Infrastructure Security in the Age of Ransomware

Stuxnet gave the world a grasp on how real and devastating cyber-security risks in critical infrastructures can be. In the era of industrial IoT and increasingly complex cyber-threats, attacks on public infrastructures, particularly in the energy sector, are becoming frequent.

Critical infrastructure such as electric and water utilities are being temporarily shut down as ransomware plagues corporate systems, causing hours of downtime. The health industry has also fallen victim to these cyber-extortion techniques.

What are the risks?

The risks go beyond operability, financial losses and credibility. Cyberattacks on industrial systems can cross the line into threatening human lives.

“Whether it’s a dam in Rye Brook, or our power grids, our financial institutions, our water systems, or our online networks, these parts of our infrastructure are at risk and are under assault like never before, and we need to do more about it,” US Senator Charles E. Schumer said after Iranian hackers breached the Bowman Avenue Dam near Rye Brook, New York and gained control of the floodgates.

Recently, a German nuclear power plant in Bavaria has admitted that its systems are riddled with malware. In 2015 a hacker managed to enter the systems of a nuclear power plant in South Korea.

However, securing vital systems from multiple attack vectors is a serious challenge that requires joint efforts from international organizations, the private sector, the civil society and, especially, governments. It also presents a set of unique difficulties.

Sophistication of attacks

Cyber-threats are expanding in every way - from attack frequency to scale, sophistication and impact severity. The rate of code vulnerabilities found in dated, internet-accessible software also shows no signs of abating.

"A wide variety of threats ranging from Advanced Persistent Threats (APT), to sophisticated and common malware [are] found in the ICS environment,” the ICS-CERT reports. “Other incidents in the water and commercial sectors involved Internet-facing systems with weak or default credentials."

For instance, Black Energy was a malware toolkit developed to infect Ukrainian power authorities. It overwrites system data to control manual functions such as modifying temperature controls and turning pumps on and off at wind turbines, power transmission grids, oil and gas pipelines. Its goal was to sabotage critical parts of an industrial control computer’s hard drive.

Crypto-ransomware that leverages clever engineering techniques is also on the rise. Almost 10% of ransomware-infected emails sent globally target German users, according to cybersecurity provider Bitdefender.

Compliance

As more IT systems running critical infrastructure organizations connect to the public Internet – such as Industrial Control Systems and SCADA applications – new laws and national cybersecurity strategies are becoming mandatory.

Infrastructure operators must apply state-of-the-art measures to prevent unauthorized access to their technical systems and secure them against data breaches and other incidents, including outside attacks. Otherwise, they can face fines of hundreds of thousands of dollars. But not all organizations are ready to comply -- their current spending may not meet the demands of the new regulations.

Over-Confidence

Despite the increasing number and severity of attacks targeting critical infrastructure, technology and security professionals remain confident in their cyber defenses, studies have shown.

Cyber forensics

Global security executives’ trust in their organization’s cyber preparedness is sometimes unfounded. As proof, most attacks in recent headline-grabbing security incidents were under way weeks or months before initial detection. More than once, the vectors for attack could not be determined because the systems lacked detection and monitoring capabilities. In other cases, engineers did not even know if the problem was caused by a cyber-attack.

Sharing information

Sharing network and defense information with other organizations in the same industry or a national or international agency is often the missing piece of the puzzle. Critical infrastructure operators often loathe disclosing information for fear of damaging their reputation or risk of punishment by the government. But operating in a silo does not help cybersecurity.

In a nutshell, businesses operating public or private infrastructures that want to enhance cyber-security can start by:

▪        Deploying anti-malware software where possible

▪        Preventing unauthorized access to secure locations

▪        Applying application whitelisting to prevent unauthorized applications from running

▪        Deploying a breach detection system

▪        Enabling a USB lockdown on all SCADA environments to stop malware from physically entering the environment

▪        Deploying basic security measures in between network segments, such as firewalls/IPS.

MacWorld

« Air Gapping Critical Process Control Networks
The Nation State Hack-Attack »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

Labris Networks

Labris Networks

Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

IOTA Foundation

IOTA Foundation

The IOTA Foundation is a non-profit R&D organisation focused on developing the next generation of protocols for the connected world.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

Quantum Xchange

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

TempoCap

TempoCap

TempoCap is a European growth-stage technology fund with offices in London and Berlin. We invest across a variety of high- growth sectors including cybersecurity.

Harbottle & Lewis

Harbottle & Lewis

Harbottle & Lewis is a leading UK-based law firm focused on the Private Client and Technology, Media and Entertainment sectors.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.

NewEvol

NewEvol

Don’t React, Evolve! Outsmart threats with real-time AI-powered dynamic defense capability of NewEvol all-in-one cybersecurity platform.

RedSense

RedSense

RedSense provides industry-leading threat intelligence services, adversary space interaction & monitoring, net flow monitoring and interpretation for our clients.