ICS/SCADA Attackers Up Their Game

  /     /     /  
Publicated : 23/11/2024   Category : security


ICS/SCADA Attackers Up Their Game


With attackers operating more aggressively and stealthily, some industrial network operators are working to get a jump on the threats.



The bad news: Attacks aimed at industrial sites have become more aggressive over the past year. The good news: Some industrial control systems (ICS) operators increasingly are taking more proactive defensive measures to thwart cyberattacks on their networks.
The threats are getting worse, says Robert M. Lee, CEO and co-founder of Dragos, whose company this week published its
annual findings
on ICS threats and engagements with its industrial clients in 2018. But people are being really proactive about this. And maybe its not communitywide and we have to reach more, but youve got some real forward-leaning companies that are pushed into the right direction.
In nearly 40% of the incident response (IR) engagements conducted by Dragos in 2018, the attacker had been inside the network for more than a year. About one-fourth of its IR engagements were to determine whether a cyberattack was the cause of an outage or other event.
Were seeing major industrial instances today that are at least asking the question of whether it was a cyberattack, Lee notes. And that is a major step forward for those players.
Even so, only about 20% to 30% of ICS organizations in North America today use real-time network monitoring to detect and thwart attacks, according to Lee. Thats the main security best practice recommended for ICS/SCADA organizations, and North America is actually ahead of other regions in adopting it.
Most of Dragos client work in 2018 was for proactive threat hunting and better mapping of network infrastructures: Thirty-three percent of all engagements were IR cases, while the rest were mainly threat analysis, assessments, and some tabletop exercises.
IT-OT Weak Link
One of the easiest ways to infiltrate an industrial network is via its IT infrastructure, and thats a common initial attack vector. Gaining a foothold via a successful phish and user account compromise, for example, gives the attacker a better shot at gaining access to systems on the ICS network.
Not much has changed in the last year in ICS attack trends, says David Weinstein, vice president of threat research at industrial security firm Claroty. In the past two to three years, weve seen attackers take advantage of exploiting the OT-IT convergence ... its most efficient to leverage IT to get to OT, which wasnt always the case. In the past, things were more isolated.
Dragos Lee says his firm sees more hacking teams than ever targeting industrial networks. Were seeing wider sets of data, tradecraft, and lots more victims.
The biggest shift is their using so-called living off the land methods, though not in the same way attackers operate in IT networks. Its not their using Remote Desktop Protocol (RDP)-type attacks, for example, but instead employing native industrial protocols, Lee says. These are things enterprise security would not detect, he says.
Most of the ICS threat groups Dragos tracks use these types of camouflaging methods, and they also are beginning to employ legitimate penetration testing tools like Mimikatz, Metasploit, and PowerShell Empire.
Ongoing Patching Conundrum
Meanwhile, to patch or not to patch remains the big question for many industrial organizations as the number of ICS vulnerability discoveries and patches rose last year. Unlike in IT, applying a patch to an OT system can sometimes be more destructive and riskier than forgoing the update if it disrupts operations.
You have to have an understanding of how adversaries are using these [vulns] and have a risk-based [patching] approach, Lee notes.
Dragos analyzed some 204 public ICS vulnerabilities in 2018 and found that 82% had no direct interaction with an ICS system. Lee says thats because most vulnerability research isnt focused on ICS system vulns. Some 34% of network-exploitable flaws patched disclosed last year were ICS-based; the rest were typical IT protocols, like HTTP and FTP. Lee says thats likely because of a lack of ICS knowledge by researchers, as well as a lack of tools for testing ICS protocols.
But big picture-wise, more than half of the vulns found last year in ICS systems could be used for dangerous cyber activity: They could be leveraged for loss of view and control, Lee says. Dragos also found that much of the mitigation advice in the vuln advisories was insufficient or outright inaccurate.
Reality Check
Some 72% of ICS vulnerability advisories in 2018 encompassed engineering workstation systems, human machine interfaces (HMIs), and industrial networking components, according to Dragos data. And those findings are a bit redundant, according to its analysis, because they already are easy marks without employing exploits.
Most of these protocols are insecure by design, Lee explains. If the vulnerability is giving me privilege escalation on an HMI, why should I care when the default state of the HMI is already running in admin mode ... the vulnerability [there] never needs to be used by the adversary.
Related Content:
Triton/Trisis Attack Was More Widespread Than Publicly Known
 
Industrial Safety Systems in the Bullseye
First Malware Designed Solely for Electric Grids Caused 2016 Ukraine Outage
Lessons From The Ukraine Electric Grid Hack
 
 
Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industrys most knowledgeable IT security experts. Check out the
Interop agenda
here.

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
ICS/SCADA Attackers Up Their Game