• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Technology Security

Understanding threat actors’ steps into OT and ICS environments

Keith Walsh by Keith Walsh
October 18, 2022
Photo by ThisIsEngineering: https://www.pexels.com/photo/photo-of-female-engineer-looking-through-wires-3862623/

Photo by ThisIsEngineering: https://www.pexels.com/photo/photo-of-female-engineer-looking-through-wires-3862623/

“To know your enemy, you must become your enemy.” Sun Tzu, regarded as one of the greatest military strategists of all time, certainly did not live in the hyper-connected and cyberthreat-laden times of today, but we would all benefit from some of his more profound teachings. And it seems some of his teachings have made their way into the planning of cybersecurity strategies.

The increasing frequency of OT/ICS cyberattacks is serving as a wake-up call to organisations. Cybercriminals are using a range of techniques to launch a tsunami of attacks against OT and ICS systems.

The impact of these attacks can affect the masses by causing civic unrest, and governments in some countries are taking pre-emptive measures to stop these attacks.

For instance, the Cyber Security Agency of Singapore (CSA) created the OT Cybersecurity Masterplan in 2019 to enhance the security and resilience of the nation’s Critical Information Infrastructure (CII) sectors in delivering essential services.

Its goal was to improve cross-sector response to mitigate cyber threats in the OT environment and to strengthen partnerships with industry and stakeholders, proving that the threat of OT/ICS attacks is imposing enough for governments to act before they happen.

 In today’s manufacturing and utility networks, feeble defences across assets, managed and unmanaged devices give adversaries the advantage to launch attacks.

Without direct action to harden OT networks and control systems against vulnerabilities introduced through IT and business network intrusions, OT system owners and operators will remain at indefensible levels of risk.

An example is Iran suffering a major attack on its fuel stations nationwide in 2021, which disabled a system that allowed millions of Iranians to use government-issued cards for fuel at a subsidised price.

In total, 4,300 fuel stations were victims of the attack with traffic in cities being widely affected in an attempt to get “people angry by creating disorder and disruption”, according to Iranian president Ebrahim Raisi.

Similarly, petroleum powerhouse Oil India suffered a cyberattack disrupting the company’s operations in Assam earlier in 2022. In the attack, they received a ransom demand of USD 7,500,000, disrupting business through its IT systems.

The company reported huge financial losses due to the attack. When securing against today’s cyber threats, it is important to understand the game plans of threat actors and proactively counteract them with solutions.

Let’s start with Sun Tzu to understand our enemy’s 5 steps into our ICS and OT environments:

1. Effects and targets: 

APT actors, or state-sponsored actors, are looking to create chaos, sow discord, or destabilisation of leadership. To do so, they typically vet out critical assets within critical infrastructure like controllers in marine ports, energy generation/distribution points, and highly visible targets where disruption may cause harm, distrust, or may psychologically or socially impact a community.

Conversely, cybercriminals are looking for a payoff and are more than happy to find high-value targets anywhere within an organisation to extort their owners. While there may have been a wide gap in the past, the skills, backing, and training between the two are narrowing.

WHAT TO DO: Define your critical protection surfaces. Not all systems and components are created equal. Begin by identifying the most critical surfaces and grow to incorporate additional surfaces over time.

Within OT, this may be a bank of Windows machines that allow for remote access into a PLC segment where third-party lateral connections are established for maintenance and support. Within IT, these may be north-south assets that allow for pivoting from IT into OT, especially if IT connections to the Internet are present.

2. Intelligence collecting on the target system: 

It is widely known that information about both OT systems and IT technologies is widely known. Publicly available documentation on both IT and OT systems and components are not hidden, including default admin credentials.

WHAT TO DO: Never allow for default admin credentials to reside on any asset and continually rotate passwords.

3. Developing techniques and tools: 

Adversaries can be quite resourceful, especially with readily available tools on the dark web. Presuming devices are secured because they run proprietary protocols is a zero-sum game as tools are readily available to exploit IT and OT systems.

APT actors have also developed tools to scan for, compromise, and control certain Schneider Electric PLCs, OMRON Sysmac NEX PLCs, and Open Platform Communications Unified Architecture (OPC UA) servers.

WHAT TO DO: Acknowledge that standalone, islanded networks are few and far between. Do not presume a posture of security by obscurity. Monitor application usage and ICS traffic to include authorised user access and behavioural anomalies.

4. Gain initial access:

Most modern control systems have remote access capabilities that allow third-party vendors and integrators into the systems, as well as work-from-home, remote access and the supply chain. Oftentimes, these points of access into the network are attack vectors for cyber actors. Matters get worse when we add wireless access points to the mix that attract local actors into the fray.

WHAT TO DO: Audit all third-party access. Ensure the ability to pivot to high-value targets is non-existent. Take advantage of VLAN technologies to create safe holding pens for devices as they are introduced into your network prior to introducing them into the production network. Look for devices with multiple NICs attaching to differing networks, creating bridges from ‘A to B’.

5. Execution: 

The disruption, disabling, denying, and/or destruction of the system, to achieve intended results. This might include the degradation of the monitoring of a target system (Manipulation of View [T0832] ), operation of the control system (Manipulation of Control [T0831]), SCADA impairment (Block Reporting Message [T0804], Denial of View [T0815]), denial of control (Denial of Control [T0813]), or Theft of Operational Information [T0882]).

WHAT TO DO: Monitor industrial control commands and anomalous behaviours coming from unauthorised machines, unauthorised users, commands occurring outside of change control, and multiple reset, errors, and mode changes in critical infrastructure.

As system owners and operators, we cannot prevent a malicious actor from targeting our systems. Understanding that being targeted is not an “if” but a “when” is essential. By assuming that the system is being targeted and predicting the effects that a malicious actor would intend to cause we can employ and prioritise mitigation actions.

It all starts with identifying the initial system and all its sub-components within a protected surface. Once we find success, repeating across the broader OT landscape gets easier each time.

Related:  Millions of enterprise-grade Cisco devices floating in zero-day vulnerability
Tags: Armiscybersecurity
Keith Walsh

Keith Walsh

Keith Walsh brings more than 20 years of experience across a career in OT and IoT solution architecture. Previously serving as the chief architect for several of the world’s most secured OT and IoT networks and solutions, he joined Armis as the OT principal solution architect. In this role, he led several key initiatives and fostered many cross-functional teams across Armis to drive product development and coalesce market strategy. Now serving as Armis’ director of OT strategy, Walsh will continue his efforts to craft Armis’ go-to-market strategies, and amplify the company’s messaging and brand development. Before joining Armis, Walsh served in the critical infrastructure division as the senior security solution architect at Mocana (now DigiCert). Here he worked on projects in the energy sectors, transportation systems, aerospace, defence industrial base, and critical infrastructure. Prior to Mocana, Walsh architected some of the most advanced smart grid/smart city infrastructures at Silver Spring Networks (now Itron). These included OT device networks within Manhattan and the surrounding boroughs, Jamaica, and the street lighting network in south Florida. Walsh holds a master’s degree in computer information systems from Georgia State University, and a bachelor’s degree in marketing from LeMoyne College, in Syracuse, NY.

No Result
View All Result

Recent Posts

  • Surge in ambient IoT to pave the way for sustainable tech
  • Imbibing AI skills into Singapore’s future workforce today
  • Asia Pacific's AI ambitions hinge on next-generation networks
  • Gartner urges supply chain leaders to adopt cost-to-serve model
  • Navigating cyber chaos while safeguarding Asia's supply chains

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Commercial
  • Construction
  • Consumer
  • Customer Engagement
  • Devices
  • ESG
  • Future Workplace
  • FutureCOO
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Technology
  • Telecommunications
  • TIBCO
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Photo by John Tekeridis: https://www.pexels.com/photo/round-grey-speaker-on-brown-board-1072851/

Surge in ambient IoT to pave the way for sustainable tech

May 7, 2025
Imbibing AI skills into Singapore’s future workforce today

Imbibing AI skills into Singapore’s future workforce today

May 6, 2025
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe