Page 44 - EE|Times Europe Magazine - December 2020
P. 44
44 EE|Times EUROPE
SECURITY
Real-Life Scenarios: How the Industrial
Cloud Gets Hacked
By Ann R. Thryft
id you know a TV remote can become eminently hackable Wi-Fi network, which Agency (NSA) and the U.S. Department of
a spying device by hijacking the may also have all kinds of unsecured IoT Homeland Security’s Cybersecurity and
infrared it uses to communicate with devices hanging off of it. Infrastructure Security Agency (CISA) issued
Da set-top box? And the news gets worse. Of all the vulner- a joint alert recommending immediate action
But who needs a remote when you can abilities in ICS revealed during the first half to protect internet-connected OT and ICS
just yell at your TV? The FBI says that’s not of this year, more than 70% systems against security
safe, either: Hackers can control a smart TV’s can be exploited remotely, breaches. Citing the recent
camera and microphone to remotely record according to an August cyberattack on Israel’s water
video and audio of whoever’s in the room, or report by cybersecurity systems, the agencies called
use the unsecured TV to get into your router provider Claroty. Moreover, for better protection of
and then your PC. remote code execution is civilian infrastructure and
Even a humble coffee maker can be hijacked possible with nearly half of OT assets critical to U.S.
and turned into a ransom-demanding them. security and defense.
machine. So can other unsecured IoT devices. Claroty analyzed a combi- The number of attacks
These sound like sci-fi scenarios, but nation of vulnerabilities on computers in ICS in the
they’re not. published in the National oil and gas industry, as well
Vulnerability Database as in building and auto-
VULNERABLE HOME OFFICE NETWORKS and ones mentioned in mation systems, increased
So how do your TVs, remotes, and coffee advisories issued by the Darktrace’s Justin Fier slightly during the first
machines relate to the industrial cloud or to Industrial Control Systems half of this year, according
you at work? You might think that remote Cyber Emergency Response Team (ICS-CERT). to a September report from Kaspersky. The
hacking of devices like these is a remote possi- Sectors most impacted by ICS-CERT vulner- report concluded, “Threats are becoming
bility — and anyway, you’re working at home, abilities were energy, critical manufacturing, more targeted and more focused and, as a
like millions of others around the globe due to and water and wastewater infrastructure. result, more varied and complex.” The main
Covid-19, so there’s no way this could possibly Most of the 26 that were discovered by sources are the internet, removable media,
affect your company’s enterprise network or Claroty’s own research team were found in and email.
the operational technology (OT) network or PLCs and engineering workstations. The Computers used in building automation
any industrial control systems (ICS). workstations especially are desirable targets, systems are potentially a hacker’s backdoor,
But you would be wrong. Very wrong. since they’re connected to the factory floor, since they’re often connected to corporate
Because you need to access that OT PLCs, and IT. networks, the internet, corporate email,
network or those ICS remotely from your domain controllers, and video surveillance
home office. ICS AND OT ATTACKS INCREASING systems. Their attack surface is larger than
Oops. Yes. Your home office. The one Attacks on ICS and OT have been on the rise ICS engineering workstations and similar to
with the potentially leaky third-party VPN for some time. In July, the situation became computers in the IT network.
(because IT hasn’t replaced it yet), and your critical enough that the U.S. National Security AI-driven cybersecurity company Dark-
trace has found thousands of devices using
various ICS protocols on systems — such as
HVAC and elevators — that enterprises didn’t
Loss of visibility
know were connected to their IT networks,
Justin Fier, director of cyber intelligence
1. New device introduced to 3. Lateral movement — Admin RDP 5. Successful ICS connections and analytics for Darktrace, told EE Times.
network connection to WinCC Server S7 and Modbus
July 8, 07:00 UTC July 8, 07:03 UTC July 8, 07:21 and 07:54 UTC That means IT-OT systems aren’t properly
segmented, creating security blind spots.
“With the pandemic, systems such as
building control are being accessed remotely
by engineers and other employees from their
home offices,” said Fier. Yet their personal
Wi-Fi networks may be vulnerable to hackers
2. Establish foothold — HTTPS 4. Internal reconnaissance — ICS port scanning
with self-signed certificate to ports 102 and 502 trying to get into the corporate network.
rare IP address July 8, 07:20–07:55 UTC
July 8, 07:01 UTC INVISIBLE, UNSECURED CONNECTIONS
As many security experts will tell you,
Improper segmentation between IT and OT systems can lead to highly unusual endpoint devices must be secure to reduce
connections to ICS protocols, as shown in this timeline of the main events of an industrial the entire network’s vulnerability to attacks.
sabotage incident at a food-processing organization. Increased IT/OT convergence creates The rise of unmanaged shadow industrial IoT
new blind spots on the network and sets up new pathways to disruption. (Source: Darktrace) (IIoT) devices is one of the biggest threats to
DECEMBER 2020 | www.eetimes.eu