Login

Register

Login

Register

#cybersecurity | #hackerspace |

New Wave of Ransomware Threatens OT Security and Reliability


Ransomware Disrupts Natural Gas Compression Facility

A case in point example is a cyberattack against a natural gas compression facility, that occurred this month. The method of entry was spear phishing, to obtain access to the IT network. Then, due to inadequate segregation between the networks, the attackers managed to pivot into the OT network. Once that happened, the attackers deployed a strain of ransomware on both networks, causing the operator to lose visiblity into their OT network.  

While there was no impact to the control of operations, the victim had to temporarily suspend operations, resulting in loss of production and revenue.

How to Reduce Risk to OT Ransomware

Asset owners can reduce their risk to this type of attack by: 

  • Prioritizing robust segmentation between IT and OT networks with firewall rules that consider the requirements of each zone
  • Training users to identify possible spear phishing messages, not click them, and report them to cybersecurity staff
  • Training users not to visit malicious websites
  • Checking that public services are configured properly
  • Using a tool that provides visibility into networks and systems and identifies unpatched services, making it easy for administrators to shut down avenues that provide an initial foothold into a network
  • Requiring multi-factor authentication for remote access to networks
  • Subscribing to a service that provides ongoing threat intelligence updates

New Wave of OT Security Threat Requires Defense in Depth Countermeasures

The availability and use of unsophisticated ransomware targeting ICS environments represents a new wave of OT security threats, and operators should adjust their defenses to protect against it. Cybersecurity best practices such as strong segmentation, user training, proactive cyber hygiene programs, multi-factor authentication and continuously updated threat intelligence are the keys to avoiding control system disruption.



Source link

Leave a Reply

Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW