Critical-infrastructure ICS confronted by attackers armed with new motives, tactics, and malware
The motive of financial and political gain—fueled partially by the ongoing conflict in Ukraine—has emboldened threat actors to barrage industrial control systems (ICS) with ever-more-disruptive cyberattacks, diversifying the threat landscape for critical infrastructure, new research shows.
This trend is expected to continue throughout 2023 with attackers arming themselves with new tactics and malware, forcing ICS operators to level up if they want to protect their networks, according to Nozomi Networks’ “OT/IoT Security Report: A Deep Look Into the ICS Threat Landscape” for the second half of 2022, published Jan. 18.
It used to be that nation-state actors were the leading perpetrators of attacks against ICS, primarily using remote access Trojans (RATs) to drop malware payloads and gain remote access to networks, as well as mounting distributed denial-of-service (DDoS) attacks to cause “inconvenient” disruption, says Roya Gordon, security research evangelist at Nozomi Networks. “Historically, critical infrastructure disruptions were seen as a nation-state tactic,” she says.
However, the now-infamous Colonial Pipeline attack in May 2021 marked a significant shift in this trend. In that incident, a ransomware attack that started with a stolen password caused panic and gas shortages across the eastern United States, and attackers realized how disruptive and potentially lucrative new attack vectors could be, she says.
“The Colonial Pipeline attack demonstrated how cybercriminals can leverage ransomware attacks on critical infrastructure — since they tend to depend heavily on real-time data, and have the means to meet ransom demands — for financial gain,” Gordon notes.
Then with Russia’s attack on Ukraine last February, attacks on ICS got political, with hacktivists, traditionally known for data breaches and DDoS attacks, wielding destructive wiper malware to disrupt transportation systems such as railroads and other critical infrastructure in the Ukraine for political gain, she says.
This marked a shift in not only who was attacking ICS, but how and for what motive they were launching these attacks, Gordon says. “All in all, this unprecedented level of activity across all fronts should cause us concern.”
Top ICS Cyberattack Trends
The report identified top trends in the ICS threat landscape based on a compilation of information from various sources including open source media, CISA ICS-CERT advisories, and Nozomi Networks telemetry, as well as on exclusive IoT honeypots that Nozomi researchers employ for “a deeper insight into how adversaries are targeting OT and IoT, furthering the understanding of malicious botnets that attempt to access these systems,” Gordon says.
What researchers observed over the last six months was a significant uptick in attacks that caused disruption to a number of industries, with transportation and healthcare being among the top new sectors finding themselves in the crosshairs of adversaries among more traditional targets.
To read the complete article, visit Dark Reading.