<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ICS - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/ics/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/ics/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 19 May 2022 15:41:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>ICS - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/ics/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>S4x22 &#8211; Write up of the ICS cybersecurity conference</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/05/s4x22-write-up-of-the-ics-cybersecurity-conference/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/05/s4x22-write-up-of-the-ics-cybersecurity-conference/#respond</comments>
		
		<dc:creator><![CDATA[Alexandrine Torrents]]></dc:creator>
		<pubDate>Mon, 09 May 2022 13:50:00 +0000</pubDate>
				<category><![CDATA[Interview]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[SL4x22]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17889</guid>

					<description><![CDATA[<p>After s4x21 cancellation and s4x22 3 month delay due to COVID, S4 was finally back from April 19th to April 21st 2022! What is S4? A 3 day conference, dedicated to ICS cybersecurity, held in Miami South Beach and organized...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/05/s4x22-write-up-of-the-ics-cybersecurity-conference/">S4x22 &#8211; Write up of the ICS cybersecurity conference</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>After s4x21 cancellation and s4x22 3 month delay due to COVID, S4 was finally back from April 19th to April 21st 2022!</p>
<h1>What is S4?</h1>
<p>A 3 day conference, dedicated to ICS cybersecurity, held in Miami South Beach and organized by Dale Peterson.</p>
<ul>
<li>3 stages: the Main Stage at the Fillmore theater, stage 2 and stage 3 mainly for technical deep dives at the ELV</li>
<li>the Cabana Sessions around the Surfcomber pool to network, discuss with vendors such as Dragos, Nozomi Networks, Phoenix Contact, Keysight and many others but also get a copy of the book “Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)” signed by Andy Bochman and Sarah Freeman</li>
<li>the Welcome Party at the Botanical Garden</li>
</ul>
<p>This year, around 800 people attended the conference to create the future and Wavestone was there through my participation as both an attendee but also a speaker.</p>
<p>S4 actually started on April 18th with two specific events:</p>
<ul>
<li>The first ICS4ICS exercice (I will talk about that a bit later in this article)</li>
<li>Women in ICS Security social event: more than 160 women attended the conference this year and it was great having the opportunity to meet incredible talents at a women only event; it was the first time such an event was organized at S4 and I hope not the last!</li>
</ul>
<p>The talks started on April 19th and Dale kicked off the event with a <a href="https://www.youtube.com/watch?v=B4bVXmQ945I">keynote</a> introducing this  year’s theme: No Limits!</p>
<p>In this article, I am going to present some of my favorite talks.</p>
<p>If you are interested, all videos will be released in the next weeks on S4Events YouTube channel: <a href="https://www.youtube.com/c/S4Events/videos">https://www.youtube.com/c/S4Events/videos</a> Here is the full S4x22 video release schedule: <a href="https://s4xevents.com/wp-content/uploads/2022/04/S4x22-Video-Release-Schedule.pdf">https://s4xevents.com/wp-content/uploads/2022/04/S4x22-Video-Release-Schedule.pdf</a> Stay tuned!</p>
<h1>A Tale of Two (very different) Secure ICS Architectures</h1>
<p><em><strong>Speaker: Alexandrine TORRENTS, Wavestone</strong></em></p>
<p>Well, I can’t say this is my favorite talk but I have to start with this presentation as this year was a bit special for me: first time speaker at S4.</p>
<p>I had the opportunity to talk on the Main Stage, right after the keynotes and talk about ICS secure architectures.</p>
<p>No Limits! It gave me the idea of thinking about the future of ICS network architectures.</p>
<p>In this presentation, I compare and contrast the requirements and corresponding secure ICS network architecture of two very different businesses within the same company: power plants and solar/wind farms.</p>
<p>I won’t detail the whole presentation today as I will write a more detailed article in a few weeks just in time for the release of the video on June 13th.</p>
<h1>Interview: CISA Director Jen Easterly</h1>
<p><strong><em>Dale Peterson interviewed CISA Director Jen Easterly on the Main Stage.</em></strong></p>
<p>The video of the interview is already available on S4Events YouTube channel: <a href="https://www.youtube.com/watch?v=xOdIUA4lWnI">https://www.youtube.com/watch?v=xOdIUA4lWnI</a></p>
<p>I found this interview very interesting, and also very inspiring.</p>
<p>Jen presented CISA’s goal: understand, manage and reduce risks, as well as specific objectives for 2022-2023.</p>
<p>One is oriented on processes:</p>
<ul>
<li>Baseline goals have been defined to drive common baselines across all sectors.</li>
<li>Sector specific documents will be added in the next two years.</li>
</ul>
<p>Another one is oriented on people:</p>
<ul>
<li>CISA wishes to expand its ICS team and is recruiting, especially senior ICS experts.</li>
<li>CISA will create an ICS JCDC workgroup (Joint Cyber Defense Collaborative) to unify defensive actions and drive down risk in advance of cyber incidents related to ICS. The workgroup will include both public and private sectors.</li>
</ul>
<p>Jen also talked about Shields UP (https://www.cisa.gov/shields-up) . Since Russia’s invasion of Ukraine, intelligence indicates that the Russian Government is exploring options for potential cyberattacks and CISA is asking every organization to be prepared to respond to disruptive cyber incidents. They published several recommendations on their website.</p>
<p>This interview made me think about what could be done within the French cybersecurity agency (ANSSI) regarding ICS cybersecurity. From my understanding, the ICS expertise is spread across different business units. But what if there was a dedicated ICS cybersecurity task force driving all efforts?</p>
<h1>Security Truth or Consequences</h1>
<p><em><strong>Speaker: Dale Peterson</strong></em></p>
<p>Dale presented a Hard Security Truth: Cybersecurity controls at best reduce the likelihood of attack, but they do not eliminate the possibility of compromise.</p>
<p>Indeed, even with the best security controls implemented and the best OT security program,organizations can be defeated by human errors, configuration errors, or 0day vulnerabilities. It is not a game asset owners can win, they can only reduce the chances of losing.</p>
<p>But what if companies could shift to a consequence reduction mindset and maybe win the cyber risk management game?</p>
<p>Let’s take the example of a glass manufacturer. One of the most sensitive PLCs controls the heat of the oven. if this PLC is compromised, it could be very dangerous for the process. Of course, you can reduce the likelihood of this compromise by implementing security controls, such as network filtering for example. But what if the PLC gets compromised anyway? How could you reduce the impact and get back the control of the process as quickly as possible?</p>
<p>Well, do not only think about cybersecurity and focus on the business and its resiliency. Adding a manual control on the production line could do the trick and make sure the consequence of an attack would not be that important.</p>
<p>Well, it is not always that simple but I find it interesting to focus on consequences and find business oriented solutions to reduce cyber risks.</p>
<p>Dale concluded his talk by presenting his 3-step approach for consequence reduction:</p>
<ul>
<li>Identify high consequence event within your organization</li>
<li>Determine if a cyber attack can cause that event</li>
<li>If yes, find a way that it won’t</li>
</ul>
<p>This approach looks like a safety approach, but applied to additional consequences not covered by safety, like loss of revenue.</p>
<h1>PIPEDREAM &amp; ICS Cyber Threat In 2022</h1>
<p><em><strong>Speaker: Rob Lee, Dragos</strong></em></p>
<p>Rob Lee was supposed to present his ICS Cyber Treat review but with the recent news, he made a focus on Pipedream, the ICS attack toolkit/malware analyzed by Dragos: <a href="https://www.youtube.com/watch?v=H82sbIwFxt4">https://www.youtube.com/watch?v=H82sbIwFxt4</a></p>
<p>This toolkit has been developed by the threat group Chernovite and its capability has not been employed yet. Pipedream seems to be the most flexible ICS attack framework to date. It uses ICS-specific protocols for reconnaissance and manipulation of PLCs.</p>
<p>The primary targets of the toolkit include PLCs from Omron and Schneider Electric. However, pipedream capabilities could impact much more PLC vendors.</p>
<p><img fetchpriority="high" decoding="async" class="size-full wp-image-17890 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-chernovite-S422.png" alt="" width="451" height="240" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-chernovite-S422.png 451w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-chernovite-S422-359x191.png 359w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-chernovite-S422-71x39.png 71w" sizes="(max-width: 451px) 100vw, 451px" /></p>
<p> </p>
<p>Rob presented some of these capabilities, as well as potential attack scenarios following the ICS cyber kill chain:</p>
<ul>
<li>EVILSCHOLAR – A capability designed to discover, access, manipulate, and disable Schneider Elctric PLCs.</li>
<li>BADOMEN – A remote shell capability designed to interact with Omron software and PLCs.</li>
<li>MOUSEHOLE – A scanning tool designed to use OPC UA and FINS protocols to enumerate PLCs and OT networks.</li>
<li>DUSTYTUNNEL – Custom remote operational implant capability to perform host reconnaissance and command and control.</li>
<li>LAZYCARGO – Drops and exploits a vulnerable ASRock driver to load an unsigned driver. Works on all Windows systems not just those with ASRock</li>
</ul>
<p>Dragos published a full report on pipedream: <a href="https://www.dragos.com/blog/industry-news/chernovite-pipedream-malware-targeting-industrial-control-systems/">https://www.dragos.com/blog/industry-news/chernovite-pipedream-malware-targeting-industrial-control-systems/</a></p>
<p>What I find the most interesting in this toolkit is that it does not use a lot of CVEs, but mainly legitimate functionalities of PLCs and industrial protocols to target industrial control systems.</p>
<p>This toolkit was also analyzed by Mandiant, who called it Incontroller. They also made a presentation at S4 and published a detailed report of their analysis: <a href="https://www.mandiant.com/resources/incontroller-state-sponsored-ics-tool">https://www.mandiant.com/resources/incontroller-state-sponsored-ics-tool</a></p>
<h1>Unpwning A Building</h1>
<p><strong><em>Speaker: Peter Panholzer, Limes Security</em></strong></p>
<p>This presentation was pretty original as cybersecurity experts had to exploit a cybersecurity vulnerability to resolve a cybersecurity incident.</p>
<p><strong>The incident</strong>: a building had a complete loss of their building automation system, using KNX devices.</p>
<p><strong>The initial situation</strong>: Devices of the building were no longer operational and the vendor recommended replacing the devices (cost &gt; 100k€).</p>
<p><strong>Idea to resolve the incident</strong>: the BCU key is a security parameter used to protect the device from being modified; the BCU key was probably set on the device by the attacker. The idea was to retrieve the BCU key and reprogram the devices.</p>
<p><strong>How</strong>: the cybersecurity experts asked for some samples of devices, and tried to read the key from the devices. They managed to dump the firmware of one of the devices and access the memory that was not protected. They used a sliding window and with some brute force, they managed to retrieve the key that was written in clear text in the memory.</p>
<p>Resolution: Fortunately (in this case), the key was the same for all devices and it could be used to reset the devices and restart the building automation system</p>
<p>   <img decoding="async" class="size-full wp-image-17902 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photos-S422-3.png" alt="" width="451" height="248" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photos-S422-3.png 451w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photos-S422-3-347x191.png 347w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photos-S422-3-71x39.png 71w" sizes="(max-width: 451px) 100vw, 451px" /></p>
<h1>Unprecedented Attack, Unprecedented Response &#8211; SUNBURST From The Inside</h1>
<p><em><strong>Speaker: Tim Brown, SolarWinds</strong></em></p>
<p>You’ve all heard about the SUNBURST cyberattack on SolarWinds in December 2020.  In this presentation, Tim Brown, CISO of SolarWinds took us inside and explained how he managed this major incident in the first hours, days, weeks, and months that followed.</p>
<p>Besides the presentation in itself that was very good, the most interesting point for me is about the final thoughts and the fact that this incident has increased the level of transparency expected of vendors.</p>
<p>This event caused many changes and has brought supply chain security even more to the front of cybersecurity discussions. </p>
<h1>Using NTIA’s VEX to Tame the Vulnerability Tsunami</h1>
<p><em><strong>Speaker: Eric Byres, aDolus Technology</strong></em></p>
<p>SBOM (Software Bill of Materials) was kind of trendy this year at S4. Vendors and asset owners should have a SBOM to list all components and libraries used in their products and use it in their vulnerability management process to identify patches to install.</p>
<p>With this, you could end up with thousands of vulnerabilities to patch. But is the vulnerability exploitable in your context?</p>
<p>Indeed, just because a vulnerability database references a particular software component doesn&#8217;t mean the vulnerability will actually be exploitable in every software product that includes that component. As a result, organizations can waste valuable time fruitlessly searching for and patching vulnerabilities, even though those vulnerabilities aren’t actually exploitable.</p>
<p>This introduces VEX (Vulnerability Exploitability eXchange), which is a security advisory profile that will be used in combination with SBOM. This profile allows software suppliers to issue a standardized, machine-readable document that states whether or not their products are “affected” by one or more known component vulnerabilities.</p>
<p>You can use VEX for multiple use cases:</p>
<ul>
<li>Multiple products to one vulnerability: what products are affected by Log4j?</li>
<li>Multiple vulnerabilities to a specific product: which vulnerabilities affect the product I use?</li>
</ul>
<p>The status of a vulnerability includes affected, not affected, fixed, or under investigation.</p>
<p>VEX provides a method for asset owners to focus on exploitable vulnerabilities that present the most risk.</p>
<p><img decoding="async" class="size-full wp-image-17896 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-S422-4.png" alt="" width="451" height="257" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-S422-4.png 451w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-S422-4-335x191.png 335w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-S422-4-68x39.png 68w" sizes="(max-width: 451px) 100vw, 451px" /></p>
<p>Once you get a comprehensive list of vulnerabilities that could be exploited in your product, as an asset owner, you can use the SSVC methodology to decide what to do in your context with the vulnerability: patch now, patch during the next scheduled maintenance, defer.</p>
<p>Another talk was related to this subject during S4: CSAF, not SBOM, is the Solution, presented by Jens Wiesner from BSI. CSAF (Common Security Advisory Framework) is an open standard about security advisories.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-17898 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-s422-5.png" alt="" width="451" height="253" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-s422-5.png 451w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-s422-5-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-s422-5-71x39.png 71w" sizes="auto, (max-width: 451px) 100vw, 451px" /></p>
<h1>Top 20 PLC Secure Coding Practices</h1>
<p><em><strong>Speakers: Vivek Ponnada, Nozomi Networks and Josh Ruff, Deloitte</strong></em></p>
<p>The Top 20 PLC Secure Coding Practices is the result of a community effort to provide guidelines to engineers that are creating software (ladder logic, function charts etc.) to help improve the security posture of Industrial Control Systems: <a href="https://plc-security.com/">https://plc-security.com/</a></p>
<p>The idea came from a talk at S4x20 where Jake Brodsky asked why engineers and technicians aren’t trained to code and configure PLC’s in a secure manner, and then gave examples of what should be taught and done.</p>
<p>The aim of this session was to present some of the practices in detail and with concrete examples.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17894 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-S4-22-5.png" alt="" width="451" height="242" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-S4-22-5.png 451w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-S4-22-5-356x191.png 356w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-S4-22-5-71x39.png 71w" sizes="auto, (max-width: 451px) 100vw, 451px" /></p>
<p>Below are two of the practices that were presented:</p>
<ul>
<li>Practice #3: Leave operational logic in PLC</li>
</ul>
<p>While HMI visualization software provides some level of coding capabilities, this functionality should not be used for control or safety coding</p>
<p>The idea with this practice is to make sure that controls are performed by the PLC itself and not by the HMI. This way, if you bypass the HMI and send a request directly to the PLC, the PLC won’t automatically accept your request but will perform controls to make sure the logic makes sense.</p>
<p>It is similar to the OWASP recommendation in IT to implement controls on the server side and not on the client side for web applications.</p>
<ul>
<li>Practice #7: Validate paired inputs/outputs</li>
</ul>
<p>When mutually exclusive paired inputs or outputs that physically cannot happen at the same time (e.g., motor start/stop, valve open/close) are asserted simultaneously, this may indicate a sensor failure or malicious activity.</p>
<p>The idea with this practice is to implement controls based on inputs/outputs that are linked together. For example, a compressor cannot be started and stopped at the same time. An attacker could turn on both the start and stop outputs simultaneously. To avoid that, a single output could be used to run the compressor with interlocks and delay timers.</p>
<p>If you already know the Top 20 PLC secure coding practices, you won’t learn anything with this presentation but I think it is a great introduction to understand the mindset behind these practices.</p>
<p>Something interesting as well, several talks this year were linked to PLC secure coding practices:</p>
<ul>
<li>PLC EDR: Model Checking of Logic</li>
<li>PLC Library to Detect Abnormalities</li>
</ul>
<p>You can find out more about these presentations, as well as others in Arnaud SOULLIE’s video on S4: <a href="https://www.youtube.com/watch?v=9XCNjmKJiTk">https://www.youtube.com/watch?v=9XCNjmKJiTk</a></p>
<h1>ICS4ICS: Results of the First Major Exercise</h1>
<p><em><strong>Speaker: Megan Samford, Schneider Electric</strong></em></p>
<p>Like I mentioned earlier, S4 was the stage of the first ICS4ICS exercise on April 18th. ICS4ICS stands for Incident Command System for Industrial Control Systems.</p>
<p>Megan Samford talked at S4x20 about the fact that cyber was the only designated federal disaster type not currently using Incident Command System for its response framework.</p>
<p>Since 2020, a team of more than 1000 volunteers has been put together to create a global framework of cyber responders.</p>
<p>The Incident Command Process is based on a planning P cycle that provides a proven structured process to manage any incident with a standardized approach to organizing and executing work.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-17900 alignleft" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-S4226.png" alt="" width="422" height="545" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-S4226.png 422w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-S4226-148x191.png 148w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/photo-S4226-30x39.png 30w" sizes="auto, (max-width: 422px) 100vw, 422px" /></p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p>The objective of the exercise was to present this methodology as well as the structure of documents and templates that can be used to follow a cyber incident:</p>
<ul>
<li>Cover Sheet</li>
<li>ICS-202 Incident Objectives</li>
<li>IICS-203 Organization Assignment List</li>
<li>ICS-204 Assignment List</li>
<li>ICS-205A Communications List</li>
<li>ICS-207 Incident Organization Chart</li>
<li>ICS-208 Safety Message/Plan</li>
<li>ICS-214 Activity Log</li>
</ul>
<p>The goal for ICS4ICS after S4x22 is to expand its capabilities by:</p>
<ul>
<li>Conducting ICS4ICS exercices globally</li>
<li>Offering ICS4ICS credentials and training globally</li>
<li>Supporting more complex incidents</li>
</ul>
<p>Of course, ICS4ICS is more of an organizational framework and does not give guidance about the cyber incident itself. I would be interested in the next few years to have insights on how companies actually used this framework and how it helped their ICS cyber incident response.</p>
<p>Finally, if you still have time, I recommend the following presentations as well:</p>
<ul>
<li>Cyber Conflict and International Relations</li>
<li>Assessing the Balance Between Visibility and Confidentiality in ICS Network Traffic</li>
<li>Inside Industroyer2 and Sandworm’s Latest Cyberattacks Against Ukraine</li>
<li>The Great Debate: Cyber Insurance Will Play A Major Role In OT Risk Management</li>
<li>When C-SHTF: Lessons Learned from the Front Lines in OT Incident Response</li>
</ul>
<p>S4x22 was great! So many good talks but also (and foremostly) the opportunity to see again so many familiar faces of the ICS community and meet new people.</p>
<p>I already look forward to S4x23 that will take place from February 13th to February 16th, 2023. Next year, the conference will still be in Miami South Beach, but at the Loews as the Fillmore will be in renovation.</p>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/05/s4x22-write-up-of-the-ics-cybersecurity-conference/">S4x22 &#8211; Write up of the ICS cybersecurity conference</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/05/s4x22-write-up-of-the-ics-cybersecurity-conference/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What are the trends and challenges in industrial cybersecurity in 2021?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/10/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/10/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021/#respond</comments>
		
		<dc:creator><![CDATA[Benoit Bouffard]]></dc:creator>
		<pubDate>Mon, 04 Oct 2021 09:02:03 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[radar]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=16941</guid>

					<description><![CDATA[<p>This first edition of Wavestone&#8217;s Industrial Control Systems (ICS) Cybersecurity Radar comes at a very special time. On one hand, the health and economic crisis context is considerably weakening the companies that manage critical infrastructures. On the other hand, the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021/">What are the trends and challenges in industrial cybersecurity in 2021?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="MsoNormal"><span lang="EN-US">This first edition of Wavestone&#8217;s Industrial Control Systems (ICS) Cybersecurity Radar comes at a very special time. On one hand, the health and economic crisis context is considerably weakening the companies that manage critical infrastructures. On the other hand, the cyber threat is increasing, with ransomware affecting critical systems more and more often. It is no longer enough to ask the question of how to prevent cyber-attacks: one must also plan how to react in case of a crisis, how to quickly isolate a critical industrial system and how to quickly restore a compromised system.</span></p>
<p class="MsoNormal"><span lang="EN-US">In this article, we expose our vision of the market and the maturity of cybersecurity for industrial information systems (IS), as well as our convictions and analysis on the subject.</span></p>
<h2><span lang="EN-US">What is the state of the threat to industrial information systems?</span></h2>
<p class="MsoNormal"><span lang="EN-US">In 2011, the cybersecurity of industrial information systems, suddenly came to the forefront with the Stuxnet attack and the discovery of a state level threat against Operational Technologies (OT). For a decade, Advanced Persistent Threats (APTs) were considered the biggest threat to industrial system security, through impressive and complex attacks, such as the series of &#8220;Black Energy&#8221; attacks against the Ukrainian power grid between 2007 and 2014, or the &#8220;Triton&#8221; attack against the safety systems of a chemical plant in Saudi Arabia in 2017.</span></p>
<p class="MsoNormal"><span lang="EN-US">However, the Snake/EKANS case in 2020 allows us to point out a trend that has been continuously increasing for the past few years: the appearance of ransomware in ICS. These ransomwares are the result of opportunistic attacks on vulnerable systems or are side effects of attacks targeting the corporate IS, as in the case of Colonial Pipeline in May 2021.</span></p>
<p class="MsoNormal"><span lang="EN-US">With the ransomware business model becoming sustainable on one hand, and the emergence of increasingly connected industrial IS on the other hand, it is realistic to expect a large increase in opportunistic attacks and ransomware side effects on industrial information systems.</span></p>
<p class="MsoNormal"><span lang="EN-US">Faced with an increasing threat, companies must implement cybersecurity measures on industrial systems and define coherent strategic goals, but this requires a real investment. Therefore, we have worked on listing ICS cybersecurity domains and the solutions to secure them. This radar is not exhaustive, but it aims to clarify the topic by giving a high-level vision. </span></p>
<p class="MsoNormal" style="text-align: center;" align="center"><span lang="FR"><!-- [if gte vml 1]><v:shapetype id="_x0000_t75"
 coordsize="21600,21600" o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe"
 filled="f" stroked="f">
 <v:stroke joinstyle="miter"/>
 <v:formulas>
  <v:f eqn="if lineDrawn pixelLineWidth 0"/>
  <v:f eqn="sum @0 1 0"/>
  <v:f eqn="sum 0 0 @1"/>
  <v:f eqn="prod @2 1 2"/>
  <v:f eqn="prod @3 21600 pixelWidth"/>
  <v:f eqn="prod @3 21600 pixelHeight"/>
  <v:f eqn="sum @0 0 1"/>
  <v:f eqn="prod @6 1 2"/>
  <v:f eqn="prod @7 21600 pixelWidth"/>
  <v:f eqn="sum @8 21600 0"/>
  <v:f eqn="prod @7 21600 pixelHeight"/>
  <v:f eqn="sum @10 21600 0"/>
 </v:formulas>
 <v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
 <o:lock v:ext="edit" aspectratio="t"/>
</v:shapetype><v:shape id="Image_x0020_3" o:spid="_x0000_i1026" type="#_x0000_t75"
 style='width:451.5pt;height:312.5pt;visibility:visible;mso-wrap-style:square'>
 <v:imagedata src="file:///C:/Users/ALEXAN~1.MAZ/AppData/Local/Temp/msohtmlclip1/01/clip_image001.jpg"
  o:title=""/>
</v:shape><![endif]--><!-- [if !vml]--><!--[endif]--><!-- [if gte vml 1]><v:shape id="Image_x0020_4"
 o:spid="_x0000_i1025" type="#_x0000_t75" style='width:430.5pt;height:298pt;
 visibility:visible;mso-wrap-style:square'>
 <v:imagedata src="file:///C:/Users/ALEXAN~1.MAZ/AppData/Local/Temp/msohtmlclip1/01/clip_image003.jpg"
  o:title=""/>
</v:shape><![endif]--><!-- [if !vml]--><img loading="lazy" decoding="async" class="aligncenter wp-image-16942 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/3.jpg" alt="" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/3.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/3-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/3-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/3-768x532.jpg 768w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /> <img loading="lazy" decoding="async" class="aligncenter wp-image-16944 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/4.jpg" alt="" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/4.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/4-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/4-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/4-768x532.jpg 768w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /><!--[endif]--></span></p>
<h2> </h2>
<h2><span lang="EN-US">Methodology</span></h2>
<p class="MsoNormal"><span lang="EN-US">For <b>five months</b>, this radar was built with <b>five experts </b>in cybersecurity of Industrial IS, in addition to the hundred consultants of Wavestone&#8217;s industrial cybersecurity offer.</span></p>
<p class="MsoNormal"><span lang="EN-US">This radar has two parts (we will call them dials): one is presenting cybersecurity <b>products</b> specialized in industrial IS and the other is presenting the different <b>domains</b> of industrial IS cybersecurity, sorted by maturity level.</span></p>
<p class="MsoNormal"><span lang="EN-US">Industrial cybersecurity <b>products</b> are identified as such according to the following criteria:</span></p>
<ul>
<li class="MsoListParagraphCxSpFirst" style="text-indent: -18.0pt; mso-list: l1 level1 lfo1;"><span lang="EN-US"><span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">        </span></span><!--[endif]--><span lang="EN-US">They meet a need in the process of securing industrial information systems</span></li>
<li class="MsoListParagraphCxSpMiddle" style="text-indent: -18.0pt; mso-list: l1 level1 lfo1;"><span lang="EN-US"><span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">        </span></span><span lang="EN-US">They are adapted to an industrial environment in terms of hardware and software:</span></li>
</ul>
<p class="MsoListParagraphCxSpMiddle" style="margin-left: 72.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l1 level2 lfo1;"><!-- [if !supportLists]--><span lang="EN-US" style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-US;">·<span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">       </span></span><!--[endif]--><span lang="EN-US">The hardware is rugged to withstand harsh conditions and/or has a long service life</span></p>
<p class="MsoListParagraphCxSpMiddle" style="margin-left: 72.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l1 level2 lfo1;"><!-- [if !supportLists]--><span lang="EN-US" style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-US;">·<span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">       </span></span><!--[endif]--><span lang="EN-US">Network security products consider industrial protocols</span></p>
<p class="MsoListParagraphCxSpLast" style="margin-left: 72.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l1 level2 lfo1;"><!-- [if !supportLists]--><span lang="EN-US" style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-US;">·<span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">       </span></span><!--[endif]--><span lang="EN-US">Terminal security products are compatible with obsolete systems.</span></p>
<p class="MsoNormal"><span lang="EN-US">The cybersecurity <b>domains</b> are also selected and evaluated based on the </span><span lang="FR"><a href="https://lu.wavestone.com/en/insight/industrial-sites-cybersecurity-benchmark-on-40-assessments/"><span lang="EN-US" style="color: #7030a0; mso-ansi-language: EN-US;">observations</span></a></span> <span lang="EN-US">of our consultants in the field, with various customers in varied industrial domains, but in the French context.</span></p>
<p class="MsoNormal"><span lang="EN-US">The rest of this article highlights some of the important ICS domains, from the most mature to the most emerging. This analysis echoes and updates our </span><span lang="FR"><a href="https://lu.wavestone.com/en/insight/the-protection-and-security-of-ics/"><span lang="EN-US" style="color: #7030a0; mso-ansi-language: EN-US;">2019 publication</span></a></span> <span lang="EN-US">presenting feedbacks on ICS protection and security. Indeed, if the main topics remains the same (e.g. IT/OT separation), the players and their maturity evolve quickly, bringing new issues and transforming the old ones.</span></p>
<h2><span lang="EN-US">Which basis should be used to secure an industrial network?</span></h2>
<h3><span lang="EN-US">People, procedures, and resilience</span></h3>
<p class="MsoNormal"><span lang="EN-US">The strengths and weaknesses of industrial IS and management IS are different. To implement effective cybersecurity measures in an industrial IS, one must first understand the levers already present in Industrial IS that can be useful for cyber security.</span></p>
<p class="MsoNormal"><span lang="EN-US">First, the operators in industrial production networks are very familiar with the processes and the usual functioning of the production system. In addition, procedures in the event of an incident are much more developed than in corporate IS. Together, these elements give a capacity to detect malfunction and to respond efficiently. A clever way to improve this </span><span lang="FR"><a href="https://www.riskinsight-wavestone.com/en/2021/03/cyber-resilience-in-an-industrial-environment/"><span lang="EN-US" style="color: #7030a0; mso-ansi-language: EN-US;">resilience capacity</span></a></span> <span lang="EN-US">is to add cyber incident detection procedures based on the teams&#8217; current knowledge.</span></p>
<h3><span lang="EN-US">Network knowledge</span></h3>
<p class="MsoNormal"><span lang="EN-US">Knowing your network makes it easier to secure the IS and maintain it in secure conditions by allowing risk analysis, network segmentation, vulnerability and patch management, regulatory compliance, etc.</span></p>
<p class="MsoNormal"><span lang="EN-US">It is possible to carry out this exhaustive inventory by hand on a regular basis, especially by using industrial maintenance tools. To go further, it is possible to automate the task with free mapping tools (Dragos CyberLens, GrassMarlin). Finally, probes (Nozomi, Claroty, Dragos, etc.) can go much further by automating the detection of anomalies on the network or even by helping with incident response.</span></p>
<h3><span lang="EN-US">Backup and recovery</span></h3>
<p class="MsoNormal"><span lang="EN-US">The best resilience weapon against ransomware is the systematic and, if possible, offline backup of critical data for the production system. This practice is more and more implemented in OT systems. </span></p>
<p class="MsoNormal"><span lang="EN-US">However, additional conditions are necessary for backups to be truly useful. First, all the data needed for the system to function must be identified. This data can be either technical data (machine configuration for example) or business data. A risk analysis allows you to identify it efficiently. Finally, you must ensure that you are able to restore a functional system from the backups made, especially for certified systems.</span></p>
<h2><span lang="EN-US">What are the opportunities in 2021?</span></h2>
<p class="MsoNormal"><span lang="EN-US">Our study has enabled us to highlight effective measures to greatly increase the security level of an industrial IS.</span></p>
<h3><span lang="EN-US">Segmenting your network</span></h3>
<p class="MsoNormal"><span lang="EN-US">Network segmentation has been around for several years. However, it is still an important step in securing your industrial network. Having a segmented network allows to efficiently prevent the propagation of an attack and therefore its impact.</span></p>
<p class="MsoNormal"><span lang="EN-US">In addition to the use of appropriate firewalls, a network segmentation project requires competent architecture and integration teams with sufficient time and resources. Network segmentation is a balance between security and business needs. The use of new &#8220;Software Defined&#8221; network technologies allows to perform segmentation in a more agile way.</span></p>
<h3><span lang="EN-US">Separate the management network from the industrial network</span></h3>
<p class="MsoNormal"><span lang="EN-US">The connection of industrial IS to corporate IS is necessary today, but it is also a vector of risk.</span></p>
<p class="MsoNormal"><span lang="EN-US">The solutions to be implemented depend on the criticality of the industrial network and the necessary flows between the two networks. However, a single interface between the two networks must always be favored to maintain control over this particularly critical interface.</span></p>
<p class="MsoNormal"><span lang="EN-US">A complete range of products exists, from firewalls to data diodes. A good practice is to assemble several of these solutions within a DMZ, to control the services that can communicate between the two networks.</span></p>
<p class="MsoNormal"><span lang="EN-US">Nevertheless, IT/OT separation goes far beyond the network issue discussed above. In terms of identity, the separation of the Active Directory (AD) between the management network and the industrial network must also be addressed. From a security perspective, it is best, if the resources are available, to separate these two ADs to avoid the spread of attacks. However, the ADs can also be linked by closely controlling authorized flows and/or providing remediation if one of the two ADs is compromised.</span></p>
<h3><span lang="EN-US">Identify network users</span></h3>
<p class="MsoNormal"><span lang="EN-US">A particularity of identity management in ICS is the strong presence of shared workstations. In this situation, an adapted solution must allow several users to work on the same machine in an authenticated way, thus allowing to identify the actions of each one.</span></p>
<p class="MsoNormal"><span lang="EN-US">In this case, the model where each user has his own Windows session is not adapted. A possible solution is to set up a generic Windows session on which the user authenticates himself in a simple and fast way thanks to a badge and a Fast Switching software.</span></p>
<h2><span lang="EN-US">What are the next major cybersecurity projects for industrial IS?</span></h2>
<h3><span lang="EN-US">SOC</span></h3>
<p class="MsoNormal"><span lang="EN-US">Several Managed Security Services Providers (MSSP) are starting to propose ICS specialized Security Operation Centers (SOC). However, these SOCs should not be considered as miracle solutions: it is above all by knowing your business and all its particularities that the SOC can be effective.</span></p>
<p class="MsoNormal"><span lang="EN-US">A key aspect when setting up an industrial SOC is to clearly define a scope that is correlated with the cyber maturity of the IS. In an industrial cyber SOC, only cyber incidents should be dealt with, without considering purely operational events, which are already handled by the supervision system.</span></p>
<h3><span lang="EN-US">Third party security</span></h3>
<p class="MsoNormal"><span lang="EN-US">Supply chain management, both in IT and OT, is becoming one of the most important cyber topics. REvil&#8217;s attack on Kayesa and its customers in July 2021 gives an idea of the possibilities of a supply chain attack: the attacks reach a new scale and can affect hundreds or even thousands of organizations at once. Obviously, industrial IS also involves third parties and are therefore not immune. For example, the compromise of a PLC vendor could impact numerous customers.</span></p>
<p class="MsoNormal"><span lang="EN-US">Third party attacks can take different forms, including the following examples:</span></p>
<ul>
<li class="MsoListParagraphCxSpFirst" style="text-indent: -18.0pt; mso-list: l0 level1 lfo2;"><span lang="EN-US"><span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">         </span></span><!--[endif]--><span lang="EN-US">Access to the IS by using a software update with a trojan inside</span></li>
<li class="MsoListParagraphCxSpMiddle" style="text-indent: -18.0pt; mso-list: l0 level1 lfo2;"><span lang="EN-US"><span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">         </span></span><!--[endif]--><span lang="EN-US">Theft of data stored by a third party</span></li>
<li class="MsoListParagraphCxSpLast" style="text-indent: -18.0pt; mso-list: l0 level1 lfo2;"><span lang="EN-US"><span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">         </span></span><!--[endif]--><span lang="EN-US">Access to the IS via a remote access, for example used by the third party to perform maintenance</span></li>
</ul>
<p class="MsoNormal"><span lang="EN-US">Protecting oneself from supply chain attacks is particularly complex. However, tools exist. First, it is essential to know your supply chain and the risk related to each third party. Third parties at risk can then be subject to measures to reduce the chances of compromise such as a Security Assurance Plan (SAP) or regular audits. </span></p>
<p class="MsoNormal"><span lang="EN-US">Remote access to the IS can be controlled by using Bastions or privileged access management (PAM) solutions, which monitor all actions made by the third party and finely manage their rights. However, this solution can become a constraint for the user, therefore it is advised to focus on the user&#8217;s needs to propose the most relevant solutio.</span></p>
<h3><span lang="EN-US">Cloud</span></h3>
<p class="MsoNormal"><span lang="EN-US">Still mainly confined to secondary functions such as inventory and supply management, the cloud is gradually making its way into industrial IS with the development of </span><span lang="FR"><a href="https://www.riskinsight-wavestone.com/en/2021/02/industrial-cybersecurity-in-the-age-of-industry-4-0-how-can-we-secure-these-new-use-cases-and-support-business-projects/"><span lang="EN-US">Industry 4.0</span></a></span><span lang="EN-US">. By doing so, it allows, for example, global IoT terminals management in production sites or optimizing server sizing.</span></p>
<p class="MsoNormal"><span lang="EN-US">But this change also raises security issues. Some of these issues have already been addressed with the democratization of the cloud in management information systems, but others have yet to be resolved. How to manage the security of IoT devices? How can cloud systems be integrated into critical environments, which are highly regulated? Who stores the data and what regulations apply?</span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021/">What are the trends and challenges in industrial cybersecurity in 2021?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/10/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Removable media decontamination tools &#8211; success factors for effective security gain and successful deployment</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/12/removable-media-decontamination-tools/</link>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Tue, 10 Dec 2019 14:33:28 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[removable media]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12324</guid>

					<description><![CDATA[<p>Because of their accessibility and ease of use, USB sticks and other USB storage devices are widespread and commonly used. In this article, all these devices will be referred to as ‘removable media’. Industrial networks also called ‘OT’ (Operating Technology)...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/12/removable-media-decontamination-tools/">Removable media decontamination tools &#8211; success factors for effective security gain and successful deployment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Because of their accessibility and ease of use, USB sticks and other USB storage devices are widespread and commonly used. In this article, all these devices will be referred to as ‘removable media’.</em></p>
<p><em>Industrial networks also called ‘OT’ (Operating Technology) or ‘Production Networks’ include: production networks in factories, test benches, research laboratories or embedded networks in technological products: trains, cars, planes, etc.</em></p>
<p>&nbsp;</p>
<h2>USB flash drives, the real swiss army knives of industrial it, are proving to be formidable vectors for cyber attacks</h2>
<h3>Particularly vulnerable industrial networks</h3>
<p>Industrial systems have long service lifecycles lasting for several decades. These service lifecycles are much longer than those in traditional IT and often lead to problems of hardware or software degradation. These legacy systems are then no longer maintained by their suppliers as they stop publishing security updates for them. Maintaining their security is therefore complex or even impossible.</p>
<p>Even when updates are published, there are issues. For example, they require a maintenance window which can have an operational impact. In some cases, it may also be necessary to requalify the system or perform technical and functional testing before restarting.</p>
<p>In addition, system standardisation has become the norm. Windows or Linux operating systems are commonly found with fewer security patches and therefore may be more easily exploited by computer viruses.</p>
<p>The degradation of industrial systems, the difficulty of maintaining them in a secure state and their standardisation make them increasingly vulnerable to cyber threats. However, it is still necessary to access the industrial network to exploit these vulnerabilities, as they are historically less exposed&#8230;.</p>
<p>&nbsp;</p>
<h3>These vulnerabilities are regularly exploited using removable media as a vector</h3>
<p>Removable media is often used as a bridge between the internal office network or an external network and the industrial network. For example:</p>
<ul>
<li>USB storage devices can be used to deploy configurations or patches on disconnected systems. These configuration files or patches come from workstations that have an internet connection via the company network. These workstations are exposed to cyber threats, and as a result so are the USB storage devices, and through them, the disconnected systems.</li>
<li>Many service providers operating on the industrial network use USB sticks to deliver configuration files, debugging tools and other software. The multitude of subcontractors means there are many data exchanges from uncontrolled networks to industrial networks, each potentially representing a threat vector that can be exploited.</li>
</ul>
<p>These exchanges expose the industrial network to several types of threats:</p>
<ul>
<li>There are many viruses designed to exploit Windows vulnerabilities by spreading through removable media. One of the best-known ones is the Conficker virus, which exploits the automatic task launch mechanism of removable media and thus manages to automatically launch a virus or viral payload when the media is connected. Once a computer is infected, it can spread to other hosts through the network.</li>
<li>The original intended use of storage devices can also be maliciously changed; this type of attack is called a &#8220;Bad USB&#8221;. Rubber Ducky is an example: it makes a USB key look like an input device such as a keyboard, and then launches commands when connected to a computer.</li>
<li>When connected to a computer, USB killers, which look like ordinary USB sticks, store energy until they reach a high voltage, they then release this energy into the host computer to destroy its physical components.</li>
</ul>
<p>&nbsp;</p>
<h3>However, the use of these removable media devices is difficult to circumvent</h3>
<p>Removable media has several common uses such as data storage, backup, transfer or information sharing.</p>
<p>These different use cases have gradually emerged, often at the ingenuity of users without any real supervision from the IT department or the business. When we study these different scenarios, we can classify them into two categories:</p>
<ul>
<li>Those that can be easily removed by offering either a more secure alternative or an improved way of working. For example, with two industrial networks connected to each other, the implementation of a file sharing space on the network can replace a direct exchange by removable media.</li>
<li>Those that could be eliminated with major investment or be very difficult to remove immediately. For example, using an isolated network to install a new computer whereby the deployment of a master image by USB can be difficult to replace.</li>
</ul>
<p>It is difficult to do without removable media entirely, but their use remains problematic. Faced with these threats, solutions are beginning to emerge.</p>
<p>&nbsp;</p>
<h2><strong>Multiple technical solutions exist but provide only a partial solution</strong></h2>
<p>A myriad of increasingly available technical solutions</p>
<p>There are different technical solutions for controlling the content or use of removable media. They can be categorised into several families of solutions:</p>
<ul>
<li>Decontamination terminals or boxes, using one or more antivirus databases, allow us to analyse the USB key content, and if necessary, (re)format or quarantine files if they are considered malicious. Several manufacturers offer this type of solution, including KUB, HOGO, Orange and SOTERIA.</li>
<li>More complex ones can issue a certificate to the key after it has gone through the decontamination terminal. This certificate validates (to the host) that the key has been scanned. This requires that an agent is deployed on all workstations to enable certificate authentication. OPSWAT and FACTORY Systems are among the manufacturers. Previously mentioned KUB, also offers this more complex option on these boxes.</li>
<li>Lastly, there is a solution to group the devices that are used as filters, effectively acting as security airlocks between the host and the removable media. This is a small piece of equipment, connected directly to the USB port of the host on one side, and to the USB key on the other side. Its operation is based on white-list filtering and/or blocking writing from the workstation to the removable media. SECLAB is an example of a manufacturer for this solution.</li>
</ul>
<p>Since all solution offers have different characteristics, it is necessary to identify the one that best meets the security requirements and constraints of the user.</p>
<p>&nbsp;</p>
<h3>These technical solutions create additional steps and require time, which may hinder their adoption</h3>
<p>Depending on the technical solution, the cleansing of removable media is a step that can be time-consuming.  For example, if the key contains lots of small files that must all be checked, the processing time will increase. This task is also highly dependent on the performance of the media being tested.</p>
<p>Additionally, a problem of sizing the terminal arises if the removable media is used to push several large updates (Microsoft for example) or even a complete WSUS database (Windows Server Update Services) between 2 networks (this can reach a 100GB of data). If this time is not controlled and limited, removable media users will stay clear of this technology.</p>
<p>Difficult access also discourages users. In the industrial sector, there are many constraints depending on where users are located. A change of area may require a change of protective equipment, clothing or special controls. Insufficient equipment could lead to the same accessibility problem.</p>
<p>It is necessary to place the right equipment where decontamination is taking place or is unavoidable (reception, security office), and to find the right compromise between the different implementation of solutions: e.g. a solution applied centrally (terminal) vs. distributed (box or filter).</p>
<p>&nbsp;</p>
<h3>These technical solutions often require maintenance in operational condition (MOC) and maintenance in safety condition (MSC) which must not be neglected</h3>
<p>To properly function, the technical solutions must be maintained by updating them, updating their viral databases for when the solution integrates an anti-virus, updating the filtering rules, as well the certificate database for more complex systems. It is also useful to be able to issue reports and alerts when the tool permits.</p>
<p>For this purpose, the decontamination terminals require several types of access:</p>
<ul>
<li>antivirus updates on servers;</li>
<li>internal operating system updates on servers;</li>
<li>the supervision network for issuing reports and alerts;</li>
<li>Sometimes to a dedicated server that will manage the certificate database and centralise administration.</li>
</ul>
<p>These terminals can therefore be integrated into a more, or less complex architecture as required.</p>
<p>Decontamination terminals are equipped with an operating system and often standard applications, hence the importance of hardening their configurations so they themselves are not the victim of an attack.</p>
<p>It is necessary to conduct a study on the possible technical solutions by putting into perspective the reliability, utility, efficiency and cost of each option. Similarly, it is essential to review the governance of these facilities, which are at the crossroads between the management information system and the industrial information system. This should avoid problems of underestimating the implementation of these solutions and stop users turning away from the chosen solution.</p>
<p>The protection of industrial systems against USB-related threats requires a careful choice of technical solution and availability for users. Without this and without awareness of the cybersecurity issues, systems are exposed, and the impacts of an attack can be significant.</p>
<p>&nbsp;</p>
<h2><strong>These tools must be the subject of a full project: from the consideration of use cases and change management</strong></h2>
<h3>The use cases must be known to decide between the different solutions or even eliminate the use of the removable media</h3>
<p>Before proposing a technical solution, the first question to ask yourself is <em>why do we need to use the removable media?</em> To answer this question, you must list all the different use cases.</p>
<p>In each case, it must be determined whether their use is appropriate and whether there is no more effective and/or safe alternative. Here are some examples of commonly encountered situations for which alternative solutions exist:</p>
<ul>
<li>If a USB key is used as storage for config. files, then a centralised solution or at least storage on suitable equipment can be used.</li>
<li>In the case of media being used between two devices that are connected to a network, the implementation of an exchange server, for example using a secure protocol such as SFTP, can be considered.</li>
<li>For maintenance teams working on connected systems that use removable media to update configuration files, an MFT (Managed File Transfer) exchange gateway with antivirus control can be used. This application ensures the safety of a file from an external source before making it available internally. A third-party solution would be able to make secure removable media available to staff or maintenance teams by only allowing editing of media from workstations.</li>
</ul>
<p>In the remaining cases, an appropriate solution should be considered. The solution should be presented to users and its interest explained. For better adoption, it should have as little influence as possible on the pre-existing business process, and as a minimum, it should not lead to an excessive workload or time commitment.</p>
<p>&nbsp;</p>
<h3>In addition to being integrated with the business use case, the technical solution must meet the intended security objectives</h3>
<p>2 selection criteria must be taken into account when deploying a removable media security solution: the business use case and the security objectives targeted.</p>
<p>The security objectives are often the same: check that a storage device is genuinely a storage device (i.e. not a &#8220;Bad USB&#8221;) and check that it does not contain a virus or viral payload. These 2 objectives are covered by most solutions on the market.</p>
<p>It is therefore the business use case that will influence the ergonomics of the chosen solution:</p>
<ul>
<li>A fixed monobloc terminal integrates well into the entrance of an area reserved for operations such as a laboratory or workshop. On the other hand, a tablet will be much more mobile and can be used in several situations.</li>
<li>A certificate solution requiring an equipment agent on standard workstations without specific qualifications will not be difficult but can be problematic in qualified or already obsolete environments.</li>
<li>Mobiles always need a way to control; a filter solution can be considered for this.</li>
</ul>
<p>Once the type of solution has been chosen, the possibilities of integrating the solution into the existing ecosystem with proposed security measures will make it easier to select the most appropriate one.</p>
<p>&nbsp;</p>
<h3><u>The chosen solution must integrate administration and incident reporting functions while guaranteeing an appropriate level of security</u></h3>
<p>The chosen tool must be easily manageable and have a centralised administration function if there is a significant number of facilities being planned. It is also necessary that the following elements of the solution can be updated: the operating system, the embedded applications, antivirus applications, and the signature databases.</p>
<p>These features mean that the solution will need a connection to the administration network and an external connection to retrieve these updates. These connections must be secure, and the update server systematically identified.</p>
<p>In addition, it is necessary to take precautions to ensure that the solution has been hardened and that only the useful functions are available, especially at the operating system level. It would be pointless if the key decontamination tool itself was the vector of key contamination!</p>
<p>Finally, it is preferable that the generated reports and event logs can be sent in a standard Syslog format, centralised and also analysed by an existing SIEM to detect and track any suspicious activities.</p>
<p>&nbsp;</p>
<h3>In conclusion, the implementation must be approved by the people who will actually use the terminal every day</h3>
<p>There are many technical solutions that, by analysing and decontaminating these devices, can reduce exposure by removable media in industrial networks. There are 2 success factors for good implementation:</p>
<ul>
<li>A solution designed for business use cases with end users in mind; and</li>
<li>A solution where administrative factors, the update process and security aspects have been considered upstream.</li>
</ul>
<p>In addition to these, there is a 3<sup>rd</sup> success factor: change management, which must ensure that the new tool is properly integrated into existing processes with appropriate communication to end users.</p>
<p>It is necessary to formalise a procedure in case there is a virus or any other abnormality. Detecting is ultimately only the first step towards an appropriate response.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/12/removable-media-decontamination-tools/">Removable media decontamination tools &#8211; success factors for effective security gain and successful deployment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Industrial Control Systems Cybersecurity News #2 &#8211; Radiology of the cybersecurity level of the healthcare sector</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/06/ics-news-2-en/</link>
		
		<dc:creator><![CDATA[Ilias Sidqui]]></dc:creator>
		<pubDate>Tue, 05 Jun 2018 13:18:33 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[manuf & industry 4.0]]></category>
		<category><![CDATA[Newsletter]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10822/</guid>

					<description><![CDATA[<p>&#62;&#62;FOCUS Last year, the National Health Service England (NHS) faced its most important cybersecurity crisis due to the Wannacry ransomware attack. In October 2017, the National Audit Office (NAO) published a report showing that at least 34% of trusts in...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/06/ics-news-2-en/">Industrial Control Systems Cybersecurity News #2 &#8211; Radiology of the cybersecurity level of the healthcare sector</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>&gt;&gt;FOCUS</h2>
<p>Last year, the National Health Service England (NHS) faced its most important cybersecurity crisis due to the Wannacry ransomware attack. In October 2017, the National Audit Office (NAO) published a <a href="https://www.nao.org.uk/report/investigation-wannacry-cyber-attack-and-the-nhs/">report</a> showing that at least 34% of trusts in England were disrupted, and around 19,494 patient appointments canceled including canceled patient operations. This was mainly due to the fact that the information system managing the appointments, the patients’ records or test results were infected by the ransomware.</p>
<p>However, the report points out that medical devices such as MRI scanners (that have Windows XP embedded within them) were also locked by the ransomware. Only 1,220 devices were infected representing 1% of the overall amount, because several equipments were disconnected to avoid the ransomware propagation. So why the healthcare sector suffered from such an attack and how come the ransomware spread that easily?</p>
<h3>Healthcare cybersecurity: Low maturity level</h3>
<p>The NAO report highlighted the challenges that the NHS had to face to tackle the attack. These challenges seem similar to the ones that several industries and manufacturers have been facing showing that an analogy of the healthcare information systems and the industrial control systems (ICS) have the same weaknesses.</p>
<p>Indeed, both ICS and Health Information Systems (HIS)face the same cybersecurity challenges, among them:</p>
<ul>
<li>The wide use of legacy devices and operating systems (such as Windows XP);</li>
<li>The length of the window of exposure of these systems (the window of exposure is the time between the vulnerability disclosure and the patching of the system): the vendors support or the quality guidelines and regulations may represent obstacles for a fast patching (a recent <a href="https://www.hipaajournal.com/study-reveals-poor-patching-practices-in-healthcare/">survey</a> conducted on 3000 security professionals working for healthcare and pharmaceutical organizations, show that 57% of the respondents had experienced at least a data breach which was conducted after the exploitation of a vulnerability for which a patch had been previously released);</li>
<li>Critical and unsecure devices directly connected to the Internet exposing the medical network. For example, McAfee published a <a href="https://securingtomorrow.mcafee.com/mcafee-labs/mcafee-researchers-find-poor-security-exposes-medical-data-to-cybercriminals/">report</a> explaining how they exploited an unsecure and connected Picture Archiving and Communication System (PACS – device that stores and shares images coming from imaging devices such as scanners) to use personal medical data;</li>
<li>Lack of security by design: several organizations and researchers have been alerting on several flows affecting medical devices such as pacemakers (<a href="http://www.bbc.com/news/technology-41099867">Cyber-flaw affects 745,000 pacemakers – BBC</a>), insulin pumps (<a href="https://www.reuters.com/article/us-johnson-johnson-cyber-insulin-pumps-e-idUSKCN12411L">J&amp;J warns diabetic patients: Insulin pump vulnerable to hacking – Reuters</a>) or infusion pumps (<a href="https://www.blackhat.com/docs/eu-17/materials/eu-17-Harit-Breaking-Bad-Stealing-Patient-Data-Through-Medical-Devices.pdf">Black hat conference [PDF]</a>)</li>
</ul>
<figure id="post-10823 media-10823" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-10823 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1.png" alt="" width="809" height="511" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1.png 809w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1-302x191.png 302w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1-768x485.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1-62x39.png 62w" sizes="auto, (max-width: 809px) 100vw, 809px" /></figure>
<h3>A growing threat on the healthcare sector</h3>
<p>The low cybersecurity maturity level of the healthcare sector combined with the continuous interest of some actors on personal data or life threatening made the threat skyrocket these past few years. Indeed, several cybersecurity companies have been alerting on a growing number of cyber threat actors who are targeting healthcare sector, for example:</p>
<ul>
<li>In the last newsletter was reported that a US hospital was hit by Samsam ransomware in January 2018. Samsam is only one of the numerous ransomware that targeted hospitals among them Locky;</li>
<li>In March 2018, <a href="https://www.kaspersky.com/about/press-releases/2018_chinese-speaking-apt-actor-caught-spying-on-pharmaceutical-organizations">Kaspersky researchers</a> discovered that a Chinese-speaking group used PlugX malware (remote access tool which has been used previously by several groups since 2012) in pharmaceutical organizations for stealing information;</li>
<li>In April 2018, <a href="https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia">Symantec</a> identified a new attack group named Orangeworm. This group has been targeting healthcare sector companies (equipments manufactures, pharmaceutical, health organizations) for several years. Orangeworm has been using a backdoor called Kwampirs which collects data in the infected systems. This malware propagates easily in Windows XP devices.</li>
</ul>
<figure id="post-10825 media-10825" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-10825 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-2.png.jpg" alt="" width="721" height="437" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-2.png.jpg 721w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-2.png-315x191.jpg 315w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-2.png-64x39.jpg 64w" sizes="auto, (max-width: 721px) 100vw, 721px" /></figure>
<h3 class="align-none">Protecting against</h3>
<p>In order to curb the number of security incidents in the healthcare sector, several measures can be, and in some cases have already been, implemented among them:</p>
<ul>
<li>Design of a global cybersecurity governance by implementing a cybersecurity policy;</li>
<li>Conduction of awareness campaigns towards the hospital staff on the cybersecurity threats;</li>
<li>Implementation of patch management procedure in order to reduce the window of exposure of the system (a combined work with the vendors and the regulation organizations may be required so the patching covers the largest amount of device as possible);</li>
<li>Network segregation into several levels of protection matching the level of criticality (medical devices should be highly protected).</li>
</ul>
<figure id="post-10827 media-10827" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-10827 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /><em>Several governmental agencies and institutions have been publishing reports and guidelines in order to help healthcare organizations and the medical devices suppliers in securing their network or providing more secure medical devices. You will find here after some of the documents:</em></figure>
<ul>
<li><a href="https://www.enisa.europa.eu/publications/cyber-security-and-resilience-for-smart-hospitals">Cyber security and resilience for Smart Hospitals &#8211; ENISA</a></li>
<li><a href="https://www.enisa.europa.eu/publications/security-and-resilience-in-ehealth-infrastructures-and-services">Security and Resilience in eHealth Infrastructures and Services &#8211; ENISA</a></li>
<li><a href="http://esante.gouv.fr/sites/default/files/Guide_Pratique_Dispositif_Connecte.pdf">Guide Pratique : Règles pour les dispositifs connectés d’un Système d’Information de Santé &#8211; Agence des systèmes d’information partagés de santé [PDF]</a></li>
<li><a href="https://www.fda.gov/RegulatoryInformation/Guidances/ucm070634.htm">Information for Healthcare Organizations about FDA&#8217;s &#8220;Guidance for Industry: Cybersecurity for Networked Medical Devices Containing Off-The-Shelf (OTS) Software&#8221; &#8211; FDA</a></li>
<li><a href="https://www.fda.gov/AboutFDA/CentersOffices/OfficeofMedicalProductsandTobacco/CDRH/CDRHReports/ucm604500.htm">The U.S Food &amp; Drug Administration released its Medical Device Safety Action Plan in April 2018</a></li>
</ul>
<figure id="post-10827 media-10827" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-10827 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /></figure>
<h2>&gt;&gt;Latest news</h2>
<table width="0">
<tbody>
<tr>
<td width="206">
<figure id="post-10862 media-10862" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10862" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-4.png-4.jpg" alt="" width="187" height="105" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-4.png-4.jpg 187w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-4.png-4-69x39.jpg 69w" sizes="auto, (max-width: 187px) 100vw, 187px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Aerial tramway with security holes</strong></p>
<p><em>Golem.de, April 19t<sup>h</sup></em></p>
<p>Two white hackers found the control system of a new aerial tramway in the internet without any security measures. According to them, the commands were sent unencrypted, the authentication wasn’t provided and the web application was vulnerable to cross-site scritping and HTTP header injection attacks. <a href="https://www.golem.de/news/patscherkofel-gondelbahn-mit-sicherheitsluecken-1804-133930.html">Link to the article</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10864 media-10864" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10864" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-5.png-1.jpg" alt="" width="184" height="41" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-5.png-1.jpg 184w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-5.png-1-71x16.jpg 71w" sizes="auto, (max-width: 184px) 100vw, 184px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Patch Plugs More Than a Dozen Vulnerabilities Affecting Industrial Secure Router Series</strong></p>
<p><em>Tripwire, April 16<sup>th</sup></em></p>
<p>Cisco Talos published a report revealing several vulnerabilities affecting the Moxa EDR-810 industrial secure router with firewall/NAT/VPN and manager layer 2 switch functions. This router sets perimetric security for critical assets such as pumping/treatment systems in water stations, Distributed Control Systems (DCS) in oil and gas stations … Many of the flaws received a CVSS score of 8.8. Moxa released an updated version of the firmware. <a href="https://www.tripwire.com/state-of-security/latest-security-news/patch-plugs-more-than-a-dozen-vulnerabilities-affecting-industrial-secure-router-series/">Link to the article</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10866 media-10866" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10866" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-6.png-1.jpg" alt="" width="185" height="60" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-6.png-1.jpg 185w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-6.png-1-71x23.jpg 71w" sizes="auto, (max-width: 185px) 100vw, 185px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Advisory: Hostile state actors compromising UK organisations with focus on engineering and industrial control companies</strong></p>
<p><em>NCSC, April 5th</em></p>
<p>The National Cyber Security Centre (NCSC) published an advisory revealing that several ongoing attacks have been targeting mainly engineering and industrial control companies since March 2017. The attacks are involving the harvesting of credentials using strategic web compromises and spear-phishing. The advisory also refers to the Department of Homeland Security (DHS) and FBI joint Technical Alert (see below for more information). <a href="https://www.ncsc.gov.uk/alerts/hostile-state-actors-compromising-uk-organisations-focus-engineering-and-industrial-control">Link to the advisory</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10868 media-10868" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10868" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-7-1.png" alt="" width="175" height="37" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-7-1.png 175w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-7-1-71x15.png 71w" sizes="auto, (max-width: 175px) 100vw, 175px" /></figure>
<figure id="post-10870 media-10870" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10870" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-72.png" alt="" width="387" height="48" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-72.png 387w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-72-71x9.png 71w" sizes="auto, (max-width: 387px) 100vw, 387px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Sentryo Provides Anomaly Detection Technology to Siemens to Address the Cybersecurity Challenges of industrial infrastructures</strong></p>
<p><em>Sentryo, April</em></p>
<p>Siemens and Sentryo signed an agreement in which Siemens AG will provide Sentryo ICS CyberVision solution to its clients among Siemens products and services. Sentryo’s solution is an asset management and anomaly detection tool designed for Industrial Control Systems. <a href="https://www.sentryo.net/wp-content/uploads/2018/04/CP_Partenariat-Sentryo-Siemens_FR.pdf">Link to the press release [FR][PDF]</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10872 media-10872" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10872" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-8-1.png" alt="" width="191" height="181" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-8-1.png 191w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-8-1-41x39.png 41w" sizes="auto, (max-width: 191px) 100vw, 191px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>ISA announces newly published ISA/IEC 62443-4-1-2018 security standard</strong></p>
<p><em>Automation.com, March 28<sup>th</sup></em></p>
<p>The international Society of Automation released the Part 4-1 of the ISA/IEC 62443 standard. This part tackles the Product Security Development Life-Cycle Requirements. “It defines a secure development life-cycle for developing and maintaining secure products.” This includes several concepts such as security by design, patch management and product end-of-life. <a href="https://www.automation.com/automation-news/industry/isa-announces-newly-published-isaiec-62443-4-1-2018-security-standard">Link to the article</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10874 media-10874" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10874" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-9-1.png" alt="" width="187" height="75" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-9-1.png 187w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-9-1-71x28.png 71w" sizes="auto, (max-width: 187px) 100vw, 187px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Schneider Electric Launches Cybersecurity Virtual Academy</strong></p>
<p><em>ISS Source, March 27<sup>th</sup></em></p>
<p>Schneider Electric launched the Cybersecurity Virtual Academy which is a website that provides several materials to raise the awareness of the cybersecurity risks in the industrial control systems. <a href="http://www.isssource.com/schneider-electrics-cybersecurity-virtual-academy/">Link to the article</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10876 media-10876" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10876" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-10-1.png" alt="" width="192" height="104" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-10-1.png 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-10-1-71x39.png 71w" sizes="auto, (max-width: 192px) 100vw, 192px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Threat landscape for industrial automation systems in H2 2017</strong></p>
<p><em>Kaspersky lab, March 26<sup>th</sup></em></p>
<p>Kaspersky has published a report on the threat landscape over the industrial control systems during the second semester of 2017. In the report, Kaspersky analyses the vulnerabilities discovered by the ICS-CERT and the ones identified by Kaspersky Lab ICS Cert. Here are some figures given in the report:</p>
<ul style="list-style-type: disc;">
<li>322 vulnerabilities were identified by ICS-CERT and more than 50% of them are impacting the energy sector;</li>
<li>3,3% of industrial automation system computers were attacked by cryptocurrency mining programs during the period from February 2017 to January 2018;</li>
<li>10,8% of all ICS systems were attacked by botnet agents during 2017. The mains sources of botnet agent attacks on ICS systems in 2017 were internet, removable media and email messages;</li>
</ul>
<p>The Kaspersky figures show also a certain decrease on the number of attacks on ICS systems between 2016 and 2017. This can be explained by the fact that more and more companies are training their employees and began implementing simple cybersecurity measures. <a href="https://ics-cert.kaspersky.com/reports/2018/03/26/threat-landscape-for-industrial-automation-systems-in-h2-2017/">Link to the report</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10878 media-10878" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10878" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-11-1.png" alt="" width="176" height="46" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-11-1.png 176w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-11-1-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-11-1-175x46.png 175w" sizes="auto, (max-width: 176px) 100vw, 176px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Draft NIST Special Publication 800-160 Volume 2, Systems Security Engineering: Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems</strong></p>
<p><em>NIST, March 21<sup>st</sup></em></p>
<p>The National Institute of Standards and Technology (NIST) released a public draft of the NIST SP 800-160 Volume 2, Systems Security Engineering: Cyber Resiliency Considerations for the engineering of Trustworthy Secure Systems. This document aims to provide guidelines to organizations on how to apply cyber resiliency concepts during the engineering of systems. These guidelines may be applied on new systems, modification of systems, Critical infrastructure systems … <a href="https://csrc.nist.gov/news/2018/draft-sp-800-160-vol-2-released">Link to the release</a> | <a href="https://csrc.nist.gov/CSRC/media/Publications/sp/800-160/vol-2/draft/documents/sp800-160-vol2-draft.pdf">Link to the document</a> [PDF]</td>
</tr>
<tr>
<td width="206">
<figure id="post-10880 media-10880" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10880" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-12.png-1.jpg" alt="" width="190" height="159" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-12.png-1.jpg 190w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-12.png-1-47x39.jpg 47w" sizes="auto, (max-width: 190px) 100vw, 190px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors</strong></p>
<p><em>US-CERT, March 15<sup>th</sup></em></p>
<p>The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published a joint Technical Alert in which give details on how the Russian government targeted several American organizations operating in the energy, nuclear, water, commercial facilities aviation and critical manufacturing sectors (DHS and FBI have already warned about this threat in another alert published in <a href="https://www.us-cert.gov/ncas/alerts/TA17-293A">October</a>). The alert analyzed the attacks using the <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">Lockheed Cyber Kill Chain</a> (stage1:reconnaissance, stage 2: weaponization, stage 3: delivery, stage 4: exploitation, stage 5: installation, stage 6: command &amp; control, stage 7: actions and objectives). The threat actors after gaining access to their victims information system, they conducted reconnaissance operations within the network. They mainly focused on identifying and browsing file servers. They viewed information and files regarding Industrial Control Systems (ICS) or Supervisory Control And Data Acquisition (SCADA) systems. <a href="https://www.us-cert.gov/ncas/alerts/TA17-293A">Link to the alert</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10882 media-10882" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10882" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-13.png-1.jpg" alt="" width="130" height="184" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-13.png-1.jpg 130w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-13.png-1-28x39.jpg 28w" sizes="auto, (max-width: 130px) 100vw, 130px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>‘Cyber event’ disrupts power in Mich. – but don’t blame hackers</strong></p>
<p><em>E&amp;E News, March 8<sup>th</sup></em></p>
<p>An employee of a public utility that provides electricity in Michigan (Consumers Energy) inadvertently cut the electricity to about 15000 consumers. During an “internal testing” the employee overstepped his authority in a control center leading to the outage. The utility the event as a “cyber event” and reported it to the department of Energy even tought the outage had nothing to do with a malware or cyber attack. Since the event, the company adjusted the access controls. <a href="https://www.eenews.net/energywire/stories/1060075765/print">Link to the news</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10884 media-10884" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10884" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-14.png-1.jpg" alt="" width="187" height="141" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-14.png-1.jpg 187w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-14.png-1-52x39.jpg 52w" sizes="auto, (max-width: 187px) 100vw, 187px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>A Qualitative View of 2017 Across vulnerabilities, threats, and lessons learned in hunting and incident response</strong></p>
<p><em>Dragos, March</em></p>
<p>Dragos published 3 reports in which they reveal their findings and analysis regarding the industrial control systems vulnerabilities during 2017, the industrial threat landscape incident response and hunting lessons. Some of the results of these reports are the following:</p>
<ul style="list-style-type: disc;">
<li> “64% of 2017 ICS-related vulnerability patches don’t fully eliminate the risk because the components were insecure by design”;</li>
<li>5 activity groups are working on developing tools and malwares (as Crashoverride that attacked the Ukrainian electric grid in 2016);</li>
<li>The main infection vectors are: unprotected interconnectivity with IT systems, removable media, unprotected interfacility connection and phishing.</li>
</ul>
<p><a href="https://dragos.com/media/2017-Review-Industrial-Control-Vulnerabilities.pdf">Link to the Vulnerabilities report [PDF]</a></p>
<p><a href="https://dragos.com/media/2017-Review-Industrial-Control-System-Threats.pdf">Link to the threat activity groups report [PDF]</a></p>
<p><a href="https://dragos.com/media/2017-Review-Hunting-and-Responding-to-Industrial-Intrusions.pdf">Link to the hunting and responding report [PDF]</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10886 media-10886" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10886" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-15-1.png" alt="" width="175" height="37" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-15-1.png 175w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-15-1-71x15.png 71w" sizes="auto, (max-width: 175px) 100vw, 175px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Siemens report: Mideast’s oil and gas sector needs readiness boost as cyber risk grows</strong></p>
<p><em>Siemens, March</em></p>
<p>A recent report published by Siemens shows that the Middle East facing more and more attacks targeting Operational Technology (OT) (according to the report 30% of the attacks are targeting OT). The report gives the results of a survey on 176 individuals working in the Middle East who are responsible for overseeing the cybersecurity of their organisations. Here are some figures:</p>
<ul style="list-style-type: disc;">
<li>“75% of organizations have suffered at least one security compromise that resulted in the loss of confidential information or disruption to operations in the OT environment over the past 12 months”;</li>
<li>“68% of respondents say the top cyber security threat is the negligent of careless insider”;</li>
<li>“31% of respondents say their organization’s industrial control systems” protection and security are adequate”.</li>
</ul>
<p><a href="http://www.middleeast.siemens.com/me/en/news_events/news/news_2018/siemens-report-mideasts-oil-and-gas-sector-needs-readiness-boost-as-cyber-risk-grows.htm">Link to the press release</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10888 media-10888" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10888" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-16.png-1.jpg" alt="" width="192" height="54" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-16.png-1.jpg 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-16.png-1-71x20.jpg 71w" sizes="auto, (max-width: 192px) 100vw, 192px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>NERC Full Notice of Penalty regarding Unidentified Registered Entity</strong></p>
<p><em>NERC, February 28<sup>th</sup></em></p>
<p>The North American Electric Reliability Corporation (NERC) files a Notice of Penalty of two million seven hundred thousand dollars ($ 2,700,000), in accordance with the Federal Energy Regulatory Commission (FERC), regarding noncompliance by an Unidentified Registered Entity (URE).</p>
<p>Indeed, a third-party URE contractor failed to comply with the information protection program and copied very sensitive data, including records associated with Critical Computer Assets (CCA), from the URE environment on its own unsecured environment. While the data was on the contractor&#8217;s network, a subset of data was available online without the need to enter a username or password for a total of 70 days.</p>
<p>This exposed information increases the risk of a malicious</p>
<p>attacker gaining both physical and remote access to URE&#8217;s systems and access to internal CCAs. <a href="https://www.nerc.com/pa/comp/CE/Enforcement%20Actions%20DL/Public_CIP_NOC-2569%20Full%20NOP.pdf">Link to the article</a></td>
</tr>
</tbody>
</table>
<figure id="post-10828 media-10828" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10828" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /></figure>
<h2>&gt;&gt;Main ICS vulnerabilities</h2>
<table width="100%">
<tbody>
<tr>
<td style="text-align: center;" width="7%"><strong>Date</strong></td>
<td style="text-align: center;" width="13%"><strong>CVSS v3 score</strong></td>
<td style="text-align: center;" width="27%"><strong>Equipment</strong></td>
<td style="text-align: center;" width="34%"><strong>Vulnerability</strong></td>
<td style="text-align: center;" width="16%"><strong>Link to the advisory</strong></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Schneider Electric InduSoft Web Studio and InTouch Machine Edition</td>
<td style="text-align: center;" width="34%">Stack-based Buffer Overflow</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">10.0</td>
<td style="text-align: center;" width="27%">Schneider Electric Triconex Tricon</td>
<td style="text-align: center;" width="34%">Improper Restriction of Operations within the Bounds of a Memory Buffer</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-02">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Rockwell Automation Stratix Services Router</td>
<td style="text-align: center;" width="34%">Improper Input Validation, Improper Restriction of Operations within the Bounds of a Memory Buffer, Use of Externally-Controlled Format String</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Rockwell Automation Stratix and ArmorStratix Switches</td>
<td style="text-align: center;" width="34%">Improper Input Validation, Resource Management Errors, Improper Restriction of Operations within the Bounds of a Memory Buffer, Use of Externally-Controlled Format String</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Rockwell Automation Stratix Industrial Managed Ethernet Switch</td>
<td style="text-align: center;" width="34%">Improper Input Validation, Resource Management Errors, 7PK – Errors, Improper Restriction of Operations within the Bounds of a Memory Buffer, Use of Externally-Controlled Format String</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 5<sup>th</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">10.0</td>
<td style="text-align: center;" width="27%">Rockwell Automation MicroLogix</td>
<td style="text-align: center;" width="34%">Improper Authentication</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-095-01">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 3<sup>rd</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Siemens Building Technologies Products (Update A)</td>
<td style="text-align: center;" width="34%">Stack-based Buffer Overflows, Security Features, Improper Restriction of Operations within the Bounds of a Memory Buffer, NULL Pointer Dereference, XML Entity Expansion, Heap-based Buffer Overflow, Improper Access Control</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-093-01">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Mar. 29<sup>th</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Siemens TIM 1531 IRC</td>
<td style="text-align: center;" width="34%">Missing Authentication for Critical Function</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-088-02">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Mar. 20<sup>th</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Geutebruck IP Cameras</td>
<td style="text-align: center;" width="34%">Improper Authentication, SQL Injection, Cross-Site Request Forgery, Improper Access Control, Server-Side Request Forgery, Cross-site Scripting</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-079-01">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Mar. 13<sup>th</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">9.3</td>
<td style="text-align: center;" width="27%">OSIsoft PI Web API</td>
<td style="text-align: center;" width="34%">Permissions, Privileges, and Access Controls; Cross-site Scripting</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-072-04">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Mar. 1<sup>st</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Moxa OnCell G3100-HSPA Series</td>
<td style="text-align: center;" width="34%">Reliance on Cookies without Validation and Integrity Checking, Improper Handling of Length Parameter Inconsistency, NULL Pointer Dereference</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-060-02">Link</a></td>
</tr>
</tbody>
</table>
<figure id="post-10828 media-10828" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10828" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /></figure>
<h2>&gt;&gt;Upcoming ICS events</h2>
<table style="width: 600px;">
<tbody>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></figure>
<p>Jun. 30-1</td>
<td style="width: 431px; text-align: center;"><a href="https://nuitduhack.com/en/?utm_source=infosec-conferences-com&amp;utm_medium=directory&amp;utm_campaign=free-listing">Nuit du Hack</a></p>
<p>Paris, France</td>
</tr>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png" alt="" width="50" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png 99w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-30x30.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-50x50.png 50w" sizes="auto, (max-width: 50px) 100vw, 50px" /></figure>
<p>Jun. 18</td>
<td style="width: 431px; text-align: center;"><a href="https://weblab.ing.unimore.it/smartindustries/18/?utm_source=infosec-conferences-com&amp;utm_medium=directory&amp;utm_campaign=free-listing">IEEE Workshop on Smart Industries (IEEE SIW)</a></p>
<p>Taormina, Italy</td>
</tr>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png" alt="" width="50" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png 99w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-30x30.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-50x50.png 50w" sizes="auto, (max-width: 50px) 100vw, 50px" /></figure>
<p>Jun. 15</td>
<td style="width: 431px; text-align: center;"><a href="http://www.shipcybersecurity.com/index.htm">European Maritime Cyber Risk Management Summit</a></p>
<p>London, UK</td>
</tr>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png" alt="" width="50" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png 99w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-30x30.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-50x50.png 50w" sizes="auto, (max-width: 50px) 100vw, 50px" /></figure>
<p>May. 22-23</td>
<td style="width: 431px; text-align: center;"><a href="http://industrialcontrolsecuritynuclear.com/?utm_source=infosec-conferences-com&amp;utm_medium=directory&amp;utm_campaign=free-listing">Annual Nuclear Industrial Control Cybersecurity and Resilience Conference (ICCS)</a></p>
<p>Warrington, UK</td>
</tr>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png" alt="" width="50" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png 99w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-30x30.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-50x50.png 50w" sizes="auto, (max-width: 50px) 100vw, 50px" /></figure>
<p>May. 3-4</td>
<td style="width: 431px; text-align: center;"><a href="http://www.global-engage.com/event/cyber-security-summit/?utm_source=infosec-conferences-com&amp;utm_medium=directory&amp;utm_campaign=free-listing">Global Cyber Security in Healthcare &amp; Pharma Summit</a></p>
<p>London, UK</td>
</tr>
</tbody>
</table>
<figure id="post-10828 media-10828" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10828" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/06/ics-news-2-en/">Industrial Control Systems Cybersecurity News #2 &#8211; Radiology of the cybersecurity level of the healthcare sector</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Industrial Control System Cybersecurity News #1 &#8211; What to remember from 2017?</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/03/ics-news-1-en/</link>
		
		<dc:creator><![CDATA[Ilias Sidqui]]></dc:creator>
		<pubDate>Mon, 26 Mar 2018 16:47:21 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[manuf & industry 4.0]]></category>
		<category><![CDATA[Newsletter]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10498/</guid>

					<description><![CDATA[<p>&#62;&#62;Editorial: What to remember from 2017? Industrial Control Systems (ICS) are complex systems that aim to control industrial processes. ICS can be found in several sectors: energy, nuclear, transport, chemistry… In brief these systems control many of the critical productive assets...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/ics-news-1-en/">Industrial Control System Cybersecurity News #1 &#8211; What to remember from 2017?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>&gt;&gt;Editorial: What to remember from 2017?</h2>
<p><em>Industrial Control Systems (ICS) are complex systems that aim to control industrial processes. ICS can be found in several sectors: energy, nuclear, transport, chemistry… In brief these systems control many of the critical productive assets of companies or states making their compromise by adversaries a high risk on the environment or people’s lives.</em></p>
<p>Thus, the <strong>cybersecurity of these systems is crucial</strong>. Moreover, securing these systems may be challenging due to their complexity (mainly because ICS are a mix of technologies and their lifetime is longer than usual information systems’).</p>
<p>In order to meet our clients’ needs and answer to their future concerns, Wavestone has been conducting an <strong>ICS cybersecurity watch where every recent study</strong>, attack or incident and report regarding the security of Industrial Control Systems are studied. In 2017, more than <strong>80 news</strong> were reported from which we can retrieve a lot of teachings.</p>
<h3>So, what did we notice this year?</h3>
<p>First of all, <strong>ICS had its share of attacks</strong>. However, this year’s attacks, more than the other years’, had an unusual worldwide impact. Indeed, while ICS attacks were usually localized on a device (for instance on health devices), factory (for example a cryptomining malware found in a water utility – for more information see below) or a region (Dallas emergency sirens ignition in April 2017), 2017’s attacks started locally and spread quickly impacting several production lines in the world (WannaCry and NotPetya).</p>
<figure id="post-10499 media-10499" class="align-none">
<figure id="post-10573 media-10573" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-10573" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter.png" alt="" width="912" height="539" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter.png 1272w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter-323x191.png 323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter-768x454.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter-66x39.png 66w" sizes="auto, (max-width: 912px) 100vw, 912px" /></figure>
</figure>
<p>&nbsp;</p>
<p>During 2017, many attacks have been reported in the news. Moreover, we noticed that several national agencies, governments or political figures alerted on ongoing attacks or attempts on critical infrastructure. The sector that was the most targeted seems to be the Energy sector. Indeed, several news were reported from Turkey (in January), USA (in March, July), Baltic States (in May), UK (in July) and Ireland (in July) showing that this sector was a privileged target by hackers (state sponsored or not).</p>
<p>The <strong>energy sector wasn’t the only hot topic of the year</strong>, as a matter of fact, <strong>autonomous cars</strong> cybersecurity hit many times the headlines (even if that topic may or may not be considered as related to industrial control systems). This is mainly due to the fact that cars’ cybersecurity is a new market. Therefore, cybersecurity experts and researchers try to find vulnerabilities and exploits (for example vulnerability found in airbag control units), while car manufacturers launch partnerships and initiatives showing that cybersecurity is now one of their main concerns (for example GM invited ethical hackers to try and hack its cars).</p>
<p>Finally, the ICS cybersecurity market tends to grow as demonstrated by the several fundraisings and partnerships signed during this year. In a broader perspective, we can notice t<strong>hree kinds of actors</strong> in the ICS cybersecurity market:</p>
<ul>
<li><strong>ICS cybersecurity companies</strong>: usually small-sized companies or start-ups. They are pure-players that develop and put in the market ICS-dedicated solutions (Sentryo, CyberX, Nozomi …);</li>
<li><strong>ICS vendors</strong>: we noticed last year, some vendors that conceive ICS launched partnerships with ICS cybersecurity companies to improve their systems’ security (for example Siemens-PAS partnership in September, Schneider-Claroty partnership in August);</li>
<li><strong>IT security companies</strong>: these companies (well known in the IT world) tailor their solutions for industrial context. They show a growing interest for ICS by publishing reports and attack analysis (for example Kaspersky, McAfee).*</li>
</ul>
<h3>So, what is coming next?</h3>
<p>It may be easy to say that the ICS cybersecurity will still (unfortunately) hit the headlines. Especially with alerts of attacks targeting life threatening system such as the safety instrumented systems controllers. But, we may see more and more news on specific sectors such as maritime, transport, health… that weren’t somehow as exposed in the media as the energy or nuclear sector. The ICS cybersecurity market may continue to grow especially with partnerships and acquisitions. Industrial Control Systems will continue to face new threats, challenges and changes.</p>
<h2>&gt;&gt;Latest news:</h2>
<figure id="post-10532 media-10532" class="align-none"></figure>
<table style="width: 701px; height: 3639px; border-color: #ffffff; border-right-color: #ffffff;" border="1" cellpadding="10">
<tbody>
<tr>
<td style="width: 156.91px;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10506" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image1-1.png" alt="" width="326" height="138" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image1-1.png 326w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image1-1-71x30.png 71w" sizes="auto, (max-width: 326px) 100vw, 326px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>CyberX raises $18 million in series B funding to combat rising threats to IIoT and critical infrastructure, bringing total funding to $30 million (CyberX, February 27<sup>th</sup>)</strong></p>
<p>CyberX announced that the company raised $18 million dollars to develop threat detection in the Industrial Internet of Things (IIoT) and critical infrastructures. The company develops a threat monitoring and risk mitigation platform that includes ICS-specific threat intelligence. <a href="https://cyberx-labs.com/en/press-releases/cyberx-raises-18-million-series-b-funding-combat-rising-threats-iiot-critical-infrastructure-bringing-total-funding-30-million/">Link to the press release</a></td>
</tr>
<tr>
<td style="width: 156.91px;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10510" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image2.png-437x114.jpg" alt="" width="437" height="114" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image2.png-437x114.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image2.png-71x19.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image2.png.jpg 447w" sizes="auto, (max-width: 437px) 100vw, 437px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Fun with Modbus 0x5A (<em>Security Insider, February 9th</em>)</strong></p>
<p>During the last edition of Defcon in Las Vegas, Wavestone presented its latest study regarding the ModBus protocol cybersecurity and specifically the function 90. An attacker may thanks to this function start, stop a controller or force it to send a determined output value,  <a href="http://www.securityinsider-wavestone.com/2018/02/fun-with-modbus-0x5a.html">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10512" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3-268x191.jpg" alt="" width="268" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3-268x191.jpg 268w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3-55x39.jpg 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3-345x245.jpg 345w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3.jpg 409w" sizes="auto, (max-width: 268px) 100vw, 268px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>ICS detection challenge results (<em>Dale Peterson, February 7th</em>)</strong></p>
<p>At the S4x18 in January, took place the ICS Detection Challenge. The 4 companies that completed the challenge are: Claroty, Gravwell, Nozomi Networks and Security Matters. The first part of the challenge consists on evaluating the ICS Detection class of 3 products which are: Claroty, Nozomi Networks and Security Matters. It was won by Claroty over Nozomi Networks and Security Matters. The competitors&#8217; products had to detect cyber-attacks and incidents occurring on an oil&amp;gas company. <a href="https://dale-peterson.com/2018/02/11/ics-detection-challenge-results-part-1/">Link to the results</a></p>
<p>The second part which consists in the asset detection phase was also won by Claroty even though Nozomi provided the most details in their asset inventory. <a href="https://dale-peterson.com/2018/02/13/ics-detection-challenge-part-ii/?utm_content=buffer46f44&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer">Link to the results</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10514" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image4-287x191.jpg" alt="" width="287" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image4-287x191.jpg 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image4-59x39.jpg 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image4.jpg 720w" sizes="auto, (max-width: 287px) 100vw, 287px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Water utility in Europe hit by cryptocurrency malware mining attack (<em>eWeek, February 7th</em>)</strong></p>
<p>The security firm Radiflow discovered a cryptocurrency mining malware in the network of a water service provider in Europe. The malware was downloaded from a malicious advertising site infecting the Human Machine Interface and then spread to the SCADA network that was still running Microsoft Windows XP OS. The malware degraded the system performance. Tough the degradation wasn’t noticed by the operators. <a href="http://www.eweek.com/security/water-utility-in-europe-hit-by-cryptocurrency-malware-mining-attack">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10516" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5-323x191.jpg" alt="" width="323" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5-323x191.jpg 323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5-66x39.jpg 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5.jpg 436w" sizes="auto, (max-width: 323px) 100vw, 323px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Ukraine power distributor plans cyber defense system for $20 million (<em>Reuters, February 6th</em>)</strong></p>
<p>Ukraine’s state-run power distributor Ukrenergo, which was a target for cyber-attacks in the past two years (December 2016 and December 2017), will invest up to $20 million in a new cyber defense system. The acting head of Ukrainian state power distributor Ukrenergo, told that the company and international consultants had identified about 20 threats that would be eliminated with the new system. The main goal of this system is to make “physically impossible for external threats to affect the Ukrainian energy system”. <a href="https://www.reuters.com/article/us-ukraine-cyber-ukrenergo/ukraine-power-distributor-plans-cyber-defense-system-for-20-million-idUSKBN1FQ1TD">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10518" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image6.jpg" alt="" width="297" height="178" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image6.jpg 297w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image6-65x39.jpg 65w" sizes="auto, (max-width: 297px) 100vw, 297px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Increasing number of industrial systems accessible from web (<em>study Security Week, February 2nd</em>)</strong></p>
<p>According to a new report published by Positive Technologies, the number of industrial control systems (ICS) accessible from the Internet has increased significantly during the past year. Most of vulnerabilities of these systems could be exploited remotely without needing to obtain any privileges in advance. The most common types of vulnerabilities were remote code execution (24%), information disclosure (17%), and buffer overflows (12%).Most of these systems are accessible via HTTP, followed by the Fox building automation protocol associated with Honeywell’s Niagara framework, Ethernet/IP, BACnet, and the Lantronix discovery protocol. <a href="https://www.securityweek.com/increasing-number-industrial-systems-accessible-web-study">Link to the article</a> | <a href="https://www.securityweek.com/increasing-number-industrial-systems-accessible-web-study">Link to the report</a> [PDF]</td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10520" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image7-337x191.jpg" alt="" width="337" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image7-337x191.jpg 337w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image7-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image7.jpg 454w" sizes="auto, (max-width: 337px) 100vw, 337px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Flaws in gas station software let hackers change prices, steal fuel, erase evidence (<em>Motherboard, January 31st</em>)</strong></p>
<p>Security researchers were able to connect to a web interface that manages gas station thanks to Shodan (search engine of connected devices). After using the default admin login and password, and then a hardcoded username and password, the researchers were able to shut down fuel pumps, hijack credit card payments, and steal card numbers. <a href="https://motherboard.vice.com/en_us/article/43qkgb/flaws-in-gas-station-software-let-hackers-change-prices-steal-fuel-erase-evidence">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10522" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image8-340x191.jpg" alt="" width="340" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image8-340x191.jpg 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image8-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image8.jpg 433w" sizes="auto, (max-width: 340px) 100vw, 340px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Government warns critical industry firms to prepare for cyberattacks (<em>Sky news, January 29th</em>)</strong></p>
<p>All companies which are involved in critical industry and essential services, such as energy, transport, water, health and digital infrastructure, have been warned by the British government that they face sanctions if they do not include cybersecurity rules in their systems.The fines come as the government implements the Network and Information Systems (NIS) Directive, which would cover events such as the WannaCry attack. <a href="https://news.sky.com/story/government-warns-critical-industry-firms-to-prepare-for-cyberattacks-11226555">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10524" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image10-148x191.png" alt="" width="148" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image10-148x191.png 148w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image10-30x39.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image10.png 311w" sizes="auto, (max-width: 148px) 100vw, 148px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Gemalto licensing tool exposes ICS, corporate systems to attacks (<em>Security week, January 22nd</em>)</strong></p>
<p>Kaspersky Lab researchers found 14 vulnerabilities in Gemalto Sentinel LDK (software) and the associated USB Dongle (SafeNet). The USB dongle is used to activate the software. When connected, drivers are installed and the port 1947 is added to the list of exceptions in the Windows firewall. This port can be exploited to identify remotely accessible devices. <a href="https://www.securityweek.com/gemalto-licensing-tool-exposes-ics-corporate-systems-attacks">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10526" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11-316x191.png" alt="" width="316" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11-316x191.png 316w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11-768x464.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11.png 1046w" sizes="auto, (max-width: 316px) 100vw, 316px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>SamSam ransomware hits hospitals, city councils, ICS firms (<em>Bleeping Computer, January 19th</em>)</strong></p>
<p>Samsam ransomware hit several hospitals, city councils and an ICS firm. Hancock Health admitted paying the ransom ($55.000) even though they had backups. The Samsam ransomware spread by brute forcing RDP connections. <a href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/?utm_source=dlvr.it&amp;utm_medium=twitter">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10528" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image12.jpg" alt="" width="376" height="169" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image12.jpg 376w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image12-71x32.jpg 71w" sizes="auto, (max-width: 376px) 100vw, 376px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Industrial systems scrambling to catch up with Meltdown, Spectre (<em>The Register, January 18th</em>)</strong></p>
<p>Meltdown and Spectre vulnerabilities also had an impact on industrial control systems. Some vendors decided to publicly communicate about their vulnerable products (OSISoft for example), other vendors like Emerson and General electric keep the information only for their customers and finally some vendors are still investigating if their products are vulnerable to Meltdown and Spectre. <a href="https://www.theregister.co.uk/2018/01/18/ics_cert_meltdown_responses/">Link to the article</a><br />
<em>For more information on Meltdown and Spectre vulnerabilities, you can read this <a href="http://www.securityinsider-wavestone.com/2018/01/meltdown-spectre-attaques-par-canaux-auxilliaires.html">post by Wavestone on Security Insider</a> [French]</em></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10530" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image13-287x191.jpg" alt="" width="287" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image13-287x191.jpg 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image13-59x39.jpg 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image13.jpg 350w" sizes="auto, (max-width: 287px) 100vw, 287px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Researchers find 147 vulnerabilities in 34 SCADA mobile applications (<em>SC Magazine, January 11th</em>)</strong></p>
<p>IoActive and Embedi researchers found 147 vulnerabilities in 34 mobile applications used in tandem with Supervisory Control and Data Acquisition (SCADA) systems. The top vulnerabilities were: code tampering flaws, insecure authorization, insecure data storage&#8230; This security weaknesses could allow an attacker to compromise industrial network infrastructure by exploiting the vulnerable applications. <a href="https://www.scmagazine.com/the-top-security-weaknesses-were-code-tampering-flaws-which-were-found-in-94-percent-of-apps/article/736656/">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10532" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image14.png" alt="" width="246" height="72" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image14.png 246w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image14-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image14-245x72.png 245w" sizes="auto, (max-width: 246px) 100vw, 246px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Industrial Cybersecurity Firm Nozomi Networks Raises $15 Million (<em>Security Week, January 10th</em>)</strong></p>
<p>Nozomi is an industrial cybersecurity firm that has recently raised $23.8 million. Nozomi’s offering which is “SCADAguardian”, consists on using machine learning and behavioral analysis to detect zero-day attacks in real-time. This technology allows rapid response to alerts by ICS incident alerting and notification systems. The company said the additional funding will be used to support worldwide expansion of marketing, sales, support and product innovation. <a href="https://www.securityweek.com/industrial-cybersecurity-firm-nozomi-networks-raises-15-million">Link to the article</a></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2>&gt;&gt;Main ICS vulnerabilities</h2>
<table style="height: 705px; width: 701px; border-color: #ffffff;" cellpadding="3">
<tbody>
<tr style="height: 26px; background-color: #d1cdcd;">
<td style="width: 67.6042px; height: 26px; text-align: center;"><strong>Date</strong></td>
<td style="width: 66.4931px; height: 26px; text-align: center;"><strong>CVSS v3</strong></td>
<td style="width: 128.715px; height: 26px; text-align: center;"><strong>Equipment</strong></td>
<td style="width: 308.715px; height: 26px; text-align: center;"><strong>Vulnerability</strong></td>
<td style="width: 82.0486px; height: 26px; text-align: center;"><strong>Advisory</strong></td>
</tr>
<tr style="height: 53px;">
<td style="width: 67.6042px; height: 53px; text-align: center;">Feb. 15<sup>th</sup></td>
<td style="width: 66.4931px; height: 53px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 53px;">Nortek Linear eMerge E3 Series</td>
<td style="width: 308.715px; height: 53px;">Command Injection</td>
<td style="width: 82.0486px; height: 53px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-046-02">Link</a></td>
</tr>
<tr style="height: 74px;">
<td style="width: 67.6042px; height: 74px; text-align: center;">Feb. 15<sup>th</sup></td>
<td style="width: 66.4931px; height: 74px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 74px;">GE D60 Line Distance Relay</td>
<td style="width: 308.715px; height: 74px;">Stack-based Buffer Overflow, Improper Restriction of Operations within the Bounds of a Memory Buffer</td>
<td style="width: 82.0486px; height: 74px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-046-02">Link</a></td>
</tr>
<tr style="height: 98px;">
<td style="width: 67.6042px; height: 98px; text-align: center;">Feb. 13<sup>th</sup></td>
<td style="width: 66.4931px; height: 98px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 98px;">Wago PFC200 Series</td>
<td style="width: 308.715px; height: 98px;">Execution of some unauthenticated commands such as reading, writing, or deleting arbitrary files, or manipulate the PLC application during runtime.</td>
<td style="width: 82.0486px; height: 98px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-044-01">Link</a></td>
</tr>
<tr style="height: 54px;">
<td style="width: 67.6042px; height: 54px; text-align: center;">Feb. 8<sup>th</sup></td>
<td style="width: 66.4931px; height: 54px; text-align: center;">9.9</td>
<td style="width: 128.715px; height: 54px;">Gemalto Sentinel License Manager</td>
<td style="width: 308.715px; height: 54px;">Null Pointer Dereference, Buffer Overflows, Improper Access Control.</td>
<td style="width: 82.0486px; height: 54px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-032-03">Link</a></td>
</tr>
<tr style="height: 74px;">
<td style="width: 67.6042px; height: 74px; text-align: center;">Feb. 1<sup>st</sup></td>
<td style="width: 66.4931px; height: 74px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 74px;">3S-Smart Software Solutions GmbH Codesys Web Server</td>
<td style="width: 308.715px; height: 74px;">Stack-based Buffer Overflow.</td>
<td style="width: 82.0486px; height: 74px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-032-02">Link</a></td>
</tr>
<tr style="height: 12.042px;">
<td style="width: 67.6042px; height: 12.042px; text-align: center;">Jan. 25<sup>th</sup></td>
<td style="width: 66.4931px; height: 12.042px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 12.042px;">Nari PCS-9611</td>
<td style="width: 308.715px; height: 12.042px;">Improper Input Validation.</td>
<td style="width: 82.0486px; height: 12.042px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-025-01">Link</a></td>
</tr>
<tr style="height: 54px;">
<td style="width: 67.6042px; height: 54px; text-align: center;">Jan. 11<sup>th</sup></td>
<td style="width: 66.4931px; height: 54px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 54px;">Phoenix Contact FL Switch</td>
<td style="width: 308.715px; height: 54px;">Improper Authorization, Information Exposure.</td>
<td style="width: 82.0486px; height: 54px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03">Link</a></td>
</tr>
<tr style="height: 74px;">
<td style="width: 67.6042px; height: 74px; text-align: center;">Jan. 9<sup>th</sup></td>
<td style="width: 66.4931px; height: 74px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 74px;">General Motors and Shanghai OnStar (SOS) iOS Client.</td>
<td style="width: 308.715px; height: 74px;">Cleartext Storage of Sensitive Information, Man-in-the-Middle, Improper Authentication.</td>
<td style="width: 82.0486px; height: 74px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-17-234-04">Link</a></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2>&gt;&gt;Recent and upcoming ICS events</h2>
<figure id="post-10532 media-10532" class="align-none"></figure>
<table style="height: 679px; width: 701px;" border="1" cellpadding="10">
<tbody>
<tr>
<td style="width: 104.688px; text-align: center;">
<figure id="post-10556 media-10556" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></figure>
<p>Apr. 24-26</td>
<td style="width: 558.021px;"><a href="https://icscybersecurity.iqpc.co.uk/">ICS Cyber security</a></p>
<p>London, UK</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Apr. 24-26</td>
<td style="width: 558.021px;"><a href="https://www.industrialiotseries.com/europe/">Industrial control systems (ICS) Cyber Security Conference</a></p>
<p>Singapore</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Apr. 9-10</td>
<td style="width: 558.021px;"><a href="https://www.cs4ca.com/mena/">Cyber Security for critical assets MENA</a></p>
<p>Dubai, UAE</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Mar. 27-29</td>
<td style="width: 558.021px;"><a href="https://cybersecurityme.iqpc.ae/">Cyber Security for Energy &amp; Utilities</a></p>
<p>Abu Dhabi, UAE</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Mar. 13-14</td>
<td style="width: 558.021px;"><a href="https://www.maritimecybersec.com/">Maritime Cyber Security</a></p>
<p>London, U.K</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Mar. 6-7</td>
<td style="width: 558.021px;"><a href="https://www.cs4ca.com/usa/">Cyber Security for critical assets USA</a></p>
<p>Houston, USA</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/ics-news-1-en/">Industrial Control System Cybersecurity News #1 &#8211; What to remember from 2017?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
