Increasing Cyber Attacks On Critical Infrastructure

In the digital world, we’re no longer restricted by borders for business collaboration, but this electronic freedom is also increasing the number and scale of cyberattacks and offers massive potential for cyber criminals to deliver ransomware. 

Cyber attacks don't just affect the virtual world; they can have concerning real-world consequences for everyone, and a recent incident seemingly involving a near miss has demonstrated just how disruptive they can be.

Critical infrastructure systems like those driving power generation, water treatment, electricity production and other platforms are interconnected to form the energy “grid”. Although beneficial to the public this grid is vulnerable to cyber attack by "hacktivists" or terrorists.

When Russia launched its failed invasion of Ukraine  a year ago, the number of online attacks against targets in Ukraine or with links to the country simultaneously began to skyrocket, according to Oleksandr Potii, the deputy chairman of Ukraine’s Special Communication and Information Protection Service. Ukrainian authorities later traced most of those cyber attacks back to state actors with ties to Moscow, Potii said. "While some of the attacks were performed by cyber criminals, they were often still coordinated by special services."

Critical infrastructure, like power generation and distribution, is becoming more complex and reliant on networks of connected devices. Just decades ago, power grids and other critical infrastructure operated in isolation. Now they are far more interconnected, both in terms of geography and across sectors.

If the critical infrastructure is disrupted, the impact is significant. In some cases, such cyber attacks on critical infrastructure have become another means of modern warfare. But unlike classic warfare, in these conflicts civilians and businesses are in the front line and become the targets.

Just a handful of recent prominent examples include North Korea attempting to hack the SWIFT network to steal more than $1 billion. Not to mention the infamous Colonial Pipeline attack, which has become the poster child of critical infrastructure attacks.

Yet the goal of the attacks could vary. While some are indeed a way to prepare for future conflicts by testing capabilities and defences, others might be motivated by financial gains, an attempt to steal data, gaining remote access or control, or disrupting and destructing services.

How Critical Infrastructure is Attacked

There are a few types of attacks used on critical infrastructure. The main ones are DDOS, ransomware (through spear phishing), vulnerability exploitation, and supply chain attacks. Some of these techniques are harder to stop because they target humans and not technologies.

Supply chain attacks are a key way to attack critical infrastructure. Just like bombings in WW2 targeted factories that provided supplies to the military, supply chain cyber attacks target the nation's critical infrastructure suppliers.

How to Protect Critical Infrastructure

One of the misconceptions of cyber security is that the more security products are employed, the better the security. But layered security that is made up of too many products could be counter-productive.

The Role of CISA

The potential severity of attacks on critical infrastructure has driven nations to establish a cyber defence organisation to defend their critical assets, and prepare for conflicts. The US Cybersecurity and Infrastructure Security Agency (CISA)  is the natioanal  risk advisor. They provide support and strategic assistance to the critical infrastructure sectors, with a focus on Federal network protection. By partnering with private sector partners and the academy, they are able to provide proactive cyber protection.

Some of the key areas CISA focus on are coordinating and communicating cyber incident information and response to provide support, securing the dot-gov domain, assisting in protecting the dot-comdomain to help the private sector, assisting in securing critical infrastructure, and painting a common operational picture for cyberspace.

One of the programs CISA is leading is the Cybersecurity Advisor Program which provides education and training for cyber security awareness.

The advisors can help organisations by evaluating critical infrastructure cyber risk, encouraging best practices and risk mitigation strategies, initiating, developing capacity and supporting cyber communities and working groups, raising awareness, collecting stakeholder requirements and bringing incident support and the lessons learned.

DW:   Cato Networks:   Hacker News:    AGCS Allianz:     MakeUseOf:    ZDNet

You Might Also Read: 

Resilience Is Essential To Protecting Critical Infrastructure:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Britain's National Cyber Force Reveals Its Operating Doctrine
Criminal Records Office Hit By A "Cyber Incident” »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO CCDCOE's mission is to enhance the capability, cooperation and information sharing among NATO, NATO nations and partners in cyber defence.

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

ENEA Qosmos Division

ENEA Qosmos Division

Qosmos, a division of Enea, leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures.

Matias Consulting Group (MCG)

Matias Consulting Group (MCG)

Your Business needs competitive and resilient ICT solutions. MCG defines, deploy & support them enabling you to focus on your core business.

SlowMist

SlowMist

SlowMist is a blockchain ecosystem security company providing cybersecurity audits and protection for leading digital asset exchanges, crypto wallets, public chains, and smart contracts.

Asia Center of Excellence for Smart Technologies (ACES)

Asia Center of Excellence for Smart Technologies (ACES)

ACES is a one-stop competency center and incubator for the development of Industry 4.0 and associated technologies including cybersecurity, robotics, IoT and Big Data.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

MalwareFox

MalwareFox

MalwareFox is an advanced, yet simple-to-use anti-malware solution for Windows computers. We provide aggressive detection capabilities and an effective malware removal tool to keep your systems safe.

National Security Services Group (NSSG)

National Security Services Group (NSSG)

National Security Services Group (NSSG) is Oman's leading and only proprietary Cybersecurity consultancy firm and Managed Security Services Provider.

InterSec Inc.

InterSec Inc.

InterSec Inc. is a cybersecurity company that offers a variety of services to small and medium-sized businesses including CMMC Compliance, Program Management, Governance, & Cybersecurity.

Anzen Technology Systems

Anzen Technology Systems

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.

ReformIT

ReformIT

ReformIT is a Managed IT Service and Security provider with many years experience helping companies find the right IT solutions to meet the needs of their businesses.