Cadastre-se agora para um orçamento mais personalizado!

NSA and CISA: Here's how hackers are going after critical systems, and what you need to do about it

23 de setembro de 2022 Hi-network.com
Image: Getty Images

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued an advisory explaining how to thwart cyberattacks on operational technology (OT) and industrial control system (ICS) assets. 

The new joint advisory outlines what critical infrastructure operators should know about their opponents, citing recent cyberattacks on Ukraine's energy grid and the ransomware attack against a fuel distribution pipeline.  

There are heightened fears that Russia's invasion of Ukraine and related cyberattacks against Ukraine could spread to Western critical infrastructure targets. CISA earlier this year warned that attackers had built custom tools to gain control of ICS and SCADA devices from major manufacturers. 

Featured

  • New iPhone 15 Pro overheating reports: Still too hot after iOS 17.0.3 and fresh issues arise after the update
  • Generative AI will far surpass what ChatGPT can do. Here's everything on how the tech advances
  • iPhone 15 Pro review: Prepare to be dazzled
  • The best USB-C cables for the iPhone 15: What the experts recommend

NSA and CISA's document "Control System Defense: Know the Opponent" explains that advanced persistent threats groups, both criminal and state-sponsored, target OT/ICS for political gain, economic advantages, or destructive effects. 

Also:FBI and NSA say: Stop doing these 10 things to let hackers in

The most dire consequences of these attacks include loss of life, property damage, and a breakdown of national critical functions, but there's a whole lot of disruption and mayhem that can happen before those extreme scenarios. 

"Owners and operators of these systems need to fully understand the threats coming from state-sponsored actors and cybercriminals to best defend against them," NSA control systems defense expert Michael Dransfield said Thursday. "We're exposing the malicious actors' playbook so that we can harden our systems and prevent their next attempt."

As the agencies note, designs for OT/ICS devices that include vulnerable IT components are publicly available.   

"In addition, a multitude of tools are readily available to exploit IT and OT systems. As a result of these factors, malicious cyber actors present an increasing risk to ICS networks," NSA and CISA noted in the advisory. 

They're also worried that newer ICS devices incorporate internet or network connectivity for remote control and operations, which increases their attack surface.

The attackers' "game plan" for OT/ICS intrusions includes detailed descriptions of how attackers pick a target, collect intelligence, develop tools and techniques to navigate and manipulate systems, gain initial access, and execute tools and techniques at critical infrastructure targets.

Also: NSA report: This is how you should be securing your network

When weighing mitigations, the NSA wants operators to be more aware of the risks when deciding, for example, what information about their systems needs to be publicly available. It also wants operators to assume their systemisbeing targeted rather than simply that it could be. The NSA offers simple mitigation strategies operators can choose if they experience "choice paralysis" or become befuddled by the array of security solutions available.

These strategies include limiting public exposure of system hardware, firmware and software information, and information emitted from the system. Operators should create an inventory of remote access points and secure them, restrict scripts and tools to legitimate users and tasks, conduct regular security audits, and implement a dynamic rather than static network environment.  

On the last point, the agencies note: "While it may be unrealistic for the administrators of many OT/ICS environments to make regular non-critical changes, owner/operators should consider periodically making manageable network changes. A little change can go a long way to disrupt previously obtained access by a malicious actor."

The advisory builds upon two recent advisories. The NSA released an advisory this year about stopping malicious attacks on OT, but this was aimed at the US government and defense. NSA and CISA released an advisory to reduce exposure across all OT and ICS systems.

The US government has issued multiple warnings about cyberattacks on critical infrastructure. In March, warning against possible cyberattacks from Russia, US President Joe Biden stressed that most critical infrastructure was operated by the private sector. In April, national cybersecurity agencies warned about attacks on critical infrastructure. More recently, NSA warned that exploitation of IT systems connected to OT can "serve as a pivot to OT destructive effects." 

Security

8 habits of highly secure remote workersHow to find and remove spyware from your phoneThe best VPN services: How do the top 5 compare?How to find out if you are involved in a data breach -- and what to do next
  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next

tag-icon Tags quentes : Tecnologia Segurança

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.