By Ravid Circus, VP of Products, Skybox Security
Not long ago, manufacturers only had to worry about protecting their information technology (IT) infrastructure from cyberattacks, but operational technology (OT) is increasingly becoming a target. Traditionally, OT environments like industrial control systems (ICSs) weren’t connected to the IT network. That setup was more secure but less efficient. However, efficiency and operational needs have meant most organizations have now converged OT and IT networks, creating more potential headaches for security teams and business leaders.
Even if your role is outside of cybersecurity, you’ve probably heard of ransomware. It has proliferated over the past two years with an FBI estimate noting upwards of $1 billion was paid by victims in 2016 alone. Ransomware has become a major headache for organizations, both public and private, in nearly every industry. Usually distributed by email attachment, the malware encrypts data, locking out its rightful users until a ransom is paid.
Ransomware is one part of a larger subset of cybercrime called distributed crimeware. This group also includes banking Trojans, malware, exploit kits, infection tools and mass-distribution mechanisms like phishing, among others. Attacks leveraging these kinds of tools have a least one thing in common: the people behind them are trying to make as much money as they can in the easiest and fastest way possible.
Earlier this year a trio of researchers proved ransomware can be used to take over ICSs. A proof–of–concept (PoC) study conducted by a team at Georgia Tech detailed a hypothetical attack on the systems of a water treatment plant, but the lessons learned aren’t limited to public infrastructure.
The PoC used a cross–vendor worm dubbed “LogicLocker,” to attack programmable logic controllers’ (PLCs) weak authentication. LogicLocker was able to jump from one networked neighbor to another after it took over different kinds of PLCs. The researchers were able to take control of compromised devices, locking out legitimate users, at which point they made the hypothetical threat to dump massive amounts of chlorine into the water supply if the terms of the ransom weren’t met.
More recently, and even more pertinent for manufacturers, a team from Trend Micro working with researchers from Politecnico di Milano have hacked an industrial robot. The Milan researchers programmed the robot to draw a squiggly line instead of a straight one. This fairly harmless hack on a robot gripping a stylus would look a lot more serious on a robot maneuvering a welding rig.
According to the researchers, there are 83,673 of this make of robot exposed to this kind of attack with an entire class of like machines presumably representing a much larger number in use around the world. And the distributed cybercrime loves ubiquity.
Thankfully, LogicLocker and the industrial robot hack are just proof of concepts and aren’t real threats . . . yet. If this kind of incident were to take place, the costs from disruption to critical services — not to mention public safety — could be millions of dollars. These types of attacks on ICS facilities are much more complicated in nature than those preferred by the “smash and grab” type of cybercriminal, as other industries make much easier targets for ransomware.
However, the continued rise of state–sponsored hacking and instances of it “piggybacking” on cybercriminal activity could make manufacturing and critical infrastructure a key target. These facilities need to have preventative measures already in place. Operational managers can’t assume only the lowest of the low–hanging fruit will be targeted. As the recent WannaCry attack has shown, distribute cybercrime outbreaks can have a global reach and affect organizations of any size, in any industry.
There are a few things you can do to better prepare your OT systems like ICSs against cyberattack:
By thinking critically and adding the OT side to your overall cybersecurity program, many potential issues can easily be avoided. After all, the next demonstration of ICS hacking might not be carried out by a friendly team of university researchers and their targets might not be hypothetical.
Ravid Circus is Skybox Security’s vice president of products. Circus holds several patents and is responsible for driving thought leadership around Skybox Security’s technology roadmap, platforms and products for the next era of security analytics.
Patti Jo Rosenthal chats about her role as Manager of K-12 STEM Education Programs at ASME where she drives nationally scaled STEM education initiatives, building pathways that foster equitable access to engineering education assets and fosters curiosity vital to “thinking like an engineer.”