Reassessing OT Cyber attacks – Reflecting on 2022 and looking into 2023
Antoinette Hodes
Global Solutions Architect and Evangelist | Office of the CTO | Spokesperson | Mentor at Check Point Software Technologies
Introduction
OT (Operational Technology), Industrial networks or ICS (Industrial Control System) networks are completely different to IT networks. OT environments have other requirements and needs compared to IT environments. Below and overview of the differences between those 2 worlds.
The challenges differ too, in below infographic I have grouped some of those challenges.
Assessing risks in these complex environments is difficult. OT networks are very static and the life cycle of assets is very long in this realm. Think of assets such as RTUs (Remote Terminal Units), PLCs (Programmable Logic Controllers), HMIs (Human Machine Interfaces) and IEDs (Intelligent Electronic Devices). Hackers know about these challenges. Hackers or attackers are looking for ways to exploit outdated software and vulnerable ICS assets. To attack, infiltrate and compromise OT networks. In 2022 manufacturing was one of the most targeted Operational Technology verticals.
The OT Threat Landscape
GhostSec | GhostSec is claiming to be the first to encrypt an RTU, Remote Terminal Unit using ransomware. An RTU is a critical asset in the OT/SCADA environment. An RTU is situated at level 1 of the Purdue model.?
INDUSTROYER.V2 | This specific “OT malware” crafts configurable IEC-104 Application Service Data Unit (ASDU) messages (AKA telegrams) to change the state of a remote station’s Information Object Addresses (IOAs) to ON or OFF. IOAs identify a specific data element on a device and may correspond to power line switches or circuit breakers in an RTU or relay configuration. In other words, it could communicate and manipulate the RTU over TCP. IEC-104 is used for power system monitoring and control over TCP. IEC-104 is mainly implemented in Europe and the Middle East.?
INCONTROLLER (aka PIPEDREAM) | ICS attack toolset which allows communication, access and manipulate Schneider Electric, Omron PLCs and OPC assets. It can manipulate PLCs and industrial software. It is very likely state sponsored. Offering capabilities related to disruption, sabotage and potentially physical destruction. ?The toolset consists of:
1.??????TAGRUN - Is a tool that scans for OPC servers, enumerates OPC structure & tags, brute forces credentials and read/write OPC tag values
2.??????CODECALL – Is a framework that communicates via Modbus, the most common industrial protocol and Codesys. CODECALL contains modules to attack at least three Schneider Electric PLCs.
3.??????OMSHELL – Is also a framework with capabilities to communicate and scan some types of Omron PLCs via HTTP (port 80), Telnet (port 23), and Omron FINS protocol (port 9600).?
OT:ICEFALL | Forescout researchers released a report about 56 vulnerabilities caused by insecure-by-design practices in the OT realm. The vulnerabilities are divided into four main categories:
1.??????insecure engineering protocols
领英推荐
2.??????weak cryptography or broken authentication schemes
3.??????insecure firmware updates
4.??????RCE (Remote Code Execution) via native functionality
·??????RCE, Remote Code Execution
·??????Compromised assets (bots or zombies can participate in DDoS attacks)
·??????Corrupt and exploit vulnerable firmware
·??????Credential theft
·??????Poor authentication or bypass authentication
RSOCKS Proxy Botnet | This Russian botnet is dismantled by the FBI. The compromised assets (350.000 devices), bot or zombie were sold as high quality proxies. The threat actor mechanism is similar to Mirai, exploiting known vulnerabilities and weak credentials. Under compromised assets there were OT assets and consumer assets.
Other attacks mentioned our Threat Intelligence Report by Check Point Research are |??
Gartner predicts that attacks resulting in fatal casualties will reach over $50 billion by 2023. Even without taking the value of human life into account, the costs for organizations in terms of compensation, litigation, insurance, regulatory fines and reputation loss will be significant. Gartner also predicts that?most CEOs will be personally liable?for such incidents.
Conclusion
To secure critical infrastructures and OT environments, topics like the IT/OT convergence, policies, remote access (RA), compliance and processes should be addressed. I always talk about the four “Ps”, processes, protocols, procedures and people! Addressing the challenges that come with the four “P’s” ensure safety and availability. Worldwide governments mandate regulations for OT and Industrial IoT assets, which will be a step in the right direction in these very complex environments.?
Pragmatische cybersecurity dienstverlening tegen MKB prijzen
2 年Thanks for the inside! I'm just wondering what is the trend of attackers for initial access. Lateral movement through IT, Remote Access (Third PArty) or airgapped?