This post was written with contributions from Dave McMillen.
So far 2022 has seen international cyber security agencies issuing multiple alerts about malicious Russian cyber operations and potential attacks on critical infrastructure, the discovery of two new OT-specific pieces of malware,Industroyer2andInController/PipeDream, and the disclosure of many operational technology (OT) vulnerabilities. The OT cyber threat landscape is expanding dramatically and OT asset owners and operators, all of whom understand the need to keep critical infrastructures running safely, need to be aware of the shifting landscape and what they should be doing to secure their operations.
IBM Security X-Force analysts looked at X-Force Incident Response (IR) and Managed Security Services (MSS) data to provide OT defenders with the intelligence necessary to protect their assets.
The manufacturing industry was the most-attacked industry in 2021, according to the 2021 X-Force Threat Intelligence Index. So far in 2022, manufacturing remains in the lead across both metrics at 23% of total IR cases and 65% among OT-related industries. This is just ahead of where manufacturing stood throughout 2021, victimized in 61% of incidents in OT-related industries to which X-Force responded. Of the other OT-heavy industries so far in 2022, electric utilities place a distant second at 13% and oil and gas and transportation tied for third at 8%, all three of which are similar to their proportion of attacks through 2021. Heavy and civil engineering accounts for about 3% and mining just shy of 2%.
Figure 1: Proportion of IR cases by OT-related industry, January-June 2022. Source: X-Force incident response data.
Incident Response Data
Looking at identified initial infection vectors, phishing served as the initial infection vector in 78% of incidents X-Force responded to across these industries so far in 2022. This tracks with phishings position as the lead infection vector across all incidents in 2021. This also highlights the importance of layered phishing defenses, including regular user education and training, software solutions to filter malicious email, email sandboxing solutions to analyze any attachments or linked payloads, web proxies to analyze linked domains and attachment downloads, and application allow listing and Attack Surface Reduction rules to limit which extensions and payloads can be executed by end users. Solutions such as EDR and XDR can help detect post-compromise actions on endpoints if Command and Control is established. This should also be combined with strong network and user behavior analytic detections and defenses in the event that a phish is ultimately successful.
Scanning and exploitation of vulnerabilities on external attack surfaces made up 11% of initial infection vectors in incidents. Proactively identifying and managing the external attack surface of IT and OT networks is essential to understanding what ports, services, and applications may be exposed to attackers externally and may require further hardening, patching, or isolation. Once the external attack surface is identified, focused vulnerability management can help address IT vulnerabilities, though such patching is notoriously difficult in OT environments where downtime is difficult to schedule and system refresh timelines can stretch over many years. Because of this, one might expect successful compromise through vulnerability exploitation to be observed more frequently, but typically OT equipment itself is not exposed directly to the internet and is typically targeted via IT network access. Therefore, proper network security isolation is key to reducing attack paths for threat actors seeking to pivot from IT to OT networks. The use of removable media tied for second at 11% of incidents, underscoring the long-standing threat that such media poses to OT networks, often by end users using infected USB media drives between operator workstations and personal laptops while in the field.
Proper segmentation, proactive testing of security controls, knowing your environment, and hardening systems are just a few of the steps available to secure these assets. As for removable media, ideally, USB flash drives should be prohibited when possible. If absolutely necessary, strictly control the number of portable devices approved for use in your environment and disable autorun features for any removable media.
Figure 2: Identified infection vectors for incidents against OT-related industries, January-June 2022. Source: X-Force incident response data.
Network Attack Data
In addition to analyzing data from our incident response engagements, X-Force analysts also reviewed OT-related industries network attack data to determine how attackers are most often attempting to infiltrate those networks. Widespread vulnerability scanning, mostly broad spraying with some more targeted attempts, accounts for most of the observed network attacks on X-Force clients in OT-related industries. Weak encryption implementation and brute force attempts make up the majority of alerts in client environments with OT monitoring devices.
Vulnerability Scanning
In most cases, the scanning attempts revealed in the data are not directly targeting OT or ICS, rather they are looking for any of a large number of vulnerabilities in an unspecified environment whether internally and externally. The fact that many of the OT-specific signatures triggered also appear against clients in industries without OT environments supports our assessment that much of this activity is indiscriminate scanning. When we analyzed network traffic related to ports commonly associated with OT, we found port scanning and Shodan scanner activity made up 47% and 36% of activity, respectively. These types of scanning can ultimately be used to identify vulnerable or accessible IT or OT environments.
Figure 3: Attack activity against ports commonly associated with OT, January-June 2022. Source: IBM Managed Security Services data.
The vulnerabilities X-Force sees being scanned for include ones from 2016, 2018, and 2021. Within network attack alerts from the subset of clients in OT-related industries, a filter bypass vulnerability in Trihedrals VTScada application (CVE-2016-4510) that could allow unauthenticated users to send http requests to access files was most common. Other vulnerabilities scanned include cross-site scripting vulnerabilities in Advantechs R-SeeNet devices platform (CVE-2021-21801, -21802, and -21803) and a vulnerability in CirCarLife SCADA software (CVE-2018-12634) that could lead to information disclosure. The CirCarLife CVE ranks 9.8/10 in CVSS, followed closely by Trihedrals at 9.1, and the others at 6.1.
Figure 4: OT-related vulnerability scanning activity against OT-related industries, January-June 2022. Source: IBM Managed Security Services data.
Refining and maturing your vulnerability management program can help protect your assets from threat actors seeking to identify vulnerabilities in your systems via such scanning. This should include dedicating a well-resourced and supported team to the task and prioritizing the CVEs below for OT networks. Overall, it is important to bear in mind that your specific environment does not need to be directly targeted to be compromisedif your network is vulnerable or misconfigured, it can be compromised.
Weak Encryption and Brute Force
Weak encryption and brute force alerts were the two most significant network attack alerts that clients with OT monitoring devices experienced. Almost 60% of the alerts concerned the continued use of TLS 1.0, an outdated and insecure encryption method deprecated in March 2021. Though the US Governmentrecommendsreconfiguration to use TLS 1.2 or 1.3, NISTguidelinesaddress in more depth the more common reality that older systems may need to continue using weaker versions of encryption to ensure continued functionality.
X-Force strongly recommends that organizations inventory and understand their environments; the types of encryption deployed should certainly be on those lists. We also recommend clients weigh the security risks with the possible benefits of continuing use of older encryption methods based on the sensitivity of the communications being secured.
Figure 5: Network alerts from OT monitoring devices, January-June 2022. Source: IBM Managed Security Services data.
Another 42% of alerts concerned brute force, both attempted and successful events. Among the small percentage of other alerts were a variety of network enumeration alerts including Modbus function code, illegal parameter, and suspect variables scans, and things like weak or default passwords found on devices, a basic but necessary vulnerability to address that makes brute force attacks easier for attackers. Other mitigations to reduce your networks susceptibility to brute force attacks include ensuring multi-factor authentication is deployed and regular re-authentication is required for as many logins as technically feasible, keeping applications and operating systems updated, and implementing lockout policies.
Top Threat: Malspam Delivering Emotet
So far this year, malspam ranks as the top threat across OT-related industries at 44% of incident response engagements. Notably, the majority of malspam incidents involved the delivery of the Emotet Trojan, which is reflective of a cross-industrytrendnot just in the OT space, and aligns with our data indicating phishing as the leading infection vector. Many of those incidents involved Emotet infections, receipt of thousands of infected emails, and infection from unauthorized downloads that sometimes led to system identifying information being stolen. In some of the cases, victims emails were hijacked to send Emotet-infected spam, probably to make the emails look more legitimate and get more clicks. Remote access trojans (RATs) come in second at 19%, ransomware accounts for 13% of incidents responded to, and business email compromise (BEC) and server access attacks account for about 6% each.
These numbers so far reflect a shift from 2021, when ransomware accounted for 36% of all attacks across these industries. Most of those ransomware events affected IT networks directly, with some having an indirect impact on OT networks. This trend is currently being observed across all industries, not just those with OT environments. Although new and existing ransomware groups continue to plague many organizations, X-Force assesses that fewer ransomware IR cases this year compared to last may be the result of defenders improving their own ransomware response plans or security posture to detect malicious behaviors in their environment before attackers have an opportunity to strike.
Figure 6: Identified threats for incidents against OT-related industries, January-June 2022. Source: X-Force incident response data.
Government and private institutions around the world have been turning their focus to mitigating risks to OT in recent years. Cybercriminals are developing new threats on a daily basis that can potentially result in catastrophic utility and manufacturing outages.
The threat to OT permeates across a nations entire economy and infrastructure. Organizations across all verticals must take full responsibility for protecting their own assets and consumers. The best way to keep adversaries out of an ICS is to implement simple safeguards, best practices, and risk management solutions. You can download ICS specific resources from government entities like the National Institute of Standards and Technology (NIST), which also offers network protection advice for connected things within industrial realms.
For more information on protecting ICS from rising threats while continuing to enable technological advancements, read X-Forces recent blog, Where Everything Old is New Again: Operational Technology and Ghosts of Malware Past. The report looks at the history of ICS, the susceptibility of these systems to certain attacks, and ways to defend those systems.
Strategic Cyber Threat Analyst, IBM Security X-Force
Mike Worley is a Strategic Cyber Threat Analyst on the IBM X-Force Threat Intelligence Production Team. He joined the team in 2021 with 8 years of experience...
Continue Reading
See more here:
X-Force 2022 Insights: An Expanding OT Threat Landscape - Security Intelligence
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]