Page 45 - EE|Times Europe Magazine - December 2020
P. 45

EE|Times EUROPE   45

                                                    Real-Life Scenarios: How the Industrial Cloud Gets Hacked



        Organizations suffering security incidents in the last year
                                                                      British security software and hardware company
               Malware                              34%               Sophos found that among organizations suffering a
                                                                      cyberattack in the cloud, the breakdown of attack types
            Exposed Data                       29%                    reads like the usual suspects: 50% of organizations
                                                                      were hit by malware of some form, including ran-
            Ransomware                       28%                      somware (respondents could select multiple options).
                                                                      (Source: Sophos, “The State of Cloud Security 2020”)
                Account
            Compromise                    25%
            Cryptojacking          17%
                     0%               20%               40%               60%                80%              100%
        Has your organization suffered a public cloud security incident in the last 12 months? Based on 3,521 respondents


        cloud-connected industrial networks,    devices,” Ordr CEO Greg Murphy said in a   •  The epic Twitter hacks last spring started
        as Fier noted. But so are shadow consumer   statement.                     with phone spear-phishing, convincing
        IoT devices.                          One step in the right direction may be the   employees to hand over credentials that
          These are network-attached devices   IoT Cybersecurity Improvement Act, passed   gave hackers access to internal systems.
        unknown to, and therefore invisible to, IT and   in September by the U.S. House of Represen-  But even if employees are well-trained in
        security teams. Ordr, a provider of security   tatives. The bill aims to improve IoT device   security habits and network-attached devices
        products for enterprise IoT and unmanaged   security by requiring the National Institute of   are visible and secured, attackers can exploit
        devices, has found more than 5 million   Standards and Technology (NIST) to develop   other possible avenues.
        unmanaged IoT and internet of medical   recommendations for the secure develop-  The big jump in workforce identities
        things (IoMT) devices connected to customer   ment, identity management, patching, and   — employees, contractors, suppliers, com-
        networks, including health care, life sciences,   configuration management of IoT products. If   puters, devices, and applications — is
        retail, and manufacturing deployments.   it’s signed into law, federal government agen-  part of the problem: Their sheer number
                                            cies would only be able to buy IoT products   makes them, and their access privileges, dif-
                                            compliant with those recommendations, and   ficult to manage. Yet they’re often the source
        Disgruntled or otherwise            NIST would have to publish guidance on the   of breaches.
                                                                                  In a May 2020 survey of IT security and
        compromised employees               coordinated vulnerability disclosure process.   identity decision-makers, the Identity
                                              Another is the launch in October of the
        may be less common threats          Consumer Internet of Things Vulnerabil-  Defined Security Alliance (IDSA) found that
        than external nation-state or       ity Disclosure Platform by the IoT Security   automation, DevOps, and the expansion of
                                                                                enterprise-connected devices have driven a
                                            Foundation (IoTSF). Its goals are to “help
        criminal attackers — but all it     consumer IoT manufacturers manage the   dramatic growth in these identities. As many
                                            process of vulnerability reporting, man-
                                                                                as 94% said they’d had an identity-related
        takes is one to spark a major       agement, and coordinated vulnerability   breach in the past; 99% said those breaches
        security disaster.                  disclosure, make it easier for security   were preventable. But less than half have
                                            researchers and users to report vulnera-
                                                                                fully implemented key identity-defined prac-
                                            bilities to IoT manufacturers, and improve   tices recommended by the IDSA.
                                            consumer IoT security,” according to the   In particular, third-party suppliers
          These devices aren’t designed for security   website. Although vulnerability reporting is   and contractors can be an avenue of intru-
        and are often bought by individuals or teams   widely considered to be a basic requirement   sion, either maliciously or accidentally.
        not subject to IT approval. Examples are   of IoT device security, it’s still a new idea for   BlueVoyant’s global study of third-party
        network-accessible IP security cameras —    most consumer IoT device makers.  cyber risk management found 80% of orga-
        regularly breached by hackers — and badge                               nizations had experienced a cybersecurity
        readers, both purchased by building mainte-  THE THIRD-PARTY PROBLEM    breach caused by vendor ecosystem vulnera-
        nance staff.                        Disgruntled or otherwise compromised   bilities in the past 12 months, while less than
          According to Ordr’s “2020 Enterprise    employees may be less common threats than   a quarter monitor their entire supply chain,
        IoT Adoption & Risk Report,” even    external nation-state or criminal attack-  and nearly a third can’t determine whether a
        consumer-grade shadow IoT devices such as   ers — but all it takes is one to spark a major   third-party vendor is a cyber risk. While the
        Amazon Alexa and Echo virtual assistants   security disaster:           manufacturing sector had a lower third-party
        were frequently discovered attached to net-  •  A former Cisco engineer deactivated more   breach rate, it was still 57%.
        works. So were a Tesla and a Peloton exercise   than 16,000 WebEx Teams accounts for   As the Kaspersky report noted, the same
        machine. In some health-care companies,   two weeks, costing Cisco US$1.4 million   building automation systems that may have
        employees were running YouTube and Face-  in employee time to fix the problem, plus   shadow IoT attached are often owned or
        book applications on MRI and CT machines,   US$1 million in customer refunds.  at least managed by third-party contrac-
        which often use legacy, unsupported operat-  •  Russian hackers failed to recruit a Tesla   tors. Even when they’re allowed access to a
        ing systems.                           employee to install malware on the com-  customer’s corporate network, that access
          “We found a staggering number of vul-  pany’s enterprise network, Elon Musk   may not be controlled by the customer’s IT
        nerabilities and risks concerning connected   confirmed in a tweet.     security team. “Given that the decrease in

                                                                                   www.eetimes.eu | DECEMBER 2020
   40   41   42   43   44   45   46   47   48   49   50