will focus your career growth on over…

    1 条评论
  • The Impact Of US Government OT Security Firings

    The Impact Of US Government OT Security Firings

    Three notes at the start: There are many talented people in OT Security who have lost and are losing their US…

    43 条评论
  • Time For Action, We Have Plenty Of Advice

    Time For Action, We Have Plenty Of Advice

    Seth Godin manages to put a lot of wisdom in his short daily blogs. This one hit me last week (key excerpt below).

    10 条评论
  • Introduction Chapter From My New Book

    Introduction Chapter From My New Book

    This chapter from the book describes what it is, how to use it, and a bit of how I came to write it. I started reading…

    3 条评论
  • My New Book & 2025 Content Plan

    My New Book & 2025 Content Plan

    Some of you have asked where my weekly article went in November and December. The answer is I had to focus my writing…

    13 条评论
  • Election 2024 - Simple Guidance For The Next Administration

    Election 2024 - Simple Guidance For The Next Administration

    The Cyberspace Solarium Commission, McCrary Institute, and others provide long lists of initiatives they recommend for…

    5 条评论
  • What's Your Cyber Narrative?

    What's Your Cyber Narrative?

    I first heard the term "Cyber Narrative" while interviewing Jennifer Dulles, APR, a media relations and crisis…

    6 条评论

社区洞察

其他会员也浏览了