{"id":14602,"date":"2019-10-01T09:17:16","date_gmt":"2019-10-01T03:47:16","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=14602"},"modified":"2019-10-01T09:17:16","modified_gmt":"2019-10-01T03:47:16","slug":"mining-spying-self-replicating-energy-sector-under-cyber-threat-pressure","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/mining-spying-self-replicating-energy-sector-under-cyber-threat-pressure\/","title":{"rendered":"Mining, Spying, Self-replicating, Energy sector under Cyber threat pressure"},"content":{"rendered":"<blockquote>\n<p class=\"page-desc\"><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Kaspersky solutions were triggered on almost half of industrial control system (ICS) computers in the energy sector globally in the first six months of 2019.<\/span><\/strong><\/p>\n<\/blockquote>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>The top three cyber threats were worms, spyware, and crypto currency miners \u2013 together, they combined to make almost 14% of the share of targeted computers. These are among the main findings of the Kaspersky ICS CERT report on the industrial threat landscape in the first half of 2019.<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Industrial cyber incidents are among the most dangerous as they may result in production downtime and tangible financial losses and are quite hard to overcome. This is especially the case when the incident occurs in critical, life-supporting sectors, such as energy. <\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Statistics for H1 2019, automatically processed by Kaspersky security technologies, have shown that those who manage energy solutions should not let their guard down. Overall, during the observed period of time, Kaspersky products were triggered on 41.6% of ICS computers in the energy sector. A large number of conventional malware samples not designed for ICS\u00a0 were blocked.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Among the malicious programs which were blocked, the greatest danger was posed by crypto currency miners (2.9%), worms (7.1%), and a variety of versatile spyware (3.7%). Infection with such malware can negatively affect the availability and integrity of ICS and other systems that are part of the industrial network. Among these detected threats, some are of particular interest.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">This includes AgentTesla, specialized Trojan Spy malware, designed to steal authentication data, screenshots, and data captured from the web camera and keyboard. In all of the analyzed cases, the attackers sent data via compromised mailboxes at various companies. Aside from malware threat, Kaspersky products also identified and blocked cases of the Meterpreter backdoor which was being used to remotely control computers on the industrial networks of energy systems. Attacks that use the backdoor are targeted and stealthy and are often conducted in manual mode. The ability of the attackers to control infected ICS computers stealthily and remotely poses a huge threat to industrial systems. Last but not least, the company\u2019s solutions detected and blocked Syswin, a new wiper worm written in Python and packed into the Windows executable format. This threat can have a significant impact on ICS computers due to its ability to self-propagate and destroy data.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">The energy sector was not the only one to face malicious objects and activities. Other industries, analyzed by Kaspersky experts, have also shown no reason for relief with automotive manufacturing (39.3%) and building automation (37.8%) taking the second and the third places in terms of percentage of the number of ICS computers on which malicious objects were blocked.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>Other findings of the report include:<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">On average, ICS computers do not operate entirely inside a security perimeter typical of corporate environments, and are, to a large extent, protected from many threats, which are also relevant to home users, using their own measures and tools. In other words, tasks related to protecting the corporate segment and the ICS segment are to some extent unrelated.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">In general, the level of malicious activity inside the ICS segment is connected with the \u2018background\u2019 malware activity in the country.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">On average, in countries where the situation with the security of the ICS segment is favorable, the low levels of attacked ICS computers are attributable to protection measures and tools that are used rather than a generally low background level of malicious activity.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Self-propagating malicious programs are very active in some countries. In the cases analyzed, these were worms (malicious Worm class objects) designed to infect removable media (USB flash drives, removable hard drives, mobile phones, etc.). It appears that infections with worms via removable media is the most common scenario that could happen to ICS computers.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">\u201cThe collected statistics, as well as analysis into industrial cyberthreats, are a proven asset for assessing current trends and predicting what type of danger we should all prepare for. This report has identified that security experts should be particularly cautious about malicious software that aims to steal data, spy on critically important objects, penetrate the perimeter and destroy the data. All of these types of incident could cause lots of trouble for industry\u201d,\u00a0says Kirill Kruglov, security researcher at Kaspersky.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"><strong>Kaspersky ICS CERT recommends implementing the following technical measures:<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Regularly update operating systems, application software and security solutions on systems that are part of the enterprise\u2019s industrial network.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Restrict network traffic on ports and protocols used on edge routers and inside the organization&#8217;s OT networks.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Audit access control for ICS components in the enterprise\u2019s industrial network and at its boundaries.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Provide dedicated regular training and support for employees as well as partners and suppliers with access to your OT\/ICS network.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\">Deploy dedicated endpoint protection solution such as\u00a0<a href=\"https:\/\/ics.kaspersky.com\/\">Kaspersky Industrial CyberSecurity<\/a>\u00a0on ICS servers, workstations and HMIs to secure OT and industrial infrastructure from random cyberattacks; and network traffic monitoring, analysis and detection solutions for better protection from targeted attacks.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Read the full version on :\u00a0 <a href=\"https:\/\/ics-cert.kaspersky.com\/reports\/2019\/09\/30\/threat-landscape-for-industrial-automation-systems-h1-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kaspersky ICS CERT<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky solutions were triggered on almost half of industrial control system (ICS) computers in the energy sector globally in the first six months of 2019. The top three cyber threats were worms, spyware, and crypto currency miners \u2013 together, they combined to make almost 14% of the share of targeted computers. These are among the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14603,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,4],"tags":[8166,8170,8169,8163,8168,8160,8162,8161,8165,8167,8164],"class_list":{"0":"post-14602","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"category-technology","9":"tag-crypto-currency-miners","10":"tag-cyber-attacks-on-energy-sector","11":"tag-cyber-threats-to-energy-sector","12":"tag-energy-sector-under-cyberthreat-pressure","13":"tag-kaspersky-ics-cert-report","14":"tag-mining","15":"tag-self-replicating","16":"tag-spying","17":"tag-spyware","18":"tag-top-three-cyber-threats","19":"tag-worms"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/14602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=14602"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/14602\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/14603"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=14602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=14602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=14602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}