Infrastructure Security in the Age of Ransomware

Stuxnet gave the world a grasp on how real and devastating cyber-security risks in critical infrastructures can be. In the era of industrial IoT and increasingly complex cyber-threats, attacks on public infrastructures, particularly in the energy sector, are becoming frequent.

Critical infrastructure such as electric and water utilities are being temporarily shut down as ransomware plagues corporate systems, causing hours of downtime. The health industry has also fallen victim to these cyber-extortion techniques.

What are the risks?

The risks go beyond operability, financial losses and credibility. Cyberattacks on industrial systems can cross the line into threatening human lives.

“Whether it’s a dam in Rye Brook, or our power grids, our financial institutions, our water systems, or our online networks, these parts of our infrastructure are at risk and are under assault like never before, and we need to do more about it,” US Senator Charles E. Schumer said after Iranian hackers breached the Bowman Avenue Dam near Rye Brook, New York and gained control of the floodgates.

Recently, a German nuclear power plant in Bavaria has admitted that its systems are riddled with malware. In 2015 a hacker managed to enter the systems of a nuclear power plant in South Korea.

However, securing vital systems from multiple attack vectors is a serious challenge that requires joint efforts from international organizations, the private sector, the civil society and, especially, governments. It also presents a set of unique difficulties.

Sophistication of attacks

Cyber-threats are expanding in every way - from attack frequency to scale, sophistication and impact severity. The rate of code vulnerabilities found in dated, internet-accessible software also shows no signs of abating.

"A wide variety of threats ranging from Advanced Persistent Threats (APT), to sophisticated and common malware [are] found in the ICS environment,” the ICS-CERT reports. “Other incidents in the water and commercial sectors involved Internet-facing systems with weak or default credentials."

For instance, Black Energy was a malware toolkit developed to infect Ukrainian power authorities. It overwrites system data to control manual functions such as modifying temperature controls and turning pumps on and off at wind turbines, power transmission grids, oil and gas pipelines. Its goal was to sabotage critical parts of an industrial control computer’s hard drive.

Crypto-ransomware that leverages clever engineering techniques is also on the rise. Almost 10% of ransomware-infected emails sent globally target German users, according to cybersecurity provider Bitdefender.

Compliance

As more IT systems running critical infrastructure organizations connect to the public Internet – such as Industrial Control Systems and SCADA applications – new laws and national cybersecurity strategies are becoming mandatory.

Infrastructure operators must apply state-of-the-art measures to prevent unauthorized access to their technical systems and secure them against data breaches and other incidents, including outside attacks. Otherwise, they can face fines of hundreds of thousands of dollars. But not all organizations are ready to comply -- their current spending may not meet the demands of the new regulations.

Over-Confidence

Despite the increasing number and severity of attacks targeting critical infrastructure, technology and security professionals remain confident in their cyber defenses, studies have shown.

Cyber forensics

Global security executives’ trust in their organization’s cyber preparedness is sometimes unfounded. As proof, most attacks in recent headline-grabbing security incidents were under way weeks or months before initial detection. More than once, the vectors for attack could not be determined because the systems lacked detection and monitoring capabilities. In other cases, engineers did not even know if the problem was caused by a cyber-attack.

Sharing information

Sharing network and defense information with other organizations in the same industry or a national or international agency is often the missing piece of the puzzle. Critical infrastructure operators often loathe disclosing information for fear of damaging their reputation or risk of punishment by the government. But operating in a silo does not help cybersecurity.

In a nutshell, businesses operating public or private infrastructures that want to enhance cyber-security can start by:

▪        Deploying anti-malware software where possible

▪        Preventing unauthorized access to secure locations

▪        Applying application whitelisting to prevent unauthorized applications from running

▪        Deploying a breach detection system

▪        Enabling a USB lockdown on all SCADA environments to stop malware from physically entering the environment

▪        Deploying basic security measures in between network segments, such as firewalls/IPS.

MacWorld

« Air Gapping Critical Process Control Networks
The Nation State Hack-Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

SANS Institute

SANS Institute

SANS is the most trusted and by far the largest source for information security training and security certification in the world.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

ThreatQuotient

ThreatQuotient

ThreatQuotient delivers an open and extensible threat intelligence platform to provide defenders the context, customization and collaboration needed for increased security effectiveness.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

Mindmajix Technologies

Mindmajix Technologies

Mindmajix is a live and interactive e-learning platform that offers professional online IT training in areas including cyber security.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

Qi An Xin (QAX)

Qi An Xin (QAX)

QAX is a listed company based in China, and a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions.

SplxAI

SplxAI

Our mission at SplxAI is to secure and safeguard GenAI-powered conversational apps by providing advanced security and pentesting solutions, so neither your organization nor your user base get harmed.