200% Increase in SCADA Vulnerabilities!
200% Increase in SCADA Vulnerabilities!
latest news
9.11.2018 14:33
9.11.2018 14:33
ELECTRICITY
200% Increase in SCADA Vulnerabilities!
Trend Micro's security intelligence unit, TrendLabs, has revealed that critical infrastructures are the focal point for cybercriminals who want to identify and exploit the weakest link in both cybersecurity and interconnected systems. The fact that the Zero Day Initiative (ZDI), supported by Trend Micro, has issued recommendations on nearly 400 SCADA vulnerabilities since the beginning of 2018, showing a 200 percent increase in this number compared to the same period last year, is the biggest proof of this danger. Using Shodan and other tools, TrendLabs investigated potential weaknesses in open Industrial Control Systems (ICS) in the energy and water sectors. The results showed that in addition to the pollution of water resources or the rendering of power plants unserviceable, these systems could be used in a way that would constitute a crime. Pinar Uylum Terzioglu, Trend Micro Regional Marketing Manager, pointed out in a report prepared by the Zero Day Initiative (ZDI) this year that there are a record number of Industrial Control Systems (ICS) vulnerabilities, a growing risk that permeates all societies. Terzioğlu said, "Today, all infrastructures have become as automated as possible due to the smart operating systems. But being "smart" comes at a price, too. Researchers at TrendLabs, the global leader in cybersecurity solutions, have investigated potential weaknesses in Industrial Control Systems (ICS) of energy and water infrastructures. "The results reveal that cyber attackers are exploiting vulnerabilities found in ICS or Human Machine Interfaces (HMIs) of interconnected critical infrastructure." According to the report, HMIs, which are an important part of Industrial IT systems, allow operators to interact with SCADA (Data-Based Control and Surveillance System) environments. The vast majority of the open systems identified are made up of smaller energy and water organizations that feed major corporate supply chains that serve the public. By gaining access to an open HMI system, the attacker can not only see all the information about critical systems, but also interact with their interfaces and use them maliciously. Many of the HMIs in use today are legacy systems that were not designed to connect to a network. The use of many legacy operational technology systems that have been used for a long time and are very difficult to patch also increases the risk of attack. Attackers can also turn their attention to exploiting open systems in parallel with the increase in new vulnerabilities found this year. The fact that the Zero Day Initiative (ZDI), supported by Trend Micro, has so far issued recommendations on nearly 400 SCADA vulnerabilities in 2018, showing a 200 percent increase in this number compared to the same period last year, is the biggest proof of this danger. So what should be done for the security of critical infrastructures? When Trend Micro researchers examined small-sized energy and water devices/systems, they found that systems that provide such a critical infrastructure service are online and easily accessible. Again, this research revealed that large companies or public enterprises do not yet have any deficits, but small companies are more accessible. Identify areas of vulnerability: Large companies are not safe either, as attackers are not legally blocked like investigators.  Because all of these accessible small companies are somehow tied to big businesses, and once these small companies have been infiltrated, it's not too hard to move forward, especially for dedicated people. Such supply chains can only be as strong as their weakest link. Although cyber security awareness is increasing in critical infrastructures and important steps are being taken for this, there are serious efforts to be made to be fully protected. The development process will take time due to the complexity of critical infrastructure systems and the large number of players in the industry. But it is thought that raising awareness of areas of vulnerability will help speed up the process. Clarify who is responsible: According to a recent study by Trend Micro, such operational technologies are often not managed by IT or security teams. Confusion in organizations about who is responsible for the security of interconnected devices often puts systems at greater risk. Ensure that external access to ICS is blocked: To protect HMI systems from the risk of an attack, security managers must ensure that interfaces are optimally protected, even if they have to connect to the internet. There also needs to be the highest level of isolation between these devices and the corporate network. This way, they can meet operational needs while eliminating the risk of being attacked and exploited.
  • Dinle
  • A+
    Buyut
  • A-
    Kucult
Yorum SİZİN DÜŞÜNCELERİNİZ?