Sectrio

Author name: Abhay S K

OT Attack Path Analysis: A Comprehensive Guide

The convergence of Information technology (IT) and Operational technology (OT) networks, resulting in the exposure of OT networks to threats, paved the way for OT cybersecurity. OT is the use of hardware and software in critical infrastructure industries like, power, energy, water treatment, manufacturing, etc. Compromise to the security in these industries can result in cascading effects. To secure the safety of industries from cyberattacks, organizations come up with many solutions, with attack path analysis being one of them.  What is attack path analysis? Attack path analysis is the graphical representation of pathways to crucial data in your organziation, which cybercriminals adapt to gain access. Through attack path analysis, organizations are structured to think the way a bad actor thinks. It is the simulation of ways used by attackers to implement mitigation strategies.  With the help of attack path analysis, organizations can prioritize threats and take remediation measures accordingly. The need for attack path analysis A typical organization, on an average, has 11,000 exploitable security exposures in just one month. The need for attack path analysis cannot be emphasized more! The following are some more points to highlight the need: Increased spectrum of threats There has been an increase in the kinds of threats, and new ones also emerge every day. Every threat is based on some financial, political and other motives, and cybercriminals work toward the disruption of the OT systems to attain them.  OT systems manage critical infrastructure, and as such, they are easy targets for attackers. This necessitates that you should keep the OT environment alert with an analysis of the possible path taken by hackers and other cybercriminals. The complexity of the OT environment OT environment is complex and depends on different devices, systems, and networks. With high interdependency, an attack on one could lead to devastating effects on the OT environment.  With the help of attack path analysis, you can understand how attacks could surface and ways to tackle them. Some attacks may appear unrelated, but the analysis could lead to insightful findings that could save the organization thousands of dollars. Compromise due to insider attacks OT environments are greatly impacted by insider attacks, as people having access have immense technical knowledge and operational expertise to misuse them. This can be kept under check through attack path analysis. The exploration of ways insiders could use their expertise to scan through systems and exploit them helps to locate threats much before they could happen. This saves the organization from potential attacks that could otherwise be severe. Regulatory requirements Attack path analysis is also needed as a part of compliance with regulatory requirements. Industries with OT systems have certain mandatory requirements. This is required for data protection in view of the increased possibility of attacks on cybersecurity systems.  Keep business operations on track There could be total mayhem when a successful cyberattack disrupts business continuity. This can potentially lead to a loss of several millions of dollars and negatively impact the business’s reputation. With attack path analysis, companies are always on the lookout for attacks, and this helps reduce downtime. The company can also bounce back easily when they are proactive and prepared with an assessment of security. Assess the priority of exposure In many organizations, security concerns that require attention are often overlooked. This is because there are too many assets on their network and identifying risks becomes difficult.  This can be avoided with the help of attack path analysis.  It helps analyze the priority of exposure of assets and thereby to be ready with protection mechanisms before an attack can surface.  Visualize the way a hacker could think Seeing the attack paths like a hacker could provide complete visibility of the risks involved. It helps visualize the potential attack chains so that it is easy to understand the assets that could be targeted. Factors like host reachability, misconfigurations, vulnerabilities, etc., are all risk factors that can be correlated to help fix security issues. Steps to perform OT attack path analysis A series of steps, as listed below, need to be followed for effective attack path analysis: 1. Definition of scope The scope and goals of your analysis must be laid down in clear terms. What are the OT systems, assets, etc., you want to analyze? What is the purpose of your analysis? These are some questions you should answer before you start. List out the possible vulnerabilities and attack vectors that you wish to uncover through this analysis. This definition gives a proper direction to your activity. 2. Identify the critical systems There are several critical assets and systems in the OT environment that are exposed to threats. These should be identified so that the priority of threats can be ascertained. Threats need to be addressed in the order of their criticality so that the most crucial ones can be dealt with first. This can help an organization greatly as serious threats are easily identified and thwarted.  3. Mapping of the flow of data Data moves through multiple points, of which some may be prone to weaknesses. Mapping data flows can help locate the weak points so that they can be addressed. Understanding the flow of data enables the identification of paths attackers may emerge from.  4. Identify threats and vulnerabilities You should conduct a vulnerability assessment and threat analysis that is specific to the OT environment. This helps identify the various weaknesses and probable impacts they could cause. Timely assessment is an important step as it prevents attacks from happening and thereby maintains business continuity. 5. Assess the attack vectors An attack vector is the pathway attackers enter the OT environment. They could be credential theft, malware, social engineering attacks, insufficient protection, etc.  Analysis of the attack vectors helps identify ways to avoid them. For example, the data and network access of every employee have to be assessed to prevent insider attacks.  6. Identify the attack scenario The mode of operation that the attacker might opt has to be defined. All paths that

OT Attack Path Analysis: A Comprehensive Guide Read More »

Deconstructing-the-CL0P-ransomware-group-and-understanding-the-MOVEit-breach-in-2023

Deconstructing the CL0P RaaS group and understanding the MOVEit breach in 2023

The large-scale incorporation of connected OT/SCADA systems is a growing trend but are you aware of the increasing presence of sophisticated threat actors and rapidly budding ransomware variants? The question you should ask yourself and your peers is “Are my OT/SCADA systems secure against next-generation cyber threats? In this blog, we will be discussing particular instances where CL0P ransomware has been identified in OT/SCADA systems. OT/SCADA systems control physical devices and processes, such as water treatment plants, power grids, and manufacturing plants. These systems are often susceptible to attacks due to their setup, pre-existing vulnerabilities and often targeted as a result of lax security protecting these systems. While the scale of attacks targeting such systems can be analyzed further in our global threat landscape report 2023, it is imperative to understand the motive of the actors behind such attacks. With Sectrio’s ongoing research initiatives, CL0P is one such ransomware that has popped up on our radar multiple times. Its usual methods include infiltration via phishing emails, malicious attachments, and exploit kits. The RaaS group operates methodically and begins its process through meticulous research of its victim on its operations, and understanding how they can be exploited. Recommended Reading: How to get started with OT security CL0P follows this process with social engineering, and spear phishing techniques where they are looking to penetrate the victim’s network and deploy the ransomware exploits. After the successful deployment of the ransomware, CL0P publishes a portal on the dark web for the victim to first verify 3 files to validate the compromise and requests a ransomware payout. The whole ordeal lasts between 3 – 7 days. The victim suffers from operational halts, reputational damages, loss of IP, and financial losses. This report is a comprehensive analysis of CL0P ransomware including attack techniques, verticals targeted, countries targeted, and attack scenarios on OT-specific verticals. Stick around and learn more! Who is CL0P? CL0P is a notorious ransomware as a service (RaaS) operation that a Russian-speaking group operates. CL0P was first seen in February 2019 as a new variant in the Cryptomix family. It was delivered as a payload of a phishing campaign associated with the financially motivated actor TA505. CL0P was able to inject malicious code into the company’s database servers by exploiting a zero-day vulnerability using SQL injection. This allowed the attackers to access and download the data stored in the databases. This ransomware also used a verified and digitally signed binary, making it look like a legitimate executable file that could evade security detection CL0P Ransomware The CL0P ransomware is one of the biggest malware threats in cyberspace today. The attackers once demanded an amount of more than 20+ Million Dollars to restore services from their victim. Targeting SCADA systems with CL0P ransomware presents a grave risk to vital infrastructure, carrying the potential for operational breakdowns, substantial financial damages, and even endangering human safety. Exploiting vulnerabilities within SCADA systems, malicious actors can illicitly infiltrate and encrypt crucial control files, resulting in the cessation of industrial operations or even the discharge of dangerous materials. In June 2023, the CL0P ransomware group exploited a zero-day vulnerability in the MOVEit Transfer tool. This vulnerability was announced on May 31, 2023, by the Progress Software Corporation. Earlier this year, CL0P had used a similar vulnerability to attack the GoAnywhere file transfer product of Fortra, stealing data from more than 130 companies, governments, and organizations. The CL0P attack on MOVEit Transfer is believed to have affected hundreds of organizations worldwide. CL0P Darkweb page On the Dark web page, they upload notes, news, and data published information and steps to contact them. Steps for Companies Attacked by CL0P Ransomware Gang CL0P Gangs uploads published data and victim organization names on their dark web page. Companies name attacked by CL0P Ransomware Gang CL0P Email IDs for communication The ransomware has been known to use Email ID: UNLOCK@RSV-BOX.COM, This was however changed to Email ID: UNLOCK@SUP-BOX.COM. We believe that this change was triggered as a result of technical challenges. Timelines of CL0P Ransomware and MOVEit The CL0P ransomware gang was relatively inactive from November 2022 to February 2023 than in March and April of 2023 as accurately predicted in Sectrio’s Global Threat Landscape Analysis and Assessment Report and stated by the NCC report stated that CL0P went from one of the least active threat groups in March to the fourth most active in April. This significant increase in CL0P ransomware activity is a cause for concern, as it suggests that the gang is becoming more active and successful in its attacks. Businesses and organizations should be aware of the CL0P threat and take steps to protect themselves from ransomware attacks. Affected Countries by CL0P Ransomware Tools, Malwares, and Vulnerabilities Used by CL0P Ransomware Malware FlawedAmmyy SDBOT Get2 Loader Malwares used by CL0P Tools Cobalt Strike TinyMet Tools used by CL0P List of vulnerabilities exploited by CL0P ransomware The exploits built are prepared using the vulnerabilities below: CVE ID Vulnerability Type CVSS Score and Severity CVE-2023-34362 SQL injection vulnerability 9.8 Critical CVE-2023-35036 SQL injection vulnerability 9.1 Critical CVE-2023-0669 Pre-authentication command injection 7.2 High CVE-2021-27101 SQL injection vulnerability 9.8 Critical CVE-2021-27102 OS command execution. 7.8 High CVE-2021-27103 SSRF via a crafted POST request 9.8 Critical CVE-2021-27104 OS command execution 9.8 Critical CVE-2021-35211 Remote code execution (RCE) vulnerability 10.0 Critical vulnerabilities exploited by CL0P ransomware Analysis of CL0P Ransomware TA505 is a threat actor that uses phishing emails to deliver malware to its victims. The malware typically arrives as a macro-enabled document that, when opened, drops a loader named Get2. Get2 can then download other tools used by TA505, such as SDBot, FlawedAmmyy, or FlawedGrace. Once TA505 has gained a foothold on the victim’s system, it will perform reconnaissance, lateral movement, and exfiltration. This will allow them to gather information about the victim’s network and systems and to move laterally to other systems within the network. The final step is to deploy ransomware, encrypting the victim’s files and demand a ransom payment. Sometimes, SDBot has been

Deconstructing the CL0P RaaS group and understanding the MOVEit breach in 2023 Read More »

A Complete Guide to OT/ICS Vulnerability Management in 2023

A Complete Guide to OT/ICS Vulnerability Management

Are Your Operational Technologies Truly Secure? In the present landscape of digital interconnections, where operational technology (OT) serves as the lifeblood of industries, ensuring the robust security of these systems emerges as more crucial than before. Imagine a world where an organization’s crucial infrastructure remains safeguarded from online menaces, ensuring the confidentiality of your information and preserving the integrity of your production procedures.  This reality is within reach, with the solution lying in adept vulnerability management! Welcome to the ultimate guide to managing vulnerabilities in 2023, serving as your guiding light in the cybersecurity domain for OT. Within this all-encompassing exploration, we unveil the mysteries surrounding systems and utilities for vulnerability management. This gives you the information you need to confidently navigate the always-changing environment of potential hazards. Our guide explores vulnerability management in great detail, not just on the surface. From understanding the fundamentals to implementing cutting-edge tools, we’ve got you covered.  We comprehend the nuances of your concerns—balancing system uptime while staying impervious to cyber threats is no easy feat. But fear not, for we bring you actionable insights that empower you to bolster your defenses without sacrificing productivity.   Did you Know? Enterprises that use risk-based vulnerability management will suffer 80% fewer breaches. What is Vulnerability Management? Vulnerability Management in the context of OT is a proactive strategy to safeguard industrial systems from potential cyber threats. It involves systematically identifying, assessing, and mitigating vulnerabilities that could compromise the integrity, availability, or confidentiality of critical assets.  A robust vulnerability management program tailored for OT environments establishes a structured framework for continuously monitoring and addressing vulnerabilities. Vulnerability Management as a Service (VMaaS) takes this further by offering expert assistance and tools to organizations, often including specialized solutions for OT settings. This service-driven approach streamlines vulnerability scanning, risk assessment, and remediation efforts, providing businesses with a comprehensive shield against evolving threats. In essence, Vulnerability Management in OT combines strategic planning, regular assessments, and timely mitigation to identify and address vulnerabilities proactively before they can be exploited.  It ensures that critical industrial systems remain resilient and secure, even in the face of ever-changing cyber challenges. Why is Vulnerability Management Important for Organizations? It’s more crucial than ever to stay one step ahead of potential dangers in the constantly changing world of cybersecurity, especially when it comes to operational technology. OT has advanced into the future as a result of the widespread use of digital technologies, helping firms achieve new levels of productivity and innovation. Threat actors constantly search for gaps to attack within these complex systems.  Therefore, this shift has also cast a shadow. Your organization’s readiness to deal with cyberattacks, not resistance to them, is what matters. So, Are You Ready to Elevate Your OT Security? Let’s Begin. Here’s why effective vulnerability management is non-negotiable in the world of OT: Preserving Operational Continuity Disruptions can lead to catastrophic consequences in OT environments. Vulnerabilities in industrial control systems (ICS) or SCADA systems can not only halt operations but also compromise safety. Implementing a robust vulnerability management strategy ensures that operational processes continue smoothly without compromising the integrity of the systems. Mitigating Cyber Risks Malicious actors constantly seek vulnerabilities to exploit. For OT, this could result in unauthorized access to critical systems or even the manipulation of processes, leading to financial losses and reputational damage. Effective vulnerability management is a proactive shield against cyber threats, reducing the organization’s risk exposure. Compliance and Regulations Many industries operating in the OT sector are subject to stringent regulations and compliance standards. Adhering to these requirements necessitates a comprehensive vulnerability management approach. Failure to do so not only invites legal consequences but also puts the organization at risk of cyber incidents. Let’s explore some notable standards that regulate OT security ISA/IEC 62443 (International Society of Automation/International Electrotechnical Commission) This comprehensive standard outlines the cybersecurity requirements for industrial automation and control systems. With its multi-part framework, IEC 62443 addresses various aspects of OT security, from network design to system lifecycle management. Its global recognition underscores its significance in safeguarding industrial processes against cyber threats. Download Checklist: The IEC 62443 Checklist NCAs OTCC-01: 2022 (National Cybersecurity Agency of Saudi Arabia) The Saudi Arabian regulatory body provides a set of guidelines, OTCC-01, focusing on securing industrial systems against cyber risks. These guidelines encompass risk management, security architecture, incident response, and more, providing organizations with a structured approach to OT security. Read about: Operational Technology Cybersecurity Controls by NCA NIST 800-82R3 (National Institute of Standards and Technology) Specifically tailored for industrial control systems, NIST 800-82R3 offers guidelines for protecting these critical assets. It covers security assessments, access control, and anomaly detection as a crucial reference for OT security practitioners. NIST SP 800-53 Rev. 5 While not exclusively focused on OT, this NIST publication provides an inclusive catalog of security and privacy controls for information systems and organizations. Its relevance also extends to OT security, offering a robust foundation for implementing security measures. NERC CIP Enforced within the North American electricity industry, NERC CIP standards ensure the reliability and security of the bulk power system. It encompasses a range of requirements, from physical security to cybersecurity, to mitigate risks associated with power generation and distribution. EU Mandate NIS 2 (Network and Information Systems Directive) Building upon its predecessor, NIS 2 aims to enhance the cybersecurity posture of essential and digital service providers within the European Union. With specific provisions for OT systems, this directive emphasizes incident reporting, risk management, and cross-border cooperation. Protecting Valuable Assets OT systems manage valuable physical assets, from energy production to manufacturing equipment. A breach could disrupt these operations and lead to permanent damage. Vulnerability management safeguards these high-value assets against potential exploitation. Securing Supply Chains In interconnected industries, a vulnerability in one part of the supply chain can cascade through partners and suppliers, leading to widespread vulnerabilities. A thorough vulnerability management system ensures that the entire ecosystem remains resilient. Building Stakeholder Trust In an era where cybersecurity incidents dominate headlines, organizations that demonstrate a proactive

A Complete Guide to OT/ICS Vulnerability Management Read More »

ics-security-assessment-sectrio

A Complete Guide to ICS Security Assessment

Did you know that the average cost of data breaches worldwide was $4.35 million in 2022, with phishing being the most common form of attack? Demand for ransom, locking critical data files, stealing sensitive data, etc., are common forms of attacks. Many industries bear the brunt in the form of high costs for data recovery, lack of reputation, poor business relationships, legal complications, etc. All these bring to light the need for cyber security assessment and analysis to provide an effective defense against threats. What is ICS security assessment? Industrial Control Systems (ICS) security assessment involves evaluating the ICS of an organization for vulnerabilities and weaknesses and ensuring that effective controls are in place to defend against cybersecurity attacks. The assessment encompasses: Evaluation of safety with cybersecurity audit A cybersecurity audit is an evaluation of the security and strength of the ICS environment of an organization. Some of the essential steps in a cybersecurity audit are: The scope of the audit, the networks that will be assessed, and the standards that must be adhered to are required to be defined as a first step. The relevant ICS security policies and standards should be reviewed to understand what is in place at present. The network architecture for critical and non-critical systems should be analyzed to check the segmentation of networks. Cybersecurity audit also ensures that the ICS environment adheres to the industry standards, like IEC 62443. A thorough network scanning should be done to assess the weaknesses of the ICS environment. Get a free copy of the template here: Incidence response plan & Template Logging of incidents should be as per the best practices for an incident response plan. An audit will review this and provide information on lapses. Once the audit of the ICS environment is complete, an audit report on the findings about vulnerabilities should be prepared. The report should also contain relevant recommendations for further action. On the basis of the report, necessary follow-up actions should be taken to address the issues and weaknesses identified. Effective follow-up also helps keep a watch on emerging threats. CIA triad: The ICS security assessment model The CIA triad is a popular method for security assessment. CIA stands for Confidentiality, Integrity, and Availability. All three aspects carry importance while reviewing the system for vulnerabilities and risk assessment. For safe operations of industrial processes, there should be a balance in confidentiality, integrity, and availability. Confidentiality Maintaining the privacy of the data of an organization and restricting unauthorized access are key parts of confidentiality. In this digital age, there are frequent attempts to compromise the safety of industrial control systems. Maintaining confidentiality involves maintaining safety by way of encryption, multi-factor authentication, labeling data, etc. Integrity Integrity ensures that the data is reliable and trustworthy. Data is protected from unauthorized alteration to maintain the authenticity of the information through non-repudiation. Availability Data that is secure must also be available and accessible to the stakeholders. Timely availability of data without any interruption is of prime importance. Various acts, like natural disasters, ransomware attacks, denial-of-service, etc, can compromise availability.  The CIA triad method offers a comprehensive methodology for the assessment of security lapses. It helps identify what went wrong and how well the existing systems were able to protect the data. The need for ICS cybersecurity assessment Even technology leaders had to mitigate an average of 1,435 Distributed Denial-of-Service (DDOS) attacks daily in 2022.  This statement is an indicator of the gravity of the situation. Cybersecurity assessment is the need of the hour when the digital landscape is deluged with multiple types of cyberattacks. There have been instances of severe losses and compromises in many industries due to overlooking cyber security assessments. Here are some cyber incidents that shook industries due to the lack of assessments. All these necessitate timely intervention by assessments so that potential threats can be identified and defense mechanisms can be put into action. ICS security standards Organizations follow different security standards based on industry requirements. We will discuss some of them here: 1. ISA/IEC 62443 The set of standards in IEC 62443 offers guidelines for securing industrial automation and control systems. Such control systems are found in power plants, oil and gas plants, water treatment plants, etc. These standards provide assistance by way of informing the type of controls to be put in place in ICS platforms. IEC 62443 is mainly used by industries in the industrial automation and control sector. With a comprehensive set of policies, they are considered one of the best to be followed by industries. 2. The North American Electric Reliability Corporation’s (NERC) Critical Infrastructure Protection (CIP)  The NERC CIP are standards that are specific to the power grid sector. They are used to protect the security of electricity industries. These include: Some common ICS tools used for cyber security assessment These tools are widely used by analysts to identify and track vulnerabilities to amplify protection. NMAP With this tool, analysts identify hosts that reside in a network. It helps detect threats and discover open ports and services. It can map an entire network and detect open ports easily.  This is a simple tool with a powerful ability. It can instantly recognize all routers, servers, switches, and mobile devices on single and multiple networks. It helps identify web servers and DNS servers that are running on a system. It has a GUI called Zenmap through which you can develop visual mappings of a network.  Visit Now: NMAP SHODAN Shodan is a search engine that helps find servers, routers, etc., on the internet using various filters. With Shodan, you can identify if any devices on the ICS are accessible through the internet.  Data collected by Shodan is comprehensive. It is in metadata format and contains data like hostname, geographical location, OS, and properties related to application layer protocols. This helps identify insecure devices. Visit Now: Shodan Sectrio you can leverage Sectrio to conduct host discovery and vulnerability analysis and provide solutions to correct the vulnerability detected in the

A Complete Guide to ICS Security Assessment Read More »

QILIN-Ransomware-Report

QILIN Ransomware Report 

QILIN also known as “Agenda” is a Ransomware Group that also provides Ransomware as a service (Raas). Qilin’s ransomware-as-a-service (RaaS) scheme earns anywhere between 80% to 85% of each ransom payment, according to new Group-IB findings. It was first discovered in 2022 when it attacked Australia’s leading Information technology service organization.  Qilin Targets its victims by sending phishing emails that contain malicious links to gain access to their network and exfiltrate sensitive data, as soon as Qilin completes initial access, they commonly circulate laterally across the victim’s infrastructure, attempting to find crucial statistics to encrypt. After encrypting the data Qilin leaves a Ransom note “Your network/system was encrypted, and the encrypted file has a new file extension” and asks for the ransom to pay for the decryption key Ransomware Details & Working  It drops pwndll.dll, detected as a Trojan.Win64.AGENDA.SVT, in the public folder and injects this DLL into svchost.exe to allow continuous execution of the ransomware binary. It takes the advantage of safe mode to evade detection and proceed with its encryption routine unnoticed. Malware is written in Rust and The Rust variant is especially effective for ransomware attacks as, apart from its evasion-prone and hard-to-decipher qualities, it also makes it easier to customize malware to Windows, Linux, and other OS.  Here are some pointer’s to be noted:  Victim Selection   First, it was Randomly targeting the organizations, but Now It seems like they are Mostly Interested in Critical Infrastructure, the OT Companies. In the year 2023, they have targeted 21 companies which include 5 OT victims. Recently in Jun 2023, they Attacked the Dubai Based OT company which specializes in comprehensive industrial and commercial water treatment (Clarity Water Technologies, LLC) and have targeted 6 other companies and leaked some of their data.   As per our Dark web analysis, the Victims they have targeted till now are from different countries which include Argentina, Australia, Brazil, Canada, Colombia, France, Germany, Japan, New Zealand, Serbia, Thailand, The Netherlands, UAE, UK and United States.  Fig1: Victim Countries  As per the Screenshot of the post which was written in the Russian language by Qilin Recruiter for recruiting “teams of experienced pentester for their affiliate program,” the group doesn’t work in CIS countries.  Darkweb Analysis  of Qilin Ransomware Qilin maintains a dedicated dark web page where they publish all the information and details about the Victim which includes the Victim’s name, Date of attack, Description of the victim, some images related to the victim’s sensitive data, and when the ransom is not paid, they also leak victim’s data on their dark web site.   They have Posted about 22 Victims on their Onion sites and some victim’s data has also leaked on their page.   Also Read: How to get started with OT security Let’s go through their Darkweb site  Qilin Darkweb front page where they publish the information about their victims.   Login page present in the Qilin ransomware site  They Normally leak two files; one has the data, and another has the list of all the sensitive files. (As shown in the image)  IOCs  76f860a0e238231c2ac262901ce447e83d840e16fca52018293c6cf611a6807e  fd7cbadcfca84b38380cf57898d0de2adcdfb9c3d64d17f886e8c5903e416039  Mitigation For Securing OT Environment:  Remediations  Reference  https://www.trendmicro.com/en_us/research/22/h/new-golang-ransomware-agenda-customizes-attacks.html https://www.trendmicro.com/en_in/research/22/l/agenda-ransomware-uses-rust-to-target-more-vital-industries.html https://www.group-ib.com/blog/qilin-ransomware/ Interested in learning more about AI-powered attacks and ways to prevent them on your networks? Talk to our security expert. See our IoT and OT security solution in action through a no-obligation demo Gain Ample visibility into your network and identify gaps today, Sign up for a comprehensive asset discovery with vulnerability assessment today from Sectrio This research report is attributed to Dipanjali Rani and Akshay Jambagi from Sectrio’s threat research team.

QILIN Ransomware Report  Read More »

Ensuring-Secure-Remote-Access-for-Industrial-Control-Systems

Ensuring Secure Remote Access for Industrial Control Systems

You may also be interested in reading: Industrial control systems (ICS) refer to control systems used in a wide range of industrial processes. It’s a component of operation technology that involves hardware, software, and systems that help manage industrial operations. Some basic aspects of ICS include sensors, controllers, local supervisory systems, business systems, and management systems. The need for remote access connectivity for industrial control systems has never been greater as it allows businesses and industries to enjoy more efficient and reliable operations. But for successful remote access, businesses have to establish network connections between the ICS infrastructure and the remote user. This comes with its own set of security risks. Cybercriminals constantly target remote users to steal sensitive information, gain financial advantages, or blatantly cause damage. The consequences of such security breaches can be devastating as they lead to operational disruptions, reputational damage, financial losses, and data corruption. This is why organizations must ensure secure remote access (SRA) for industrial control systems. In this article, we’ll explore some of the best ways to ensure secure remote access for industrial control systems (ICS) Best Practices for Secure Remote Access for Industrial Control Systems Remote users should authenticate with multi-factor authentication (MFA) Multi-factor authentication (MFA) is a form of added security measure that requires users to provide several ‘pieces’ of verification before being granted access to an account. Examples of MFA authentication include one-time passwords (OTPs) and biometric data like fingerprints, voice recognition, or iris scans For most accounts, users require only a password when logging in. But an MFA system combines multiple authentication factors, including a password and other confirmation processes. This adds an extra layer of security, making it hard for unauthorized people to access an account. To ensure secure remote access for industrial control systems, consider a multifactor authentication system done over a secure channel. But when doing so, be careful, as some multifactor solutions can be ineffective because of the speed or process control reliability requirements. Ensure secure communication through encryption tools and tunneling techniques Encryption protocols and secure tunneling techniques ensure the information exchanged between the remote user and the ICS remains confidential and protected from unauthorized access. For example, Secure Socket Layer/Transport Layer Security (SSL/TLS) protocols establish secure encrypted connections between client and server applications. They provide authentication and data encryption. And this is just one example of encryption protocols and secure tunneling techniques. Implementing such protocols ensure secure communication channels for remote access to ICS. Consider dedicated client hardware and software It’s standard for organizations looking for remote access solutions to empower their users with both the software and hardware required to connect. However, even in doing so, cybercriminals still remain a huge concern as they typically target such users. As part of the remote access solution, your organization should issue personal computers or laptops. This PC or laptop should have the appropriate cyber security countermeasures, such as host-based intrusion detection systems and antivirus software. But perhaps one effective solution that has profited most organizations involves using VPNs for secure remote access. The best VPNs establish a secure and encrypted connection between the user and the ICS network. They create a secure “tunnel” over an insecure network, such as public wifi, ensuring that sensitive information remains protected. Employing dedicated client hardware, such as laptops, and dedicated software, such as VPNs and antivirus, ensures that organizations can effectively establish secure remote access for industrial control systems Session Termination Session termination is a fundamental concept when discussing remote access. Session termination is paramount when establishing a remote access solution because it terminates the link between the remote user and the internal network or system. It’s an essential and non-negotiable element of a secure remote access solution. Because of this, organizations need to ensure that sessions are promptly terminated, either upon request or automatically based on system configurations. Conduct regular patching and updates Regular patching and updates are essential in discovering vulnerabilities and security weaknesses in software systems. By promptly applying security patches, you will easily address the vulnerabilities and protect the entire ICS infrastructure from potential cyberattacks. Through proper patch management, it will be easy to close security gaps and strengthen the entire security of the system, significantly reducing the risk of unauthorized access and disruptions. Since ICS is highly critical for an organization, you must be keen to plan and execute updates to minimize disruption of operational continuity. The best approach is to conduct the process in phases, whereby you will test the patch in an isolated environment before distributing it to the entire ICS infrastructure. Ensure you also adopt a redundant architecture and backup system to provide uninterrupted operations. Gain Ample visibility into your network and identify gaps today, Sign up for a comprehensive asset discovery with vulnerability assessment today from Sectrio Outline definitive remote access policies and procedures Most organizations fail to define and communicate clear policies pertaining to rules and procedures for remote access to ICS. It’s important to outline who can access the system clearly, define the circumstances, and indicate the necessary authentication mechanisms. For example, a good place to start would be to adopt a role-based access control (RBAC) policy. This policy framework regulates access to resources and equipment within an organization based on roles. In an RBAC policy, users are assigned specific roles that determine their level of access to systems, applications, and data. As an administrator, you should ensure all users looking to connect remotely use a named account. And not only that, but remote access users should only access systems that are directly associated with their line of work and nothing more. Compliance Kit: OT/ICS Cyber Security Policy template by Sectrio You should go further and assign specific access privileges remote workers require to carry out their duties. This limits accessibility based on job functions and needs. It’s essential in reducing the risk of insider threats and maintaining the overall security of the ICS environment. Schedule security awareness and training sessions A big part of security

Ensuring Secure Remote Access for Industrial Control Systems Read More »

Unmasking Black Basta Ransomware Group A Closer Look

Unmasking Black Basta: A Closer Look at the Notorious Ransomware Group

The Black Basta threat actor is a sophisticated cyber threat group that has emerged in recent years, targeting various organizations across multiple industries. The primary objective of the Black Basta THREAT ACTOR is to gain unauthorized access to targeted networks and exfiltrate sensitive information for intelligence gathering or financial gain. The group is known to engage in long-term campaigns, establishing a persistent presence within victim networks to maintain access and conduct further malicious activities. Tactics and Techniques: The Black Basta THREAT ACTOR employs a range of sophisticated tactics and techniques to achieve its objectives like, Countermeasures: This report is collective research based on the resources by Trend Micro, BlackBerry, Palo Alto Networks, Bleeping Computer, SOCRadar, DXC Technology etc. Who is Black Basta? Black Basta (AKA Black Basta) is a ransomware operator and Ransomware-as-a-Service (RaaS) criminal enterprise that first emerged in early 2022 and immediately became one of the most active RaaS threat actors in the world, racking up 19 prominent enterprise victims and more than 100 confirmed victims in its first few months of operation. The group is known for using phishing emails and malicious attachments to deliver ransomware to their victims, and they have targeted organizations in a variety of industries. The group’s ransom tactics use a double extortion tactic, encrypting their victim’s critical data and vital servers and threatening to publish sensitive data on the group’s public leak site. Black Basta is believed to be a Russian-speaking group. It is assumed that Black Basta’s core membership to have spawned from the defunct Conti threat actor group due to similarities in their approach to malware development, leak sites, and communications for negotiation, payment, and data recovery. In addition to these similarities, there have been some reports that Black Basta members have been using Conti-related code in their ransomware attacks. This suggests that there may be some overlap between the two groups, either in terms of membership or collaboration. ABB Ransomware On May 7th, 2023, the Swiss multinational corporation ABB got attacked by a ransomware attack conducted by the Black Basta ransomware gang, a threat actor that came in sight in April 2022. The Black Basta group used a phishing email to deliver the ransomware to an ABB employee. The employee clicked on the malicious attachment, which installed the ransomware on their computer. The ransomware then spread to other computers in ABB’s network, encrypting files on hundreds of devices. The ransomware attack has affected the company’s Windows Active Directory, affecting hundreds of devices located over multiple locations. ABB terminated VPN connections with its customers to contain the ransomware attack and prevent it from spreading to other networks. History of Attacks by Black Basta The distribution by country of Black Basta’s victim organizations from April 1 to July 31, 2022. Black Basta targets chart based on country Analysis Black Basta Ransomware Malware The ransomware is written in C++ and impacts both Windows and Linux operating systems. It encrypts users’ data using a combination of ChaCha20 and RSA-4096, and to speed up the encryption process, the ransomware encrypts in chunks of 64 bytes, with 128 bytes of data remaining unencrypted between the encrypted regions. The ransomware also attempts to delete shadow copies and other backups of files using vssadmin.exe, a command-line tool that manages Volume Shadow Copy Service (VSS), which captures and copies stable images for backups on running systems. Black Basta Attack Chain Black Basta Attack Chain Diagram Tactics, Techniques and Procedures Tactics Techniques Initial Access Valid Accounts Phishing Execution Command and scripting interpreter System services Windows Management Instrumentation Privilege Escalation Exploitation for privilege escalation Defense Evasion Modify registry Domain policy modification Impair defences Reflective code loading Credential Access OS credential dumping Discovery System information discovery Remote system discovery File and directory discovery Lateral Movement Lateral tool transfer Remote services Exfiltration Exfiltration over C&C channel Exfiltration over web service Impact Inhibit system recovery Service stop Data encrypted for impact Defacement Technical Analysis The Black Basta Ransomware, upon successfully executing its malicious payload on the compromised system, alters the desktop wallpaper to display a customized image associated with the ransomware’s activities. The Black Basta Ransomware Malware is known to deploy a text file as part of its malicious activities. This file contains the Login ID that enables the affected company to establish a connection with the Ransomware Group. The purpose of this connection is to facilitate ransomware payment and initiate negotiations for the potential retrieval or release of the compromised data. Dark Web Analysis Black Basta maintains dedicated dark web pages through which they establish communication channels with victims for the purpose of negotiating ransom payments. Security Recommendation To defend against the Black Basta THREAT ACTOR and mitigate the risk of their attacks, organizations are advised to consider the following countermeasures: This article is attributed to Vikas Karunakarn, Aditya Kirit Katpara, Akshay Jambagi & Dipanjali Rani from Sectrio’s threat research team. Check out: The Global OT and IoT Threat Landscape Assessment and Analysis Report 2023 Reference:

Unmasking Black Basta: A Closer Look at the Notorious Ransomware Group Read More »

OT Threat Hunting Unleashing Proactive Cybersecurity

Threat Hunting in OT Networks: Unleashing Proactive Cybersecurity

With the increasing digitization and connectivity of operational technology (OT) networks, the threat landscape has expanded, making it imperative for organizations to proactively hunt for potential cyber threats. Threat hunting in OT networks involves actively and continuously searching for signs of compromise or malicious activity that traditional security measures might miss. This article dives deep into the concept of threat hunting in OT networks, its significance in protecting critical infrastructure, and effective strategies to unleash proactive cybersecurity. Understanding Threat Hunting in OT Networks Threat hunting in OT networks is a proactive approach that aims to identify and mitigate advanced threats, including sophisticated attacks, zero-day exploits, and insider threats. It involves leveraging both human expertise and advanced technologies to detect anomalies, patterns, and indicators of compromise (IOCs) within the OT environment. By proactively seeking out threats, organizations have the ability to stay ahead of adversaries and minimize risks to operational continuity. The Importance of Threat Hunting in OT Networks Threat hunting in OT networks offers several key advantages 1. Detection of Advanced Threats Traditional security measures often struggle to identify sophisticated attacks targeting OT systems. Threat hunting fills this gap by actively seeking out signs of compromise, enabling early detection and response to emerging threats. 2. Reduction of Dwell Time Threat hunting reduces the dwell time, which is the duration that adversaries remain undetected within the network. By shortening the dwell time, organizations can minimize the potential damage and disruption caused by an ongoing cyber attack. 3. Mitigation of Insider Threats Insider threats pose a significant risk to OT networks. Through threat hunting, organizations can proactively identify any abnormal or suspicious behavior exhibited by employees or contractors, mitigating the risk of insider threats. 4. Enhanced Incident Response By adopting a proactive approach, threat hunting equips organizations with actionable OT/ICS specific threat intelligence and insights necessary for effective incident response. This allows security teams to rapidly contain, eradicate, and recover from any security incidents, minimizing the impact on critical operations. Also Read: Complete Guide to Cyber Threat Intelligence Feeds Strategies for Effective Threat Hunting in OT Networks To conduct successful threat hunting in OT networks, organizations should implement the following strategies: 1. Define Clear Objectives Establish clear goals and objectives for threat hunting activities, aligned with the organization’s risk tolerance and operational priorities. 2. Leverage Threat Intelligence Utilize OT/ICS specific threat intelligence feeds and external sources to gain insights into the latest attack techniques, indicators of compromise (IOCs), and threat actor behaviors specific to OT environments. 3. Use Advanced Analytics and AI Employ advanced analytics, machine learning, and artificial intelligence (AI) techniques to analyze vast amounts of OT data in real-time. These technologies enable the detection of anomalies, patterns, and potential indicators of compromise. 4. Combine Human Expertise with Automation Human analysts with deep knowledge of OT systems should collaborate with automated tools and technologies. This combination enhances the effectiveness of threat hunting by leveraging human intuition and expertise alongside the scalability and speed of automation. 5. Adopt Endpoint Detection and Response (EDR) EDR solutions play a crucial role in threat hunting by providing real-time visibility into endpoint activities, enabling proactive threat hunting and faster response to potential threats. 6. Conduct Regular Red Team Exercises Simulate realistic attack scenarios through red team exercises to test the effectiveness of existing security measures and identify any potential weaknesses or blind spots in the OT network. Compliance Kit: Cybersecurity Tabletop Exercise Planning Manual Overcoming Challenges in Threat Hunting for OT Networks While threat hunting in OT networks brings significant benefits, it also presents certain challenges that organizations must address. 1. Lack of OT-Specific Expertise Finding skilled personnel with expertise in both OT systems and cybersecurity can be challenging. 2. Access to Comprehensive OT Data Gathering and analyzing comprehensive data from OT networks can be complex due to various legacy systems, proprietary protocols by the OEMs, and limited visibility into OT environments. To find out how Sectrio’s solution can help get over this challenge, watch us in action now: Request a Demo 3. Integration with Existing Security Infrastructure Ensuring seamless integration between threat hunting activities and existing security infrastructure, such as security information and event management (SIEM) systems and intrusion detection systems (IDS), can pose challenges. 4. Balancing Security and Operational Requirements OT environments prioritize operational continuity, which can sometimes conflict with the security measures implemented during threat hunting. Striking a balance between security and operational requirements is crucial to prevent disruptions while maintaining robust cybersecurity. 5. Adapting to Evolving Threats Threat actors continually evolve their tactics and techniques, necessitating constant updates and adjustments to threat hunting strategies and methodologies. Sectrio eBook: OT Security Challenges and Solutions Real-Life Examples of Threat Hunting in OT Networks Illustrating the effectiveness of threat hunting in OT networks, here are a few real-life examples 1. Identifying Malware Infections Through threat hunting, an energy company discovered signs of malware infection in their OT network. By proactively investigating the anomalies, they were able to isolate and remove the malware before it caused any operational disruption. 2. Detecting Insider Threats During a threat hunting exercise, an industrial manufacturing company identified suspicious activities indicating a potential insider threat. The timely detection allowed them to investigate further, identify the compromised user account, and mitigate the risk before it led to significant damage or data exfiltration. 3. Uncovering Hidden Vulnerabilities By conducting thorough threat hunting activities, a transportation organization discovered previously unknown vulnerabilities in their OT systems. They promptly patched the vulnerabilities, reducing the risk of exploitation by threat actors. 4. Mitigating Advanced Persistent Threats (APTs) A critical infrastructure provider proactively engaged in threat hunting to identify indicators of an advanced persistent threat (APT) targeting their OT network. Through continuous monitoring and analysis, they were able to detect the APT’s presence, gather intelligence, and collaborate with law enforcement agencies to mitigate the threat effectively. For CISOs: Simplify the RoI for an OT Threat Hunting program Getting buy-in from the board can always be tough, here are a few pointers on the ROI that can be

Threat Hunting in OT Networks: Unleashing Proactive Cybersecurity Read More »

Role of threat intelligence in OT security Best practices and use cases

Role of threat intelligence in OT security: Best practices and use cases

In today’s interconnected world, operational technology (OT) systems play a crucial role in industries such as manufacturing, energy, and transportation. However, with increased connectivity comes the risk of cyber threats targeting these critical infrastructures. To effectively safeguard OT systems, organizations must employ robust security measures, including threat intelligence. This article explores the role of threat intelligence in OT security, highlighting best practices and providing insightful use cases to demonstrate its effectiveness in mitigating risks and protecting vital industrial operations. Understanding Threat Intelligence in OT Security Threat intelligence involves gathering and analyzing data from various sources to identify potential threats and vulnerabilities. In the context of OT security, threat intelligence provides organizations with valuable information about the tactics, techniques, and procedures (TTPs) employed by threat actors targeting industrial systems. By monitoring and analyzing this intelligence, security teams can enhance their proactive defenses and respond effectively to emerging threats. Best Practices for Implementing Threat Intelligence in OT Security To maximize the benefits of threat intelligence in OT security, organizations should follow these best practices: 1. Comprehensive Data Collection Collecting data from multiple sources, including open-source intelligence (OSINT), dark web monitoring, internal network logs, and threat feeds, helps create a comprehensive threat landscape. 2. Contextual Analysis Analyze collected data in the context of the organization’s OT environment to understand the specific risks and prioritize mitigation efforts accordingly. Consider factors such as critical assets, vulnerabilities, and potential impact on operations. 3. Automated Threat Detection Leverage machine learning and artificial intelligence (AI) technologies to automate the detection of potential threats, enabling real-time monitoring and rapid response. Implement anomaly detection algorithms and behavioral analytics to identify deviations from normal OT system behavior. Also read: Complete Guide to Cyber Threat Intelligence Feeds 4. Collaboration and Information Sharing Foster collaboration within the industry by sharing anonymized threat intelligence with trusted partners, industry-specific Information Sharing and Analysis Centers (ISACs), and government agencies. This collective defense approach helps organizations stay ahead of emerging threats and strengthens the overall security posture. 5. Regular Training and Education Provide ongoing training to OT security teams to ensure they stay updated with the latest threat trends, attack techniques, and mitigation strategies. Build a culture of security awareness among employees to minimize the risk of human error or insider threats. Use Cases Demonstrating the Effectiveness of Threat Intelligence in OT Security 1. Early Detection of Malicious Activities By correlating threat intelligence with network activity logs, organizations can identify anomalous behavior indicative of a potential cyber attack. This early detection allows security teams to respond promptly, minimizing the impact on critical operations. For example, if threat intelligence indicates a rise in ransomware attacks targeting industrial control systems (ICS), security teams can proactively monitor for related indicators and take preventive actions. 2. Proactive Vulnerability Management Threat intelligence enables organizations to stay informed about emerging vulnerabilities affecting OT systems and associated mitigations. By monitoring threat intelligence feeds and vulnerability databases, organizations can prioritize patch management and implement necessary security measures before threat actors exploit vulnerabilities. This proactive approach helps minimize the risk of successful attacks. 3. Incident Response and Threat Hunting In the event of an incident, threat intelligence provides crucial insights into the tactics, tools, and indicators of compromise (IOCs) used by threat actors. This information aids in incident response, facilitating rapid containment, eradication, and recovery. Furthermore, threat intelligence can empower proactive threat hunting activities, allowing organizations to proactively search for threats within their OT environments. 4. Supply Chain Security Threat intelligence helps organizations assess the security posture of their suppliers and vendors. By monitoring potential threats to the supply chain, organizations can mitigate risks and ensure the integrity and security of the OT ecosystem. Threat intelligence enables organizations to identify any vulnerabilities or compromises within their supply chain partners, allowing for timely remediation actions and ensuring a trusted and secure supply chain network. The Evolving Landscape of OT Threats The threat landscape for OT systems is continually evolving, requiring organizations to stay vigilant and adapt their security measures accordingly. Threat intelligence plays a vital role in keeping pace with emerging threats. Some of the notable OT threats include 1. Malware and Ransomware Attacks Malicious software specifically designed to target OT systems can cause disruptions, compromise safety, and demand ransom payments. Threat intelligence helps organizations identify new strains of malware, track their propagation, and develop effective countermeasures. 2. Insider Threats Insiders with privileged access to OT systems can intentionally or unintentionally compromise the security of industrial operations. By leveraging threat intelligence, organizations can detect and mitigate insider threats, including unauthorized access, data exfiltration, or sabotage attempts. 3. Nation-State Attacks OT systems are potential targets for nation-state actors seeking to disrupt critical infrastructure. Threat intelligence provides insights into the tactics and strategies employed by these advanced adversaries, enabling organizations to enhance their defenses and resilience against such attacks. 4. Zero-Day Exploits Zero-day vulnerabilities are unknown to the public and can be exploited by threat actors before a patch is available. Threat intelligence helps organizations stay informed about potential zero-day vulnerabilities in their OT systems, allowing them to develop mitigations and workarounds until official patches are released. 5. Social Engineering Attacks Threat actors often employ social engineering techniques to manipulate employees into divulging sensitive information or performing malicious actions. By analyzing threat intelligence related to social engineering campaigns, organizations can educate employees, implement security awareness programs, and enhance their resilience against such attacks. Summary Threat intelligence plays a critical role in securing OT systems and protecting vital industrial operations from cyber threats. By implementing best practices, including comprehensive data collection, contextual analysis, automated threat detection, collaboration, and regular training, organizations can maximize the benefits of threat intelligence. The use cases discussed highlight the effectiveness of threat intelligence in early detection, proactive vulnerability management, incident response, and supply chain security. In a rapidly evolving threat landscape, organizations must prioritize threat intelligence as a fundamental component of their OT security strategy to safeguard critical infrastructure and ensure business continuity. Wish to learn more about the latest tactics and strategies adopted

Role of threat intelligence in OT security: Best practices and use cases Read More »

Why OT security gap and threat assessment is essential for your security posture

Why OT security gap and threat assessment is essential for your security posture

An Operational Technology risk and threat assessment can serve as a foundational activity for improving your overall approach to infrastructure security. Not only can it identify gaps in your OT security posture, but it can also help sensitize employees and to ascertain if you have the right resources, practices, and workflows to improve OT security. Each year, many security vendors and OEMs publish their threat environment assessment reports. 2023 is no different. In fact, Sectrio will be publishing its IoT and OT threat landscape assessment report in the coming week. Our report talks about the specific deterioration in the threat environment surrounding OT-based infrastructure. There are specific inputs on how threat actors, emboldened by their success in targeting OT infrastructure are now expanding their operations to target many aspects of OT including devices sitting at the periphery of OT networks as well as safety and instrumentation systems. Also Read: How to get started with OT security Thus, anytime is a right time to conduct an OT threat and gap analysis exercise to find out how susceptible your infrastructure is to such attacks and threat actors. As a leading OT security vendor, Sectrio has undertaken many OT threat assessment projects. Following are some of the best practices that our SMEs recommend for conducting an effective OT security risk and gap assessment 10 best practices for OT security gap and threat assessment 1. Start with the scope Determine the full scope of the assessment along with objectives. Which are the systems, devices, and processes that will be assessed? What are the parameters and what kind of assessment methodologies and models will be used? This will help you to focus your resources and efforts and ensure that you have a comprehensive understanding of not just the security risks but also the amount of time and resources involved. If there is any scope for a downtime, it should be identified here. 2. Identify the assets Identify the critical assets in the system that you are assessing and prioritize them based on need and on the possible impact in case of a cyberattack. This includes hardware, software, networks, and other components. It is advisable to identify the interdependencies as well. 3. Conduct a threat assessment Identify the potential threats that could affect the assets. This includes cyber threats such as malware, ransomware, side loading, man-in-the-middle attacks, and hacking, as well as physical threats such as natural disasters, accidents, and equipment failures. 4. Identify specific vulnerabilities Assess the security vulnerabilities that exist within the system. This includes both technical and non-technical vulnerabilities. 5. Measure compliance with IEC 62443 Do the systems comply with various IEC 62443 stipulations? IEC 62443 can serve as a guiding standard for various aspects of operations and infrastructure.  6. Evaluate the existing security measures and their impact Determine what security measures are already in place and assess their effectiveness. 7. Identify gaps Identify any gaps that exist in the current security measures and determine what additional measures are needed to address these gaps. 8. Develop a plan Develop a plan to address the identified gaps and mitigate the identified risks. This should include a prioritized list of actions and a timeline for implementation. 9. Implement the plan Implement the plan and monitor the system to ensure that the security measures are effective. 10. Conduct regular assessments Conduct regular assessments to ensure that the security measures remain effective and to identify any new risks or vulnerabilities that may have emerged. Conducting an OT security risk and gap assessment is a complex process that requires expertise in both industrial systems and cybersecurity. Which is why you need to speak to Sectrio. We have conducted OT security and threat assessments across industries. Our mature risk, gap and threat assessment approach can help your organization identify and mitigate gaps and threats.    Find out what is lurking in your network. Go for a comprehensive 3-layer threat assessment now by Sectrio

Why OT security gap and threat assessment is essential for your security posture Read More »

Scroll to Top