Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

NSA, CISA Explain How Threat Actors Plan and Execute Attacks on ICS/OT

US government agencies have shared a new cybersecurity resource that can help organizations defend critical control systems against threat actors.

US government agencies have shared a new cybersecurity resource that can help organizations defend critical control systems against threat actors.

Industrial control systems (ICS) and other operational technology (OT) systems can be a tempting target for state-sponsored threat actors, profit-driven cybercriminals and hacktivists. These devices are often left unprotected and hacking them could have serious consequences, including physical damage and loss of life.

The NSA and the DHS’s Cybersecurity and Infrastructure Security Agency (CISA) have been publishing resources to help potentially targeted organizations address the vulnerabilities that expose them to such attacks, and the two agencies have now released another advisory, one focusing on how threat actors plan and execute their attacks against critical infrastructure control systems.

The joint advisory describes the five typical steps involved in planning and executing such an attack. The agencies believe that understanding threat actors’ tactics, techniques, and procedures (TTPs) can be useful for implementing protections and countering adversaries.

In the first phase, threat actors establish the intended effect and select a target. For instance, cybercriminals can target ICS/OT for financial gain, while state-sponsored actors do it for political and/or military objectives. The goals can include causing damage or destruction.

“For example, disabling power grids in strategic locations could destabilize economic landscapes or support broader military campaigns. Disrupting water treatment facilities or threatening to destroy a dam could have psychological or social impacts on a population,” the agencies warned.

2022 ICS Cyber Security Conference

In the second phase, the attackers collect intelligence on the targeted systems. This can be done through open source research, insider threats, or after compromising IT networks and using that access to obtain ICS-related information.

The attackers then use the collected information to develop techniques and tools that will help them achieve their goals.

In the last two phases, the attackers gain initial access to the targeted system and use the aforementioned tools and techniques to achieve the intended effect.

“They could open or close breakers, throttle valves, overfill tanks, set turbines to over-speed, or place plants in unsafe operating conditions. Additionally, cyber actors could manipulate the control environment, obscuring operator awareness and obstructing recovery, by locking interfaces and setting monitors to show normal conditions. Actors can even suspend alarm functionality, allowing the system to operate under unsafe conditions without alerting the operator. Even when physical safety systems should prevent catastrophic physical consequences, more limited effects are possible and could be sufficient to meet the actor’s intent. In some scenarios though, if an actor simultaneously manipulates multiple parts of the system, the physical safety systems may not be enough. Impacts to the system could be temporary or permanent, potentially even including physical destruction of equipment.”

The advisory also includes some recommendations, including limiting exposure of information that can be useful to an attacker, identifying and securing remote access points, limiting access to network and control system tools and scripts, conducting regular security audits, and implementing a dynamic network environment.

The advisory, titled Control System Defense: Know the Opponent, is available on CISA’s website and as a PDF

Related: CISA Creates List of Free Cybersecurity Tools and Services for Defenders

Related: CISA Warns of Threat Posed by Ransomware to Industrial Systems

Related: NSA and CISA Alert Highlights Urgency for OT Security

Related: New Special Interest Group Aims to Enhance ICS/OT Cyber Defenses

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

Threat Intelligence

How threat intelligence is critical when justifying budget for GRC personnel, and for threat intelligence, incident response, security operations and CISO buyers.

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.