Mitigating rising vulnerabilities in industrial control systems
Here's how to prevent their ICS being taken over by threat actors
An increasing number of vulnerabilities are leaving our critical national infrastructure (CNI) exposed to cyberattacks from threat actors with geopolitical or corporate espionage motives, looking to cause disruption, economic harm or damage the health and wellbeing of citizens.
These vulnerabilities are being found in the industrial control systems (ICS) that are critical for the functioning of CNI. If threat actors gain control to any of these systems, they can change how they function or stop them from working altogether, which could have far-reaching consequences.
To prevent their ICS being taken over by threat actors, organizations in key industries such as energy, manufacturing and pharmaceuticals need to know what these vulnerabilities are and what measures to put in place to mitigate them.
- Here's our list of the best antivirus services right now
- We've built a list of the best endpoint protection services out there
- Check out our rundown of the best malware removal software on the market
Amir Preminger is VP of Research at Claroty
The rise of vulnerabilities
Our recent research revealed that the number of ICS security flaws published by The National Vulnerability Database (NVD) and in vulnerability advisories reported by the Industrial Control System Cyber Emergency Response Team (ICS-CERT) had risen year-on-year.
We found that the number of ICS-CERT advisories published in the first half of 2020 was nearly a third greater than for the same period in 2019, whereas the 365 vulnerabilities reported by the NVD in 2020 increased 10.3% from the previous year.
For specific industries these rises were even higher. For example, the water and wastewater sector saw a 122.1% upsurge in ICS-CERT vulnerabilities, critical manufacturing experienced an 87.3% increase, while in the energy sector it was 58.9%.
Such growth is due to a number of factors, including the fact that ICS are now more connected to the internet than ever before, however updating them with the latest patches can prove problematic. It is also important to note that this rise is also in part due to greater awareness of these vulnerabilities, and researchers and vendors giving more priority to identifying and remediating them as effectively as possible.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Increased connectivity
Traditionally ICS equipment and the operational technology (OT) networks on which they run were completely siloed (or air-gapped) from IT networks, making it next to impossible for threat actors to target them remotely. Yet, in a drive for greater efficiencies through automation technologies, businesses have been increasingly integrating their OT infrastructure with their IT networks.
As this becomes more common, the responsibility for managing the security of the OT network increasingly falls to IT security teams, many of which mistakenly assume that they can simply apply the IT security protocols they are familiar with to the OT network. However, this is not the case as, for instance, uptime takes priority over protecting data on OT networks, meaning it is difficult to carry out standard IT security activities such as patching and software maintenance. Despite this and other glaring differences between IT and OT, organisations are still forging ahead with their IT/OT integration plans while being none the wiser.
Remote exploitation
Our research found that more than 70% of the vulnerabilities published by the NVD can be exploited remotely, highlighting that air-gapped OT networks are now exceptionally rare. For example, one way in which the air gap has been closed is through engineering workstations (EWS) that connect to both the OT and IT networks by necessity. Such a link makes them an attractive target for threat actors, as once they have infiltrated the IT network, they can then use the EWS to move onto the OT network. After gaining control, threat actors are able to access other areas of the OT including programmable logic controllers (PLCs), which enable them to tamper with physical processes.
The research also found that EWS products contained more than half of the vulnerabilities discovered, while PLCs make up a quarter. Using these vulnerabilities, threat actors are able to perform actions such as remote code execution (RCE), which enables them to send commands remotely to establish permanence and conduct lateral movement. RCE was possible with nearly half of identified vulnerabilities (49%), followed by the ability to read application data (41%), cause denial of service (DoS) (39%), and bypass protection mechanisms (37%).
Disclosing vulnerabilities
While it might seem counterintuitive, sharing any discovered vulnerabilities with the ICS community is essential for keeping threat actors at bay. It not only enables vendors and researchers to find new methods to mitigate these risks, but also warns others using the same systems that they need to take action to limit the ability of threat actors to exploit these vulnerabilities.
Some might be reluctant to share their knowledge as they believe it might make them a target for threat actors, however, it is important to note that if a vendor is affected by a large number of vulnerabilities, this does not necessarily mean that they have poor security posture. Instead, it more likely signifies that the company is dedicating resources to test out its products in order to proactively find these vulnerabilities and work to resolve them.
To help the wider industry, CNI organisations need to put in place a system for automatically gathering information about disclosed vulnerabilities and comparing them to their own ICS. However, this can only be effective if all vendors are open about their vulnerabilities and are willing to share them.
Protecting ICS isn’t always simple
ICS are by their nature multifaceted, complex systems and there is no simple solution for mitigating all the vulnerabilities present. Instead a multi-layered approach is necessary.
As our research demonstrates, CNI and key manufacturing industries need to take action to protect remote access connections. This is now more important than ever, as such a high number of workers are having to operate systems remotely due to the restrictions of COVID-19 lockdowns.
Granular access permissions that allow workers to only use the exact functions needed to carry out their job should be introduced to prevent threat actors from easily moving around the network, jumping from one device to another. By controlling these permissions with multifactor authentication (MFA), organisations can thwart hackers who use techniques such as brute force to crack passwords and gain access to the network. MFA also helps to mitigate some of the dangers posed by social engineering, in which threat actors use fake emails and websites to get employees to reveal their login credentials. To further reduce the danger of social engineering-based threats, employees should also receive training on how to spot malicious emails, and what to do if they receive one.
Furthermore, collaboration between IT and OT security teams is vital to keep the entire ICS environment safe. In this way, any vulnerabilities on the IT network can be analysed to determine if they will have any impact on OT and vice versa. Such a capability can only be effective through having a unified view of both the OT and the IT networks, as well as experts who understand the nuances between them.
As the connectivity between OT and IT inevitably increases due to the demands of greater efficiencies, so too will the potential vulnerabilities that need to be mitigated. It is therefore now more important than ever that security teams working in CNI put in place measures that enable them to quickly and effectively detect and respond to any threats, whether they occur on the IT or OT network.
- Here's our list of the best identity management solutions right now
Amir Preminger is the Vice President of Research at Claroty. He brings over 10 years of cybersecurity experience in a variety of research and managerial roles. Prior to joining the company, Amir spent almost a decade in one of the IDF's elite technological units where he played a key role in the research and development of advanced Cyber Solutions across multidisciplinary domains. Amir was directly involved in a number projects that won the prestigious Israel Defense Award. Amir holds a B.Sc. in Computer Science from the Academic College of Tel-Aviv Yafo.