Skip to main content

New research reveals cyber attackers are actively targeting OT/ICS environments

Published by
World Pipelines,


ABSG Consulting Inc. (ABS Consulting), a leading global risk management company, today announced the results of a new survey from SANS Institute, ‘Threat-Informed Operational Technology Defense: Securing Data vs. Enabling Physics’. The ABS Group-sponsored research reveals that cyber attackers have demonstrated a robust understanding of operational technology (OT) and industrial control system (ICS) engineering and have conducted attacks that gain access and negatively impact operations and human safety.

“This research concludes that industrial control systems can no longer be ignored,” said Ian Bramson, Global Head of Industrial Cybersecurity at ABS Group. “Organisations that take a ‘copy and paste’ approach to applying IT security tools, processes and best practices into an OT/ICS environment can expect problematic consequences.”

Key findings include:

Gap in perception around ICS risks at different levels within the organisation

61% of survey participants indicate a gap exists in the perception of cybersecurity risk to their ICS facilities between OT/ICS cybersecurity front-line teams and other parts of the organisation. Of these, 35% indicate the gap is between senior management and the OT/ICS cybersecurity front-line teams.

Ransomware is the biggest threat to OT

The industrial community is seeing ransomware with increasingly sophisticated variants that have the capability to cause more disruption to system assets and process flows.

When asked about the threat categories of most concern, 50% of respondents place ransomware at the top.

Targeting ICS operations using ransomware is a goal of the adversary as targeting ICS operations can lead to higher and quicker payouts.

ICS security resources are challenged, even more so than IT

Security teams are commonly resource-challenged in IT, but even more so in ICS, where additional security and engineering knowledge is required to perform effective ICS active cyber defence.

47% of ICS organisations do not have internal dedicated 24/7 ICS security response resources to manage OT/ICS incidents, and just a slightly lower percentage (46%) of ICS organisations do have this function, leaving 7% unsure of their current state.

OT/ICS security managers can improve their security program and lead their teams to success by allocating resources through new hires, changing internal roles to focus exclusively on ICS security or outsourcing to MSSP support services.

ICS and network visibility warrants improvement, investments are planned

65% indicate their visibility is limited for control systems, while only 22% have visibility needed to defend against modern threats, and 7% have no visibility into their control systems.

Increased visibility into control system assets (52%) and implementing ICS-specific network security monitoring (NSM) for control systems (51%) rank as the top two budgeted initiatives for organisations within the next 18 months.

"Critical infrastructure is targeted by cyber adversaries who have demonstrated their knowledge and desire to cause real-world consequences from cyber-attacks. ICS/OT facilities are advised to establish, maintain and mature an ICS Active Cyber Defence,” said Dean Parsons, Lead Researcher and Certified Instructor, SANS Institute. “Specifically, facilities must ensure ICS/OT defenders have knowledge of their control systems, the evolving threat landscape and, with ICS network visibility, monitor for abnormal events in control system network traffic. Managers and leaders responsible for ICS/OT must understand, embrace the IT/OT differences and support their ICS defence teams with security controls specific to control systems that priority safety."

Read the article online at: https://www.worldpipelines.com/special-reports/02032022/new-research-reveals-cyber-attackers-are-actively-targeting-otics-environments/

You might also like

 
 

Embed article link: (copy the HTML code below):


 

This article has been tagged under the following:

US pipeline news Pipeline cybersecurity news