Cutting the wire intentionally or tripping over it. Tales of Insider threats in OT environments that can be scarier than cyberattacks
I have visited a few factories and plants in India and I see a lot of unorganized and mismanaged cabling, setups, and weak physical security measures inside these environments not sure if that is the same case in other environments across the globe. This begs the question of the fact that adversaries are also aware of those who want to target these environments. We know very well engineers lack cyber awareness, and to solve this problem organization needs to train their personnel and make them aware of basics about how to maintain cyber hygiene like
These are the two most successful ways adversaries have been establishing a foothold in IT/OT environments and then executing their plans to disrupt operations through deploying ransomware, sophisticated malware, manually utilizing CNC channel to target some specific OT system, or just conducting cyber espionage.
So all this is OK but what about nation-state attackers or adversaries who don't want money or just damage the reputation, but want to disrupt operations so badly that can be hazardous, can cause large scale economic impact, harm human lives, damage the factories/plants completely.
How I see the future of OT attacks that can be impactful is when systems and processes are disrupted at L0-L2 and one needs to focus on the kind of attack vectors that can happen at these layers, With TRITON in 2017 we already saw adversary targeted safety PLC's.
But then we also need to talk about insider threats and discuss how insider threats can be different in OT than IT and what are a few ways we can approach to solve this problem.
16 years back in the case of Maroochy water treatment plant case in 2006 a disgruntled contractor attacked the system and caused production impact. Read more in the report Then more recently 4 years back one of the engineers at Tesla's Gigafactory in Nevada stole IP and sabotaged existing operations because he was not being promoted. Read the article. This is still not as dangerous but incidents have happened and are happening that do not make headlines or are not reported.
And this made me think of targeted disruption operation-based attacks where insider threats are so engineering specific and are very hard to detect, something where it cannot even be distinguished if it was disruption caused by accident or was intentional.
Looking at a scenario when, someone trips over the wire that is close to the machinery or just tries to sabotage in some way that can cause a hazard, trigger alarms, and damage the machinery.
Engineers have the training and know these machineries in and out, how they work internally, what are some problems they can have as they would be one to troubleshoot them, then there are contractors and vendor side engineers or technicians those visit these facilities to troubleshoot, commission equipment are the two sources of insider threats that can be disgruntled, socially engineered or manipulated by rewarding money to do this type of sabotage at large scale.
领英推荐
Now the question is what steps or measures we can put in place to maybe detect something of this sort and this is also one of the ways to improve the security posture of these environments.
Enhance the physical security posture
Enforcing Security measures at L1-L2 levels OT assets
I just believe that we need to start focusing on these types of threats and attack vectors because in the OT process disruption is the end goal and it is not necessary it needs to be a complete cyber-attack, but to cause large scale catastrophic impacts it can be hybrid and thus we as defenders need to pay attention to these as well when we run our transformation program and commit to the investment of security posture of these environments.
I have tried to express my views and thoughts from how I believe and if there are facts that someone feels is incorrect or if someone feels we need to add more points, do let me know in DM or comment down so we as a community can have the discussions open and spread awareness :)
***
The views reflected in this article are the views of the author and do not necessarily reflect the views of the global EY organization or its member firms.
Technology Solutions Director @ Nozomi Networks | Texas MBA
2 年Well said, for most organizations, inadvertent errors, configuration mistakes, deliberate maleficence, all bucketized under insider threats are more of a threat than APT/Nation State (though some of the insider threat is just another vector for APT). In this regard, I like the IEC/ISA 62443 Security Levels, which help organizations assess what they are trying to defend against.
Well articulated thought .Keep it up my Son.
Cofounder | ICS/OT Cybersecurity | OT security with OT logic
2 年Thanks for sharing your thoughts. State sponsored attackers are always going to try to hide their tracks, especially when their actions cause physical damage that might be interpreted as an act of war. Right now some of the best strategies for doing so involve using insiders to target areas that aren’t being monitored as closely (Level 1) and making it look like a normal accident so it is never investigated as an attack. I believe the most effective defense against ICS insiders like this is empowering operators with better cybersecurity training and visibility into their system.