Hacking

Industrial Sector ICSs under attack – Kaspersky Lab’s ICS-CERT

The report shows a disconcerting reality, the number of targeted attacks on the ICSs deployed in the Industrial sector continues to increase.

The Kaspersky Lab’s ICS-CERT has published a report on the threat landscape for industrial automation systems (ICSs) related to second half of 2016.

The report shows a disconcerting reality, the number of targeted attacks on the Industrial sector continues to increase.

On average, in the second half of 2016, the security solutions deployed by Kaspersky Lab across the globe blocked attempted attacks on 39.2% of protected computers being part of industrial enterprise technology infrastructure.

The targeted systems include machines running Windows OS and performing the following functions:

  • Supervisory Control and Data Acquisition (SCADA) servers.
  • Data storage servers (Historian).
  • Data gateways (OPC).
  • Stationary engineer and operator workstations.
  • Mobile engineer and operator workstations.
  • Human Machine Interface (HMI).

Every month, an average of 20.1% of industrial computers is hit by malware, the most used attack vectors are known malicious and phishing web resources (22%), removable media (11%) and email (8%).

The devices typically used by network administrators, developers and contractors are more exposed to cyber attacks because they are often freely connected to the Internet.

At the same time, stationary workstations on the operational network (OT) are more secure because they don’t typically have an always-on Internet connection.

Top 15 countries based on the percentage of industrial computers attacked are Vietnam, Algeria, Morocco, Tunisia, Indonesia, Bangladesh, Kazakhstan, Iran, China, Peru, Chile, India, Egypt, Mexico, and Turkey. According to Kaspersky, Western European countries and the US are less targeted by hackers.

Attackers leverage on both custom malware leveraging on zero-day exploits and widely available malicious codes to targeted ICS.

In the second half of 2016, Kaspersky detected about 20,000 different samples of malware representing over 2,000 different malware families. In most cases, they weren’t specifically designed to infect industrial automation systems. These malicious codes detected by Kaspersky include Trojan spies, financial malware, ransomware (including encrypting ransomware), backdoors and Wipers (KillDisk).

“Remarkably, there is very little difference between the rankings of malware detected on industrial computers and those of malware detected on corporate computers. We believe that this demonstrates the absence of significant differences between computers on corporate networks and those on industrial networks in terms of the risk of chance infections. However, it is obvious that even a chance infection on an industrial network can lead to dangerous consequences.” reads the report.

Industrial companies continued to be victims of spear phishing campaigns, the Kaspersky Lab ICS-CERT detected a series of spear phishing attacks which began in June 2016 and that according to the experts are still active. The attacks target primarily industrial companies – metallurgical, electric power, construction,

“The attacks target primarily industrial companies – metallurgical, electric power, construction, engineering and others. We estimate the number of companies attacked at over 500 in more than 50 countries around the world” reads the report issued by Kaspersky. “In all the cases that we have analyzed, phishing emails were sent on behalf of various supplier companies, customers, commercial organizations and delivery services, and contained offers to view updated pricelists, requests to check invoice information, review product prices, resend a supposedly damaged file or receive goods listed in a consignment note.”

The attackers use to compromise corporate mail servers with spyware designed to steal account credentials, then exploit them to send out the spear phishing messages.

The weaponized documents used in the campaigns embedded RAT and backdoors, such as ZeuS, Pony/FareIT, Luminosity RAT, NetWire RAT, HawkEye, and ISR Stealer.

The hackers packed the above malware using VB and MSIL packers that were customized for the specific campaigns.

The researchers at Kaspersky identified multiple vulnerabilities in ICSs in the last year, they reported 75 flaws, including 58 rated highly critical.

Analyzing the type of the flaws, we can see that the vast majority is DoS flaws (45), followed by RCE (16) and file manipulation issue (10).

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – ICSs, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Chinese cyber spies targeted phones used by Trump and Vance

China-linked threat actors targeted the phone communications of Donald Trump and vice presidential nominee JD Vance.…

8 hours ago

Irish Data Protection Commission fined LinkedIn €310M for GDPR infringement

Irish Data Protection Commission fined LinkedIn €310M for violating user privacy by using behavioral data…

16 hours ago

Change Healthcare data breach impacted over 100 million people

The Change Healthcare data breach in the February 2024 impacted over 100 million, the largest-ever…

1 day ago

OnePoint Patient Care data breach impacted 795916 individuals

US hospice pharmacy OnePoint Patient Care suffered a data breach that exposed the personal info…

1 day ago

From Risk Assessment to Action: Improving Your DLP Response

DLP is key in cybersecurity; a risk assessment identifies data risks, helping turn findings into…

2 days ago

U.S. CISA adds Cisco ASA and FTD, and RoundCube Webmail bugs to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Cisco ASA and FTD, and RoundCube Webmail bugs…

2 days ago

This website uses cookies.