HomeCII/OTUnpatched IoT and OT Devices: A Magnet for ICS Cyberattacks

Unpatched IoT and OT Devices: A Magnet for ICS Cyberattacks

Published on

spot_img

Industrial control system (ICS) cybersecurity has been a major concern for both the public and private sectors. Despite significant efforts to strengthen security measures, threat actors are still finding ways to exploit vulnerabilities in Internet of Things (IoT) and operational technology (OT) devices.

Recent research conducted by Nozomi Networks examined public IoT/OT cyber incidents over the past six months and revealed a surge in cyberattacks against ICS systems. Ransomware and DDoS attackers were among the various threat actors identified in these attacks. The manufacturing, water treatment, food and agriculture, and chemical sectors were noted to be the most frequent targets in early 2023.

Nozomi Networks recorded an average of 813 unique cyberattacks daily on its honeypots during the first half of this year. Additionally, the peak of these attacks occurred on May 1, with 1,342 attacks in a single day.

Further research conducted by SynSaber, obtained by Dark Reading, shed light on the underlying factors contributing to this increase in nefarious activity against ICS networks. While the overall number of reported ICS Common Vulnerabilities and Exposures (CVEs) in the first half of the year decreased by 1.6% compared to 2022, 34% of ICS CVEs reported in the same period lacked available patches or remediation, representing a 13% increase from the previous year.

Melissa Bischoping, an endpoint security researcher with Tanium, explained the reasons behind delayed patches for supervisory control and data acquisition (SCADA) and ICS systems. Bischoping highlighted that system stability and uptime are often prioritized by operations, and many patches require restarts, which could disrupt the production process. Consequently, operators may opt to postpone patches to avoid costly downtimes.

The cost of upgrading ICS systems also serves as a deterrent to timely upgrades. Bischoping mentioned that interoperability and compatibility issues with other systems may hinder upgrades until expensive retrofitting or modernization of shared components can be carried out. Upgrades can come with a hefty price tag in the millions of dollars. However, delaying upgrades can lead to increased risks of system failures or exploitation.

Despite the challenges faced by ICS systems operators, John Gallagher, vice president with Viakoo Labs, highlighted that the research and data gathered on ICS cybersecurity demonstrate that efforts to protect these systems have yielded positive results. He noted that in the past, IoT/OT devices and their vulnerabilities were not a significant focus for line-of-business organizations running them. However, asset discovery, threat assessment, and vulnerability remediation solutions specifically designed for IoT/OT systems have emerged, along with increased governmental and board-level attention to the threats posed by such systems.

The continuous occurrence of cyberattacks against unpatched IoT and OT devices underscores the importance of prioritizing ICS cybersecurity. Efforts to develop comprehensive solutions, including timely patches and system upgrades, are crucial in mitigating the risks and maintaining the stability and security of these critical systems.

Source link

Latest articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

More like this

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...