Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/17/2016
07:30 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Ransomware, SCADA Access As a Service Emerging Threats For ICS Operators, Report Says

With attacks against industrial control networks increasing so too have the challenges, Booz Allen Hamilton says.

Ransomware and services that sell access to Supervisory Control and Data Acquisition (SCADA) systems are quickly emerging as new challenges for operators of industrial control systems (ICS), management consulting firm Booz Allen Hamilton warned in a report released this week.

Booz Allen’s report is based on a review of publicly available information on threats targeting ICS operators and also a detailed analysis of 295 ICS incidents that the US Department of Homeland Security responded to in 2015.

The analysis showed, somewhat unsurprisingly, that attacks against ICS operators are increasing. Nation state actors and criminal groups combined to make FY 2015 the most eventful year from a security standpoint, for ICS operators ever. The 295 incidents that DHS responded in 2015 represented a 15 percent increase over the previous year. Exacerbating the trend was the increasingly lower barrier to entry for threat actors seeking to target industrial control systems.

The energy sector, as usual, was heavily targeted and accounted for 16 percent or 46 of the 295 incidents. But for the first time, organizations in the critical manufacturing sector, such as transportation equipment manufacturers, electrical equipment and component makers and primary metals manufacturers, experienced even more incidents.

Booz Allen counted a total of 97 incidents against such organization last year, or 33 percent of the total number of incidents. The report attributed the increase to a single malicious campaign involving the use of targeted spearphishing to distribute malware. Spearphishing campaigns, as an initial attack vector against ICS operators jumped dramatically from 42 reported incidents in 2014 to 109 in 2015, a 160 percent increase in 12 months.

Only 12 percent of the security incidents that the DHS responded to last year involved a compromise of the actual operational technology (OT) network. All of the others involved attacks against the network perimeter or the enterprise network.

Attacks against OT networks are considered far more serious than attacks on the corporate network. Threat actors who gain access to systems controlling critical operations have the ability to wreak physical damage, like opening the sluice gates in a dam or causing a component to constantly cycle on and off till it burns out.

Attacks against the corporate network, which constituted the vast majority of the incidents that the DHS responded to last year, are less pressing but serious all the same.

“In these cases, we can assume that the attacks are carried out against the enterprise network with a view to moving laterally, or into the operational network,” says Scott Stables, director of industrial security, at Booz Allen Hamilton in comments to Dark Reading. “The logical starting point for an attack on ICS is often through the enterprise or corporate network,” he said.

Among the several emerging challenges for owners of industrial control systems identified in the report are ransomware and the emergence of SCADA access as a service. Booz Allen defines SCADA access services as entities that specialize in finding zero-day flaws in industrial control networks, developing exploits for them and then selling that as a service to those interested in gaining unauthorized access to third-party ICS networks.

Many of those selling these services are security research firms like Hacking Team of Italy and Vupen Security of France. Such firms have developed entire business models around selling this kind of access mostly to governments law enforcement and intelligence agencies. “They are essentially security researchers that find vulnerabilities, develop exploits, and sell the methods of access for those compromised networks,” Stables says.

“The French and Italian firms are not providing access as a service for the OT environment, but have already established access-as-a-service as a business model for selling access to enterprise networks.”

At least one known criminal using the handle Bonito, who has been associated with big data dumps involving PII and healthcare data, has also been seen offering SCADA-related access controls, Stables added.

Meanwhile, the enterprise networks of at least three utility companies were hit with ransomware and had to be temporarily shut down. So far, there have been no reliable reports where an operational network has been impacted by ransomware. But there is at least one potential incident involving a UK-based utility that had to shut down its operational network because of ransomware. The report about the incident was not conclusive enough to include in Booz Allen’s overall threat briefing, Stables says.

Related stories

 

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He's too shy to invite me out face to face!"
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16680
PUBLISHED: 2019-09-21
An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.
CVE-2019-16681
PUBLISHED: 2019-09-21
The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to file disclosure and XSS.
CVE-2019-16677
PUBLISHED: 2019-09-21
An issue was discovered in idreamsoft iCMS V7.0. admincp.php?app=members&do=del allows CSRF.
CVE-2019-16678
PUBLISHED: 2019-09-21
admin/urlrule/add.html in YzmCMS 5.3 allows CSRF with a resultant denial of service by adding a superseding route.
CVE-2019-16679
PUBLISHED: 2019-09-21
Gila CMS before 1.11.1 allows admin/fm/?f=../ directory traversal, leading to Local File Inclusion.