A joint federal Cybersecurity Advisory warns that certain advanced persistent threat actors can obtain full access to the industrial control system (ICS) and data acquisition (SCADA) devices. These systems, found in nearly every industrial sector, can then fall prey to remote control and other cyberattacks. Read on to find out which systems are at risk and how to protect them.

At-Risk Industrial Systems

Industrial control systems include the devices, systems, networks and controls used to operate or automate industrial processes. ICS are found in nearly every industrial sector and critical infrastructure. Manufacturing, transportation, energy and water treatment all rely on them. The CISA alert states that known systems at risk include:

  • Schneider Electric programmable logic controllers (PLCs)
  • OMRON Sysmac NEX PLCs
  • Open Platform Communications Unified Architecture servers.

According to CISA, attackers have developed custom-made tools for targeting ICS/SCADA devices. These malicious tools enable attackers to scan for, compromise and control affected devices. Actors can also compromise Windows-based engineering workstations by exploiting an ASRock motherboard driver with known vulnerabilities. By accessing industrial devices, threat actors could elevate privileges, move side-to-side within networks and disrupt critical devices or functions.

Remote Control

Normally, SCADA devices open or close valves and breakers, collect data from sensors, monitor for hazardous conditions and perform other tasks. ICS can interpret signals from sensors, control valves, breakers, switches, motors and other similar devices. They then transmit the variables they measure to the controller for task management. With custom tools, attackers can take over a wide variety of ICS/SCADA tasks to disrupt or halt work.

The CISA Advisory warns that advanced threat actors’ tools let them conduct highly automated exploits against targeted devices. The tools have a virtual console that mimics targeted ICS/SCADA devices. Threat actors can use those modular tools to scan for targeted devices, case device details, upload malicious code and modify device parameters. The end result is a door into supervisory control of industrial equipment from a distance.

Mitigation Measures

CISA advises businesses to adopt specific defenses to protect ICS/SCADA devices. Some urgent steps to take include:

  • Enforce multi-factor authentication for all remote access to ICS networks and devices whenever possible
  • Change all passwords to ICS/SCADA devices and systems on a consistent schedule. Give special attention to unique strong passwords. These can mitigate password brute force attacks and give monitoring systems the chance to detect common attacks.
  • Use a properly installed continuous operational technology monitoring solution to log and alert you to threats.

The advisory also recommends that businesses enforce the principle of least privilege. In some cases, this could be part of an overall zero trust strategy designed to protect equipment.

More from News

Abuse of Privilege Enabled Long-Term DIB Organization Hack

From November 2021 through January 2022, the Cybersecurity and Infrastructure Security Agency (CISA) responded to an advanced cyberattack on a Defense Industrial Base (DIB) organization’s enterprise network. During that time frame, advanced persistent threat (APT) adversaries used an open-source toolkit called Impacket to breach the environment and further penetrate the organization’s network. Even worse, CISA reported that multiple APT groups may have hacked into the organization’s network. Data breaches such as these are almost always the result of compromised endpoints…

Costa Rica State of Emergency Declared After Ransomware Attacks

In late April, after weeks of major ransomware attacks, Costa Rica declared a state of emergency. Newly-elected President Rodrigo Chaves took this measure, usually reserved to deal with natural disasters, to free up the government to react more decisively to the incident. The Russian-based Conti gang has claimed they launched the attack. Meanwhile, the U.S. Department of State offered a $10 million reward for information that leads to finding anyone holding a key leadership role in the Conti gang. The…

Ransomware-as-a-Service Transforms Gangs Into Businesses

Malware-as-a-Service is getting easier and easier to access, according to a recent threat report. Self-named the ‘Eternity Project’, this cyber threat group offers services from a Tor website and on their Telegram channel. They sell a wide variety of malware in an organized fashion, including stealer, clipper, worm, miner, ransomware and distributed-denial-of-service bot services. This alarms many security professionals. With Eternity, even inexperienced cyber criminals can target victims with a customized threat offering. Eternity sells malware for $90 to $490.…

UK Health System Email Accounts Hijacked to Steal Microsoft Logins

Last summer, I noticed password reset notices in my email account that I didn’t send. I quickly realized that I was the victim of an account takeover. This happens when someone illegally gains access to your account, typically through compromised credentials. I changed my email password right away and learned that my passwords to other accounts had already been changed. To make cleanup even more fun, I found out that the attackers had created new accounts using my credentials. Account…