Page 110 - Cyber Defense eMagazine June 2020 Edition
P. 110

malware had major impacts on manufacturing companies like Merck, causing hundreds of millions of
            dollars in quarterly losses due to production downtime, in addition to loss of customer satisfaction due to
            missed shipments. After suffering a WannaCry attack across its worldwide network, A.P. Moller - Maersk,
            one of the world’s largest shipping conglomerates, lost communication with its OT network, shutting down
            entire ports.

            In another example, the digital systems at the smelting plants of Norsk Hydro, one of the world’s largest
            aluminum producers, were shut down after the firm was attacked by LockerGoga. Norsk Hydro reportedly
            lost $40 million because of the incident, and aluminum prices were driven to a three-month high.


            In order to mitigate these new threats, organizations must understand two major challenges to securing
            these environments and evolve their security strategies to secure and manage connected devices across
            both industrial and IT environments.




            Connected OT Devices are Un-Agentable

            The  growing  trend  in  manufacturing  and  industrial
            plants  is  to  connect  OT  devices  directly  to  the
            enterprise network. But one of the main challenges is
            that these devices often have no built-in security and
            cannot be protected with traditional security tools like
            agents  used  by  enterprise  security  teams.  These
            devices were not initially designed to be installed on
            the enterprise network, however, the convergence of
            IT and OT networks has made this a reality. Because
            these  devices  can’t  run  agent  software,  security
            teams have no visibility into whether device behavior
            is abnormal or malicious and could indicate a risk.



            OT Device Vulnerabilities Are Increasing

            While OT devices become more accessible to cyber attackers, they’re also increasingly vulnerable to
            attack. Based on ICS-CERT’s advisory page, which lists a large number of vendors that have disclosed
            vulnerabilities,  public  vulnerability  advisories  continue  to  increase  year  over  year.  There  were  204
            advisories in 2018, an increase of 25% compared to 2017. Over half of the ICS-related vulnerabilities
            reported in 2018 rated high in terms of severity level. These vulnerabilities exist in field devices, human-
            machine interface systems, and engineering workstation software.

            In  2019,  a  set  of  11  zero-day  vulnerabilities  was  discovered,  dubbed  Urgent11,  that    impact  seven
            common real-time operating systems, including VxWorks® by Wind River. These systems are widely
            used  by  SCADA  systems,  industrial  controllers,  firewalls,  routers,  satellite  modems,  VoIP  phones,
            printers,  and  many  other  devices.  Urgent11  could  allow  attackers  to  remotely  exploit  and  take  over
            mission-critical industrial devices, resulting in costly disruption of essential processes.




            Cyber Defense eMagazine –June 2020 Edition                                                                                                                                                                                                                         110
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   105   106   107   108   109   110   111   112   113   114   115