How to Prevent OT Ransomware Attacks: A Comprehensive Guide
OT ransomware attacks are on the rise. Learn proven strategies to protect your industrial systems, minimize downtime, and recover quickly.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
Ransomware is an insidious form of cyber threat, hitting large and small organizations alike, with a very robust business model given the immediate need of many organizations to recover operational data. The most popular examples include: WannaCry, NotPetya, Ruyk, Snake ransomware (also known as ekans malware), and Trisys or Triton malware.
The risk to Operational Technology (OT) environments is significant because hackers look for the best return ratio and the benefit of paying a ransom to a target if their operational or manufacturing systems are locked up is much greater.
While the vast majority of ransomware to date has focused on IT systems, the impact where it has spread into OT systems is dramatic as evidenced by NorskHydro, Merck, Maersk and others.
In Verve’s ransomware webinar, you’ll walk away with a comprehensive review of the risks of ransomware to OT systems and what organizations can do to defend, detect, respond and recover from attacks.
As an initial installment on that topic, this blog focuses on one area of defense and that is a robust 360-degree vulnerability management program. There is no “silver bullet” to defending against ransomware, but an ongoing, real-time 360-degree vulnerability management program is a necessary element of any robust defense.
A robust vulnerability management program is a comprehensive set of tasks to assess the vulnerabilities or risks present in an OT/ICS environment, then remediate those risks through a set of actions intended to reduce the overall risk and address key vulnerabilities.
The key functional elements of a vulnerability management program include:
These elements can be pictured in the below diagram:
The vulnerability assessment begins the journey. It includes a robust asset inventory as its starting point. From there, the organization must plan and prioritize actions across patching, configuration hardening, user and account management, etc. What follows is an ongoing defensive approach to ensure that new vulnerabilities are identified and defended against. Finally, reporting allows for visibility of progress before the next step of assessing.
We think of a proper vulnerability assessment as looking at the risks in 360-degrees. The notion is that just looking at published vulnerabilities, as one might do in IT, is not enough to get a true picture of the risk exposure of an asset in OT. Most of these systems were not designed for security from day one and are not managed as the IT systems are (see our OT Systems Management whitepaper here). A 360-degree assessment brings together a more comprehensive view of risk so that the operators can assess true risk, rather than just the CVE or CVSS score of a particular published vulnerability.
This 360-degree assessment can be visualized below:
Ongoing/Real-Time Risk Assessment
One of the biggest gaps in OT vulnerability management is the time it takes between one assessment and the next, or between assessment and the system hardening or remediation. The reasons for these time gaps are due to the manual or step-wise way many assessments are completed – often with manual processes using a sampling of data and requiring manual remediation.
Effective vulnerability management programs create real-time visibility to vulnerabilities and current remediation status. This enables real-time measurement of progress to security maturity. In addition, effective programs integrate the assessment and hardening steps into singular toolkits to accelerate the time between assessment and defense.
Over the past three years, cybercriminals discovered that ransomware pays handsomely. The growth of public ransomware attacks is up dramatically in 2020. The reality is that most organizations that pay ransom do not report the attack, so the number of attacks is surely understated.
Too many OT organizations rely on detection as their only defense. Systems are not patched regularly. Users and accounts are not managed. Segmentation, if it exists in design, often doesn’t exist in practice as firewall rules are not locked down. In many cases, anti-virus signatures are not regularly updated due to the challenges of updating critical process control systems. The list goes on. This list is a recipe for success for the ransomware attacker.
One of the biggest excuses to argue against the need for ongoing vulnerability management in OT/ICS is that these networks are “air-gapped” from the internet and, therefore, not at risk of attack. Although this notion has always been highly suspect, with the accelerated move to remote work, it is truly now dead. With the very rare exception, perhaps of nuclear power plants, no operational networks are truly air-gapped anymore. And the level of remote access is exploding. We have seen remote access rights double at some of our clients since the start of the pandemic lockdown in March.
Much of the press has focused on the need for secure solutions for remote access, but this ignores the most fundamental threat and that is to the endpoints in the networks that are now accessible. Even the most secure access offers new angles of attack. The OT/ICS devices were not designed for defense initially. The objective was to streamline and simplify the actions of a tech who is trying to improve the process, not take advantage. Therefore, vulnerability management was an after-thought at best. Now, with the explosion in remote access, OT/ICS vulnerability management becomes absolutely critical to protect the insides of these networks from lateral movement, malware, and ransomware.
Over the past several years, OT security has become a greater concern of the C-suite and is becoming a greater focus for the CIO and CISO. Not surprisingly, IT leaders want to adopt the same policies, procedures, and vulnerability management on the equipment in operating environments. Most recognize there is a big difference between a PLC or VFD and a laptop or cloud server. However, they want to apply the same principles that have been effective in IT for years.
Operating Technology leaders need to adapt and deliver on these expectations. And as more connections integrate IT and OT, the ability for ransomware to start on the IT side through active phishing campaigns and then bridge over to OT is growing as a risk.
Ransomware prevention requires a comprehensive effort. Security requires a robust program of multiple components to ensure protection. But often the question arises: where do we start? We would argue, the best place to begin is with ongoing 360-degree vulnerability management for several reasons:
The above is just an initial list of the benefits of such an approach. For more information, visit us at www.verveindustrial.com
There is no silver bullet for defending against ransomware, but a 360-degree ongoing vulnerability management program is a critical component of any robust defense. It is an absolutely critical OT security function due to the rising threat of ransomware, increasing remote access, and drive from corporate organizations for IT-OT convergence.
Verve has built the Verve Security Center to address the challenges of OT vulnerability management. We look forward to the opportunity to share how the platform can simplify and streamline your OT/ICS vulnerability management process.
OT ransomware attacks are on the rise. Learn proven strategies to protect your industrial systems, minimize downtime, and recover quickly.
Learn MoreCommon challenges to vulnerability management in OT cyber security and ways to overcome them to create safer industrial and operational environments.
Learn MoreDefending critical infrastructure requires 360-degree visibility into asset and network vulnerabilities through a vulnerability assessment.
Learn More