IT Security

ICS threats landscape

by Mark Rowe

In case of cyber-attack, Industrial Control Systems (ICS) are supposed to be run in a physically isolated state. However this is not always the case. In a report on the ICS threats landscape, Kaspersky Lab found 13,698 ICS hosts exposed to the internet that more than likely belong to large organisations. These include energy, transportation, aerospace, oil and gas, chemicals, automotive and manufacturing, food and drink, governmental, financial and medical institutions. Most, 91.1 per cent of these ICS hosts have vulnerabilities that can be exploited remotely. But the worse is yet to come – 3.3 per cent of ICS hosts located in these organisations contain critical and remotely executable vulnerabilities.

Exposing ICS components to the Internet provides a lot of opportunities, but also many concerns around security, Kaspersky said. On the one hand, connected systems are more flexible in terms of a fast reaction to critical situations and implementation of updates. But on the other, the expansion of the Internet gives cybercriminals a chance to remotely control critical ICS components, which can result in physical harm to the equipment as well as potential danger to the whole critical infrastructure.

Sophisticated attacks on ICS systems are not new, the IT firm says. In 2014, an organised group of hackers called BlackEnergy APT attacked a power company in Ukraine. In the same year two more incidents, supposedly connected with cyber-attacks, occurred in Europe: on a steel mill in Germany and on the Frederic Chopin Airport in Warsaw.

More attacks of this kind will emerge, the firm added, since the attack surface is big. Those 13,698 hosts, located in 104 countries are only a small part of the total number of hosts with ICS components available through the Internet. To help organisations working with ICS to identify their possible weak points, Kaspersky Lab staff looked into ICS threats. Their analysis was based on OSINT (Open Source Intelligence) and information from public sources like ICS CERT, with the research period limited to 2015.

The findings of the Industrial Control Systems Threats Landscape report include:

In total, 188,019 hosts with ICS components available via the Internet have been identified in 170 countries.

– Most of the remotely available hosts with ICS components installed are located in the United States of America (30.5 per cent – 57,417) and Europe. In Europe, Germany has a leading position (13.9 per cent – 26,142 hosts), followed by Spain (5.9 per cent – 11,264 hosts), and France (5.6 per cent – 10,578 hosts).

– 92 per cent (172,982) of remotely available ICS hosts have vulnerabilities. 87 per cent of these hosts contain medium risk vulnerabilities and 7 per cent of them have critical vulnerabilities.

The number of vulnerabilities in ICS components has increased tenfold during the past five years: from 19 vulnerabilities in 2010 to 189 vulnerabilities in 2015. The most vulnerable ICS components were Human Machine Interfaces (HMI), Electric Devices and SCADA systems.

– 91.6 per cent (172,338 different hosts) of all the externally available ICS devices use weak Internet connection protocols, which opens the opportunity for attackers to conduct ’man in the middle’ attacks.

Andrey Suvorov, Head of Critical Infrastructure Protection, Kaspersky Lab, said: “Our research shows that the larger the ICS infrastructure, the bigger the chance that it will have severe security holes. This is not the fault of a single software or hardware vendor. By its very nature, the ICS environment is a mix of different interconnected components, many of which are connected to the Internet and contain security issues. There is no 100 per cent guarantee that a particular ICS installation won’t have at least one vulnerable component at any single moment in time. However, this doesn’t mean that there is no way to protect a factory, a power plant, or even a block in a smart city from cyber-attacks. Simple awareness of vulnerabilities in the components used inside a particular industrial facility is the basic requirement for security management of the facility. That was one of the goals behind our report: to bring awareness to interested audiences.”

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing