Hacking

Industrial Sector ICSs under attack – Kaspersky Lab’s ICS-CERT

The report shows a disconcerting reality, the number of targeted attacks on the ICSs deployed in the Industrial sector continues to increase.

The Kaspersky Lab’s ICS-CERT has published a report on the threat landscape for industrial automation systems (ICSs) related to second half of 2016.

The report shows a disconcerting reality, the number of targeted attacks on the Industrial sector continues to increase.

On average, in the second half of 2016, the security solutions deployed by Kaspersky Lab across the globe blocked attempted attacks on 39.2% of protected computers being part of industrial enterprise technology infrastructure.

The targeted systems include machines running Windows OS and performing the following functions:

  • Supervisory Control and Data Acquisition (SCADA) servers.
  • Data storage servers (Historian).
  • Data gateways (OPC).
  • Stationary engineer and operator workstations.
  • Mobile engineer and operator workstations.
  • Human Machine Interface (HMI).

Every month, an average of 20.1% of industrial computers is hit by malware, the most used attack vectors are known malicious and phishing web resources (22%), removable media (11%) and email (8%).

The devices typically used by network administrators, developers and contractors are more exposed to cyber attacks because they are often freely connected to the Internet.

At the same time, stationary workstations on the operational network (OT) are more secure because they don’t typically have an always-on Internet connection.

Top 15 countries based on the percentage of industrial computers attacked are Vietnam, Algeria, Morocco, Tunisia, Indonesia, Bangladesh, Kazakhstan, Iran, China, Peru, Chile, India, Egypt, Mexico, and Turkey. According to Kaspersky, Western European countries and the US are less targeted by hackers.

Attackers leverage on both custom malware leveraging on zero-day exploits and widely available malicious codes to targeted ICS.

In the second half of 2016, Kaspersky detected about 20,000 different samples of malware representing over 2,000 different malware families. In most cases, they weren’t specifically designed to infect industrial automation systems. These malicious codes detected by Kaspersky include Trojan spies, financial malware, ransomware (including encrypting ransomware), backdoors and Wipers (KillDisk).

“Remarkably, there is very little difference between the rankings of malware detected on industrial computers and those of malware detected on corporate computers. We believe that this demonstrates the absence of significant differences between computers on corporate networks and those on industrial networks in terms of the risk of chance infections. However, it is obvious that even a chance infection on an industrial network can lead to dangerous consequences.” reads the report.

Industrial companies continued to be victims of spear phishing campaigns, the Kaspersky Lab ICS-CERT detected a series of spear phishing attacks which began in June 2016 and that according to the experts are still active. The attacks target primarily industrial companies – metallurgical, electric power, construction,

“The attacks target primarily industrial companies – metallurgical, electric power, construction, engineering and others. We estimate the number of companies attacked at over 500 in more than 50 countries around the world” reads the report issued by Kaspersky. “In all the cases that we have analyzed, phishing emails were sent on behalf of various supplier companies, customers, commercial organizations and delivery services, and contained offers to view updated pricelists, requests to check invoice information, review product prices, resend a supposedly damaged file or receive goods listed in a consignment note.”

The attackers use to compromise corporate mail servers with spyware designed to steal account credentials, then exploit them to send out the spear phishing messages.

The weaponized documents used in the campaigns embedded RAT and backdoors, such as ZeuS, Pony/FareIT, Luminosity RAT, NetWire RAT, HawkEye, and ISR Stealer.

The hackers packed the above malware using VB and MSIL packers that were customized for the specific campaigns.

The researchers at Kaspersky identified multiple vulnerabilities in ICSs in the last year, they reported 75 flaws, including 58 rated highly critical.

Analyzing the type of the flaws, we can see that the vast majority is DoS flaws (45), followed by RCE (16) and file manipulation issue (10).

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – ICSs, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…

1 hour ago

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

14 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

16 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

1 day ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

1 day ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

This website uses cookies.