Cyberattacks that impact industrial (OT) operations, to the point of losing control over the operational network, as in the Colonial Pipeline , JBS Foods and several European oil and gas chemical ports ,have unfortunately become a regular occurrence in recent years.
Just in the past few weeks we’ve witnessed a string of ransomware attacks on a number of European oil tanker terminals in Belgium, the Netherlands, and Germany (which according to expert sources were non coordinated), believed to be linked to the BlackCat and Conti families. The cyberattack on Oiltanking GmbH and Mabanaft GmbH caused oil conglomerate Shell to reroute oil supplies to other depots, while the attacks in Belgium and the Netherlands that targeted facilities belonging to SEA-Invest, a global oil terminal operator, had shut down port operations for a few days.
Although no disruptions to the fuel supply chain have been reported, according to experts the attack on Oiltanking and Mabanaft caused many millions of dollars in damages. No ransom has been reportedly paid to the attackers in either incident.
In this post we will review the Ransomware attack tactic, which has been used in the Colonial Pipeline, JBS Foods, oil port terminals and many other recent attacks.
Ransomware can affect OT networks using a number of attack paths:
Once in, the ransomware adversary will typically try to leverage the following tactics:
The eventual execution of the ransomware payload is done through injection into known processes or running scripts (such as PowerShell).
[inject id=’code-47fd23f73a9caecab1e206306adae7f9′]
The good news is that ransomware attacks on OT networks can be mitigated. Here’s a list of mitigation steps that OT network and security operators should implement, if they haven’t done so:
In the event of a ransomware attack, the ability to restore the network quickly and efficiently is crucial. Therefore protecting the backup system in its entirety should be a high priority.
As a rule, you should continually back up your important data and store it offline. Test these backups and run restore drills periodically.
Viable measures to protect the backup system include:
Radiflow’s approach to securing OT operations consists of detection/alerting on anomalies and network behaviors that may be a sign of a breach attempt, as well as ongoing risk assessment & monitoring toward continuous optimization of the overall network security system.
Universally endorsed by today’s industry thought leaders Radiflow’s risk-based approach to securing IT-OT networks takes an important step beyond mere threat detection by accounting for the entire array of factors that make up the risk the IT-OT network faces:
By factoring in the complex array of each organization’s unique risk factors, users can manage their cyber-security budget by risk and control ROI, rather than trying to “cover all bases”, leading to a higher ROI on their IT-OT security expenditure.
As to protecting OT networks from the specific threat of ransomware, Radiflow iSID and CIARA solutions, separately and in tandem, provide a comprehensive double line of defense:
iSID provides detection of breach attempt indications typical to ransomware attacks:
CIARA helps users configure the security requirements and prioritize mitigation measures for different operational zones, including the backup zone and other zones pertinent to ransomware attacks:
Ransomware attacks are here to stay, and will just get increasingly malicious and sophisticated in time. To protect your network from ransomware attacks, you need to implement technologies and processes that can detect and alert on early signs of an attack, prioritize and optimize mitigation measures and enable successful recovery.
In addition, through obtaining visibility into your risk factors and the security needs of each and every operational zone (especially the backup zone, critical to recovering from ransomware attacks), you will be able to focus your cyber-security budget on the mitigations that minimize overall risk, thus increasing the value and ROI of your entire IT-OT cyber-security operation.
To protect your network from ransomware attacks, you need to implement technologies and processes that can detect and alert on early signs of an attack, prioritize and optimize mitigation measures and enable successful recovery.
Harmonizing risk and consequence strategies across IT and OT environments for greater cyber resilience
Strengthening OT Resilience: Protecting Critical Systems in a Rapidly Evolving Threat Environment
Quarterly ICS Security Report 2024 Q3