- IT 리더가 지목한 AI 가치 실현의 최대 걸림돌은 ‘비용 관리’
- Los CIO consideran que la gestión de costes puede acabar con el valor de la IA
- 칼럼 | AI 에이전트, 지금까지의 어떤 기술과도 다르다
- The $23 Echo Dot deal is a great deal to upgrade your smart home this Black Friday
- Amazon's Echo Spot smart alarm clock is almost half off this Black Friday
Cybersecurity for Industrial Control Systems: Part 2
Legacy malware had the most detections in India, China, the US, and Taiwan. For coinminer, Equated malware, and WannaCry, India had the most detections. On the other hand, Japan had the most Emotet infections, while ICSs in Germany had the most adware incidents.
Through this extensive research, we found that there were several malware threats that pose a great risk on ICSs. By identifying these threats, we can now determine various steps that your enterprise can take to better secure your industrial control systems.
But what does this information mean? This tells us several things:
- Ransomware continues to be a major concern and continues to be a rapidly evolving threat to ICSs across the globe;
- Coinminers affect ICSs mostly through unpatched operating systems;
- Conficker continues to propagate on ICS endpoints running newer OS;
- Legacy malware still affects IT/OT networks; and
- Malware detected on ICS endpoints varies between countries.
Based on the detection data, we can conclude that modern malware such as the threats we discussed affect ICSs. It means both modern techniques like fileless malware and hacking tools and age-old methods like removable drive autorun can successfully infect ICS endpoints.
The stakes are also higher for some attacks. As illustrated by the Colonial Pipeline incident, ransomware attackers are into big-game hunting. They identify whom they were able to compromise and then determine key systems in the network that can cause the most disruption. After this, they coerce the victim into paying.
The presence of ransomware in ICSs in several attacks may indicate that attackers are now recognizing these systems and actively targeting them.
Security is paramount for ICSs
These findings mean security must be a major consideration when interconnecting the IT network with the OT network. Enterprises should address security issues brought about by both legacy malware and the latest attack trends.
Using malware detections as one of the criteria of IT/OT networks’ cybersecurity readiness can help enhance their security posture and better protect ICSs endpoints This also helps prevent unintended downtown and the loss of view and control.
Moreover, IT security staff should work with OT engineers to properly account for key systems as well as identify various dependencies like OS compatibility and up-time requirements. They should also learn the process and operational practices and plan a suitable cybersecurity strategy for the protection of these important systems.
Other tips to secure your ICS endpoints
- Patch systems with security updates to avoid compromises. EnternalBlue was exploited initially by zero-day malware and then by commoditized Equation group tools installing coinminers. Once an exploit is out, it gets assimilated into the attacker’s playbooks, so patching is vital.
- Use micro-segmentation in the network or virtual technologies. If patching is not an option, this can enhance security by restricting network access and communications to only necessary devices.
- Restrict network shares and implement strong username and password combinations. This method can help prevent unauthorized access through credential brute force.
- Use Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). These can flag possible network anomalies as well as identify malicious traffic. These help with device visibility as well.
- Install antimalware solutions. These solutions can address legacy worms and viruses that can stay dormant in removable drives and air-gapped systems.
- Set up USB scanning kiosks. These stations can scan for malware from removable drives used to transfer data in between air-gapped endpoints.
- Apply the least privilege principle. Applying this strategy means an operator is allowed to use the ICS but only an administrator can install software or make system changes on the endpoint.
- Use a safelist. This may be appropriate for certain ICSs of specific functions.
- Conduct incident responsive and network sweeping for compromise (IoCs). By doing this, you can determine the extent of intrusion and security weaknesses that were abused by attackers. These steps can also help in creating a security strategy based on the incident.
Apart from these recommendations, a robust cybersecurity solution can help future-proof an enterprise’s ICS and its endpoints. As a leader in cybersecurity solutions, Trend Micro offers forward-looking products that address various needs, including ICS security. Check out our product page to learn more about our offerings.