Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/7/2020
11:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

MITRE Engenuity Announces ATT&CK Evaluations for ICS Vendors

Evaluations to Focus on Malware Capable of Physical Damage

McLean, VA, and Bedford, MA, May 5, 2020 — MITRE’s foundation for public good, MITRE Engenuity, will conduct an ATT&CK® evaluation to assess industrial control system (ICS) cybersecurity vendors against the threat posed by Triton. This Russian-linked malware is one of the most disruptive and destructive types targeting critical infrastructure.

Triton has been used to compromise industrial systems across the globe, including oil and gas and electrical plants in the Middle East, Europe, and North America. Triton targets safety systems, preventing a response to a failure, hazard, or other unsafe conditions. Triton is one of the few known malware attacks in the ICS space capable of physical destruction.

The evaluations use ATT&CK for ICS, a MITRE-curated knowledge base of adversary tactics, techniques, and procedures based on known threats to industrial control systems. Announced in January 2020, ATT&CK for ICS provides common language to describe the tactics and techniques that cyber adversaries use when attacking the systems that operate some of the nation’s most critical infrastructures, including energy transmission and distribution plants, oil refineries, wastewater treatment facilities, and more.

“The ICS network detection landscape has changed rapidly in recent years, with the development of new solutions and improving technological approaches,” said Otis Alexander, the lead for ATT&CK Evaluations for ICS and an engineer focusing on ICS cybersecurity at MITRE. “The new ATT&CK Evaluations for ICS will offer an objective, independent assessment to help vendors improve their products.”

To approximate real-life threat conditions, ATT&CK Evaluations for ICS will use a realistic control system testbed. The testbed will represent elements of a Saudi petrochemical facility attacked by the Triton malware in 2017.

“A reliable and realistic test environment is crucial for meaningful evaluations,” said Frank Duff, who oversees ATT&CK Evaluations. “We will build a simulated control system, with physical components, to evaluate vendors’ products.”

This latest set of evaluations will be conducted by MITRE Engenuity, a non-profit tech foundation launched last November to collaborate with the private sector on complex public interest challenges, including securing and protecting industrial control systems that help keep America safe.

Cybersecurity vendors may apply for an evaluation via [email protected]. The evaluations are paid for by vendors and are intended to help vendors and end users better understand their product’s capabilities in relation to MITRE’s publicly accessible ATT&CK for ICS knowledge base. Results will be announced in early 2021. ATT&CK Evaluations do not provide scores, ranks, or endorsements.

 

About MITRE Engenuity

MITRE Engenuity is a non-profit tech foundation that collaborates with the private sector on challenges that require a public interest solution, like cybersecurity, infrastructure resilience, healthcare effectiveness, and next generation communications. www.mitre-engenuity.org

 

About MITRE ATT&CK

ATT&CK® was created by MITRE’s internal research program from its own data and operations. ATT&CK is entirely based on published, open source threat information. Increasingly, ATT&CK is driven by contributions from external sources.

 

 

Jordan Graham

Strategic External Communications Specialist

781-271-4817 direct

781-490-3362 mobile

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13768
PUBLISHED: 2020-06-04
In MiniShare before 1.4.2, there is a stack-based buffer overflow via an HTTP PUT request, which allows an attacker to achieve arbitrary code execution, a similar issue to CVE-2018-19861, CVE-2018-19862, and CVE-2019-17601. NOTE: this product is discontinued.
CVE-2020-13849
PUBLISHED: 2020-06-04
The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.
CVE-2020-13848
PUBLISHED: 2020-06-04
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
CVE-2020-11682
PUBLISHED: 2020-06-04
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request ...
CVE-2020-12847
PUBLISHED: 2020-06-04
Pydio Cells 2.0.4 web application offers an administrative console named “Cells Console� that is available to users with an administrator role. This console provides an administrator user with the possibility of changing several settings, including the applicat...