While attackers are showing greater interest in both direct and indirect targeted attacks at Industrial Control Systems, it is perhaps a good time to assess where we stand with regards to protecting these systems.
Industrial Control Systems (ICS) are systems that control and monitor physical processes like the "transmission of electricity, transportation of gas and oil in pipelines, water distribution, traffic lights, and other systems used as the basis of modern society.”
In recent years, the Industrial Control Systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends have come under increasingly frequent and sophisticated cyber-attacks. In part, this is a consequence of the inevitable convergence of Operational Technology (OT) with Information Technology (IT). As in all spheres of computing, the advantages of increased network connectivity through open standards such as Ethernet and TCP/IP, as well as the cost savings derived from replacing dedicated proprietary equipment with off-the-shelf hardware and software, come at the cost of increased vulnerability.
However, while the impact of a security breach on most IT systems is limited to financial loss, attacks on ICS have the added potential to destroy critical equipment, threaten national security, and even endanger human life.
With this critical distinction also comes a troubling difference in the profile and motivations of potential attackers. While the lion’s share of modern cybercrime is motivated by financial reward, let’s have a look back on the attackers' intentions in 2015 to find out more about why they wanted take down these ICS systems. The significant ones are highlighted below:
On 23rd December, 2015, a power outage was experienced across several regions in Western Ukraine due to blackouts in 57 power substations. This outage was first attributed to "interference" in the monitoring system by one of the affected power companies, but was later confirmed to be caused by a "hacker attack" on their Industrial Control Systems (ICS). The cause for the blackouts was confirmed by the Ukrainian CERT (CERT-UA) on 4th Jan, 2016 and is believed to be "the first power outage proven to have been caused by a cyberattack".
The attack was conducted in a sophisticated, well-planned manner as a 3-stage process consisting of:
The malware used in these attacks has been linked to the BlackEnergy malware family that has been around since 2007, other variants of which were also found collecting SCADA infrastructure information in 2014.
The first report confirmed a previously unconfirmed attack on the Bowman Avenue Dam in New York in 2013. Although the dam wasn't compromised, the attack was focused at gathering queries and searches on the infected machines, possibly for targeted reconnaissance. It was also confirmed to have been attributed to Iranian hackers.
Similarly, the analysis of a computer belonging to a contractor of Calpine, "America's largest generator of electricity from natural gas and geothermal resources," revealed that it had been compromised and attackers had stolen Calpine company information. The stolen information was found on one of the attacker’s FTP servers being contacted by the infected systems. The stolen information included usernames and passwords that could remotely connect to Calpine's networks, and detailed engineering drawings of networks and 71 power stations across the US.
Internet forum posts offering to sell compromised SCADA systems were found in underground forums, complete with a screenshot of the compromised system and even three French IP addresses and VNC passwords. The authenticity of these credentials hasn't been confirmed. However, this introduces the very real possibility of ready-to-use vulnerable SCADA systems becoming another commodity that can be readily bought in the underground.
These attacks are only three cases among many others. According to The ICS-CERT Monitor Newsletter: Oct 2014 - Sept 2015, a total of 295 incidents were reported to the ICS-CERT in fiscal year 2015. The highest number of reported incidents were targeted at Critical Manufacturing infrastructures (97), followed by the Energy sector (46). The rise in attacks at Critical Manufacturing systems compared to 2014 was attributed to a widespread spear-phishing campaign that primarily targeted companies in that sector, along with limited targets in other sectors.
One of the top challenges for organizations to secure ICS is, as detailed above, the sophistication of today’s cybercriminals. However, there are additional challenges, such as industry-specific systems, regulations, and practices. Most industrial control systems come from very different vendors and run proprietary operating systems, applications, and protocols (GE, Rockwell, DNP3, Modbus). As a result, host-based security developed for IT is generally not available for ICS, and many network security controls developed for common enterprise applications and protocols do not offer much in the way of support for those used by ICS.
Based on the facts listed in the ICS-CERT Monitor Newsletter article, here are some security recommendations organizations can use to avoid making headlines:
The good news is that, in recent years, the inherent problems and vulnerabilities of ICS have become more widely recognized, and first steps have now been taken to rectify them.
One way this is occurring is through the help of government bodies such as the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) in the US, and the Centre for Protection of National Infrastructure (CPNI) in the UK, both of which publish advice and guidance on security best practice for ICS.
Another way is through the definition of common standards such as ISA/IEC-62443 (formerly ISA-99). Created by the International Society for Automation (ISA) as ISA-99, and later renumbered 62443 to align with the corresponding International Electro-Technical Commission (IEC) standards, these documents outline a comprehensive framework for the design, planning, integration, and management of secure ICS.
Apart from standardization, security vendors have begun to step up to the challenge of securing critical infrastructures. Fortinet's own solution, Rugged, has been designed to address the challenges unique to these ICS systems, brought upon by
More information about Fortinet Rugged can be found here: (http://www.fortinet.com/solutions/critical-infrastructure-scada.html)