How to Prevent OT Ransomware Attacks: A Comprehensive Guide
OT ransomware attacks are on the rise. Learn proven strategies to protect your industrial systems, minimize downtime, and recover quickly.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
If you’ve been looking at ICS CERT and following cybersecurity news lately, you’ve no doubt noticed a spike in scary-sounding news. When infosec conferences such as Blackhat or various media firms get fixated on certain vulnerabilities, it often starts to feel like the world is one hack away from absolute chaos.
But is it really?
Beyond the debate over the CVSS scoring mechanism applied to products in industrial and critical infrastructure environments, here are the facts:
What else is missing?
Over the last few years, we’ve heard numerous discussions about various stack-related vulnerabilities in embedded systems and how there are hundreds of thousands —perhaps even millions — of devices affected. The truth is, however, how and how many devices are affected and the real impact of those flaws is a nuanced discussion. Vulnerability and risk discussions require an adept touch in understanding their roots and intricacies; especially in OT/ICS devices. To wit:
If we examine any number of news articles or advisories for URG11, Schneider Electric Modicon UMAS vulnerability, GE UR relay vulnerabilities, or even our recent discovery for the Bachmann M1 series of PLCs, we can assume that all devices and software have flaws.
Using that assumption, we can begin to look at vulnerabilities differently, prioritize which classes or types we should focus on. We also need to recognize that vulnerabilities come in two categories: User-space application-related (E.g., RS Logix or project file); and Embedded-related (E.g., Modbus implementation or RTOS)
Setting aside for the moment those products moving to cloud-connected devices with direct or required Internet access, and those increasingly encumbered by vendor lock-in, we find the majority of vulnerabilities reported on CISA/ICS CERT last year were related to applications hosted on endpoints. From this we can assume:
We can discuss the merits of OT application patching ad nauseum, but application-related vulnerabilities and risks are much easier to manage than those in embedded systems, even when their insecure, vulnerable-by-design protocols are run over the network a la Modbus, OPC Classic, or EIP/CIP. As for vulnerabilities related to the secrets in files, we understand they “shouldn’t be there,” but we concede most asset owners have passwords written on SOPs, use weak passwords, or leave files unprotected against modification on fileshares and shared engineering workstations.
Should we push vendors to make better software? Yes. But we also need to do a better job of securing our environments, cleaning up PLC project artifacts and configurations, hardening endpoints, and more. Both the MDT Autosave and Schneider Electric EcoStructure vulnerabilities demonstrate sloppy handiwork by the vendors, product risk/quality owners, and developing parties involved. We should expect this and always validate for security.
Unless the software or affected device is directly on the Internet or exposed to myriad threats, the sky won’t fall today due to an application flaw. The culprit is more likely to be a weakness in the underlying OS, VPN terminators, or edge firewalls or be the product of weak passwords or unmanaged remote access software like VNC/TeamViewer as we saw in the incidents at Colonial Pipeline and the Oldsmar (Fla.) water treatment facility.
All an attacker needs to do is get in, and leverage legitimate functionality — coupled with poor organizational security fundamentals — against the asset owner.
The more challenging vulnerabilities are those that live in the embedded devices that drive most physical processes in OT/ICS networks. These devices are rarely patched for security, have numerous flaws by design, and are rarely configured to be more secure even if they have features to make them so. Faced with this bleak reality, one might ask:
We see it over and over again: Facilities capable of large, “forklift” upgrades and major implementations of new equipment, won’t spend a cent securing or improving infrastructure like the controls network or endpoints. Security and maintenance should not cost more when developing products, and I should know. I helped bring several embedded products to market in the ICS space. And for asset owners, this is the result of paper-mâché asset ownership without taking a pause to correct security rot or addressing security paradigm change results.
What can be said about vulnerabilities such as our recent discovery on authentication weaknesses in the Bachmann M1 controllers that affects every device in existence? Well, the fix doesn’t fix much, and here’s why:
The advisory is replete with CERT shenanigans and no small amount of legalese, vendor recommendations, workarounds, and suggestions for base practices that hint at any number of issues that might have been reported as separate CVEs themselves. Sure, MD5 is broken and its replacement with SHA512 does not address the core issues. The vulnerability was an improperly secure secret/configuration store, and insecure default deployment options that both allowed further exploitation or was enabled by an overall insecure design.
The OEM snuck in another issue fix – upgrading of an insecure component to resolve the OpenSSL issues. Unfortunately, the vendor recommended the use of TLS in the advisory yet they updated OpenSSL silently (unless you read the update notes on the vendor’s portal). I would have suggested CISA post this as a CWE/CVE in the actual advisory or ensure that NVD would have a CPE update. But choose your battles as they say, and I am grateful the vendor took steps to work with the CERT, setup vulnerability reporting processes and so on. That’s progress!
In summary, don’t necessarily be afraid of “whats” in the news regarding vulnerabilities. Some are scarier than others, but the majority need context. To gain knowledge on this topic, read my Ultimate Guide to Reading ICS Cyber Security Advisories Like a Pro. Beyond that, as a community, we need to:
If you are an asset owner, before you panic, use a platform like Verve to assess your risk continuously in order to get:
Comments, questions, thoughts are always welcome. Expect more information to be shared about what we observe on embedded system security, and what you can do about it.
OT ransomware attacks are on the rise. Learn proven strategies to protect your industrial systems, minimize downtime, and recover quickly.
Learn MoreDefending critical infrastructure requires 360-degree visibility into asset and network vulnerabilities through a vulnerability assessment.
Learn MoreThe ISA/IEC 62443 collection of standards is laser-focused on industrial controls. Here’s how to make the most of them.
Learn More