Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/28/2010
09:39 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Global Critical Infrastructure Networks Regularly Under Attack

New report from the Center for Strategic and International Studies finds it's not a matter of when energy, telecom, and other networks will be attacked -- but how often

Critical infrastructures worldwide -- everything from oil and gas, electrical, and telecommunications -- are under constant attack, and mainly from foreign nation-states, according to a new report published today by The Center for Strategic and International Studies and commissioned by McAfee.

The report, based on surveys of 600 IT and security executives from these firms worldwide, says these highly sensitive networks are being hit by distributed denial-of-service (DDoS) attacks, malware, and targeted attacks, including advanced persistent threat-style ones. Among the findings: The cost of downtime incurred from an attack is more than $6 million a day, and up to $8 million a day for the oil and gas industries. More than one-third of the execs in all sectors say the threat is growing, and two-fifths expect a major attack in their industry within the next year.

Oil and gas executives suffered the highest rate of stealthy targeted attacks, with 71 percent. Around 54 percent of all respondents had suffered these types of attacks, and more than one-third say they experience multiple infiltrations each month. The findings from the CSIS-McAfee "In the Crossfire: Critical Infrastructure in the Age of Cyberwar" report come in the wake of revelations that the oil industry, including Marathon Oil, ExxonMobil, and ConocoPhillips, reportedly were hit with a wave of targeted attacks in 2008.

Around 54 percent of the respondents say their companies had been hit by a "large-scale denial of service attacks by high level adversary like organized crime, terrorists or nation-state (e.g. like in Estonia and Georgia)," according to the report. And more than half of the respondents had experienced a targeted, stealthy attack akin to the attacks Google, Adobe, and nearly 30 other companies suffered recently.

Nearly 60 percent say critical infrastructures in their countries had been targeted by "representatives" of foreign governments.

The report demonstrates that the actual attacks on critical infrastructure networks worldwide "is as bad as we thought," says Phyllis Schneck, vice president and director of threat intelligence for the Americas at McAfee. "A big takeaway here is this is a giant step toward global engagement on critical infrastructure protection ... helping us incentivize and motivate the private sector to protect these networks."

Nearly 90 percent of the respondents' networks had been infected with malware attacks, and more than 70 percent had suffered low-level DDoS attacks and vandalism, insider threats, leakage of sensitive data, and phishing or pharming.

SQL injection and DNS poisoning attacks had occurred at 57 percent of the organizations, and half of them say these types of attacks happen on a monthly basis.

Execs worldwide aren't exactly confident of their ability to protect their networks in the future, either: Only 20 percent say their industry sector is safe from a serious attack during the next five years, and one-third say their industry sector isn't prepared to handle major attacks or APTs. Among the 80 percent of execs who work on SCADA or industrial control systems and say their networks are connected to the Internet or another IP network, more than half say this generates an "unresolved security issue."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21553
PUBLISHED: 2021-08-03
Dell PowerScale OneFS versions 8.1.0-9.1.0 contain an Incorrect User Management vulnerability.under some specific conditions, this can allow the CompAdmin user to elevate privileges and break out of Compliance mode. This is a critical vulnerability and Dell recommends upgrading at the earliest.
CVE-2021-21562
PUBLISHED: 2021-08-03
Dell EMC PowerScale OneFS contains an untrusted search path vulnerability. This vulnerability allows a user with (ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE) and (ISI_PRIV_SYS_UPGRADE or ISI_PRIV_AUDIT) to provide an untrusted path which can lead to run resources that are not under the application...
CVE-2021-21563
PUBLISHED: 2021-08-03
Dell EMC PowerScale OneFS versions 8.1.2-9.1.0.x contain an Improper Check for Unusual or Exceptional Conditions in its auditing component.This can lead to an authenticated user with low-privileges to trigger a denial of service event.
CVE-2021-21565
PUBLISHED: 2021-08-03
Dell PowerScale OneFS versions 9.1.0.3 and earlier contain a denial of service vulnerability. SmartConnect had an error condition that may be triggered to loop, using CPU and potentially preventing other SmartConnect DNS responses.
CVE-2021-26085
PUBLISHED: 2021-08-03
Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.