Connect with us

Hi, what are you looking for?

HEADLINES

91.1% of ICS hosts have vulnerabilities that can be exploited remotely

Exposing ICS components to the Internet provides a lot of opportunities, but also many concerns around security.

To minimize the possibility of a cyber-attack, Industrial Control Systems (ICS) are supposed to be run in a physically isolated environment. However, this is not always the case. In its report on the ICS threats landscape, Kaspersky Lab experts revealed 13,698 ICS hosts exposed to the Internet that more than likely belong to large organizations.

Kaspersky

These organizations include energy, transportation, aerospace, oil and gas, chemicals, automotive and manufacturing, food and drink, governmental, financial and medical institutions. 91.1% of these ICS hosts have vulnerabilities that can be exploited remotely.

Worse, 3.3% of ICS hosts located in these organizations contain critical and remotely executable vulnerabilities.

Exposing ICS components to the Internet provides a lot of opportunities, but also many concerns around security. On the one hand, connected systems are more flexible in terms of a fast reaction to critical situations and implementation of updates. But on the other, the expansion of the Internet gives cybercriminals a chance to remotely control critical ICS components, which can result in physical harm to the equipment as well as potential danger to the whole critical infrastructure.

Advertisement. Scroll to continue reading.

Sophisticated attacks on ICS systems are not new. In 2015, an organized group of hackers called BlackEnergy APT attacked a power company in Ukraine. In the same year two more incidents, supposedly connected with cyber-attacks, were reported in Europe: on a steel mill in Germany and on the Frederic Chopin Airport in Warsaw.

More attacks of this kind will emerge in the future since the attack surface is big. Those 13,698 hosts, located in 104 countries are only a small part of the total number of hosts with ICS components available through the Internet.

To help organizations working with ICS to identify their possible weak points, Kaspersky Lab experts conducted an investigation into ICS threats. Their analysis was based on OSINT (Open Source Intelligence) and information from public sources like ICS CERT, with the research period limited to 2015.

The major findings of the Industrial Control Systems Threats Landscape report are:

  • In total, 188,019 hosts with ICS components available via the Internet have been identified in 170 countries.
  • Most of the remotely available hosts with ICS components installed are located in the United States of America (30.5% – 57,417) and Europe. In Europe, Germany has a leading position (13.9% – 26,142 hosts), followed by Spain (5.9% – 11,264 hosts), and France (5.6% – 10,578 hosts).
  • 92% (172,982) of remotely available ICS hosts have vulnerabilities. 87% of these hosts contain medium risk vulnerabilities and 7% of them have critical vulnerabilities.
  • The number of vulnerabilities in ICS components has increased tenfold during the past five years: from 19 vulnerabilities in 2010 to 189 vulnerabilities in 2015. The most vulnerable ICS components were Human Machine Interfaces (HMI), Electric Devices and SCADA systems.
  • 91.6% (172,338 different hosts) of all the externally available ICS devices use weak Internet connection protocols, which opens the opportunity for attackers to conduct ’man in the middle’ attacks.

“Our research shows that the larger the ICS infrastructure, the bigger the chance that it will have severe security holes. This is not the fault of a single software or hardware vendor. By its very nature, the ICS environment is a mix of different interconnected components, many of which are connected to the Internet and contain security issues. There is no 100% guarantee that a particular ICS installation won’t have at least one vulnerable component at any single moment in time. However, this doesn’t mean that there is no way to protect a factory, a power plant, or even a block in a smart city from cyber-attacks. Simple awareness of vulnerabilities in the components used inside a particular industrial facility is the basic requirement for security management of the facility. That was one of the goals behind our report: to bring awareness to interested audiences,” said Andrey Suvorov, head of critical infrastructure protection, Kaspersky Lab.

In order to protect the ICS environment from possible cyber-attacks, Kaspersky Lab security experts advise the following:

Advertisement. Scroll to continue reading.
  • Conduct a security audit: inviting experts who specialize in industrial security is probably the quickest way to identify and remove the security loopholes described in the report.
  • Request external intelligence: today IT security relies on knowledge of potential attack vectors. Obtaining such intelligence from reputable vendors helps organizations to predict future attacks on the company’s industrial infrastructure.
  • Provide protection inside and outside the perimeter. Mistakes happen. A proper security strategy has to devote significant resources to attack detection and response, to block an attack before it reaches critically important objects.
  • Evaluate advanced methods of protection: A Default Deny scenario for SCADA systems, regular integrity checks for controllers, and specialized network monitoring to increase the overall security of a company and reduce the chances of a successful breach, even if some inherently vulnerable nodes cannot be patched or removed.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

APPS

Today, the App Store stands at the forefront of app distribution, setting the standard for security, reliability, and user experience.

HEADLINES

Kaspersky has detected and blocked over 13 million web threats from its security solutions for businesses in Southeast Asia (SEA). Historical data from the...

HEADLINES

Kaspersky has been at the forefront of raising awareness about cybercrimes and empowering individuals and organizations to protect themselves.

HEADLINES

“We remind our customers to carefully inspect URLs before opening them. Criminals often use spellings very close to legitimate domains to deceive customers into...

HEADLINES

For the Philippines, PH-CERT and NADPOP estimate that the country needs 180,000 trained and validated cybersecurity professionals to proactively and effectively protect the country’s...

White Papers

46% of geo-distributed companies encountered network problems between one and three times per month, while 13% stated they experienced network challenges every week. The...

HEADLINES

“Data is the new oil. Cyber criminals steal personal information to defraud you or use your identity to victimize people close to you. Guard...

White Papers

According to the report, among organizations surveyed, 97% of those hit by ransomware over the past year engaged with law enforcement and/or official government...

Advertisement