Editor's Choice


Security for operational technology: Part 2: How much of a cyber threat are people to OT systems and what can be done?

September 2021 Editor's Choice

The recent cyber-attack on Transnet is a wake-up call that South African companies are not immune from cyber threats. The incident impacted logistics on a national scale. A cyber breach is highly probable if basic defences are not in place and someone with the right resources decides to target you.

Cybersecurity controls can be categorised into people, process and technology. Technology normally gets the most attention and budget. The reality is that operational technology (OT) systems are designed, implemented, supported and used by people. People are the weakest link in terms of cybersecurity and therefore the easiest to exploit. Cybersecurity awareness training is often generic, neglected or the first cost to be cut.

According to Sun Tzu’s Art of War: If you know your enemy and know yourself, you need not fear the results of a hundred battles. Or in other words, the best form of defence is to learn the tactics that hackers use. Initial steps in the cyber kill chain are recce (using open-source intelligence), weaponisation (malware) and delivery (phishing and social engineering).

Open-source intelligence

Open-source intelligence (Osint) is used to collect and analyse information available in the public domain. There is a surprising amount of information openly available on people, companies and products that can be used to exploit systems. Sources of useful information are annual financial statements, social media and specialised sites. Shodan, for example, can be used to find exploits for PLC manufacturers for equipment connected to the Internet https://www.shodan.io.

When data is exfiltrated in a breach, hackers share or sell their bounty on the dark web. This includes dumps of user account names and passwords. This information, combined with Osint can make it easier to breach sites as people use the same passwords for multiple systems. For example, my data was leaked in breaches at eThekwini (2016) and Adobe (2013). Somebody could have tried these passwords to try to access my work systems if my passwords were the same. This is called ‘credential stuffing’. It pays to check to see if your or your employee’s account details have been breached on https://haveibeenpwned.com/. Sites are available to find or help to guess corporate email or login account details i.e.: https://hunter.io/.

Traditionally, companies have relied on air-gapping OT systems as a primary defence. This is no longer sufficient according to a recent report from Honeywell. USB media usage has increased by 30% in 2020 from 2019 and 79% of these threats are capable of disrupting OT. Consider the number of times USB media is connected to OT systems by users who are unaware of the risks. Threat actors know this vulnerability and design malware to be delivered by USB media to target OT systems.

Malware

Malware or malicious software is any software intentionally designed to cause damage to a computer, server, client, or computer network. Content-based malware (altered or infected documents using embedded scripts and macros) and Trojans (malware disguised as legitimate software) are the latest threats. Once the initial exploit is successful, backdoors are opened, remote access established to download additional threats, exfiltrate data and/or establish ‘command and control’ to potentially disrupt OT systems.

Social engineering

Social engineering is the art of influencing people into doing things they would not normally do. People can be unwittingly manipulated to download or execute malware, give up confidential or sensitive information such as account usernames, passwords, bank account numbers, credit card details and identity numbers. These actions and information can be used to breach systems. Risks have increased as more people are now working remotely due to the Covid-19 pandemic. Social engineering tactics can use intimidation, urgency, scarcity, authority, impersonation, familiarity and consensus. These are red flags that users need to be trained to identify.

Phishing

Phishing uses fraudulent emails or websites combined with soc ial engineering to trick users into providing sensitive information or to download malware. This malware can then find its way onto USB media. Phishing usually starts with an email urging you to click on an attachment or weblink to confirm details about online accounts. These emails often appear to originate from popular online institutions or someone you may know. When you click on the link, you are directed to a page where you are asked for information.

A physical firewall protects your IT network by identifying and stopping suspicious network traffic. One of the best defences is to turn people into human firewalls. This means continuous education about cyber threats and how to mitigate them.

Generic cybersecurity awareness training should be provided for all computer users. This will also benefit them when using the Internet for personal use. Specialised training is critical for high risk/influence groups such as executives, procurement, human resources, audit, risk, software development and OT.

Guidelines to consider:

• Ensure passwords are greater than eight characters long, do not re-use them and use a password manager i.e., Lastpass – https://www.lastpass.com).

• Use multifactor authentication for sensitive systems. This is where two or more verification factors are required to gain access.

• Be careful of what personal and work information you publish on social media.

• Keep personal and work systems separate. Use private email for personal use i.e. banking, medical aid, social media, insurance, etc.

Training can only go so far. Companies should run ongoing phishing simulations to check how effective their ‘human firewalls’ are performing. This will highlight users that are repeat offenders and need attention.

References

Shapshak T, 2021, Note to Transnet: Cyberattacks only work when there are vulnerabilities to exploit, https://www.dailymaverick.co.za/opinionista/2021-08-04-transnet-ports-closed-and-were-in-the-dark/

Dholakiya P, What Is the Cyber Kill Chain and How It Can Protect Against Attacks, https://www.computer.org/publications/tech-news/trends/what-is-the-cyber-kill-chain-and-how-it-can-protect-against-attacks

Zerofox, 2021, Understanding Credential Stuffing for Effective Protection, https://www.zerofox.com/blog/understanding-credential-stuffing/

Honeywell, 2021 Industrial cybersecurity USM Threat Report 2021, https://www.honeywell.com/content/dam/honeywellbt/en/images/content-images/cybersecurity-threat-report-2021/Industrial%20Cybersecurity%20USB%20Threat%20Report%20v5.pdf

Wikipedia, Malware, https://en.wikipedia.org/wiki/Malware

Wolfpack, 2021, PHISHING SURVIVAL GUIDE, https://store.alertafrica.com/advice-and-guidance/devices/phishing-survival-guide/

Chiwanza S, 2020, PASSWORDS, https://store.alertafrica.com/advice-and-guidance/applications/passwords/

Steel A, 2012, New study: Passwords are still the weakest link, https://blog.lastpass.com/2012/03/latest-review-of-security-issues-and/

Please contact me to share your ideas, or if you have been breached or need help. You can also report breaches at the national Computer Security Incident Response Team (CSIRT) at [email protected].


About Bryan Baxter


Bryan Baxter.

Bryan Baxter has been in the IT Industry since 1992 in various roles before recently joining Wolfpack Information Risk. He has helped customers successfully manage and deliver IT infrastructures to around 7000 users in several countries, where, of course, the recurring theme has been keeping customers secure from cybersecurity threats. For more information contact Bryan Baxter, Wolfpack Information Risk, +27 82 568 7291, [email protected], www.wolfpackrisk.com


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Connecting every transport node
RJ Connect Editor's Choice Data Acquisition & Telemetry
Stockholm's bus system strategically links urban mainline, suburban mainline, non-mainline routes, community service buses and night buses. To acquire and process data from multiple sources and analyse onboard information on their moving buses, Transdev sought a dependable and powerful onboard computer. It teamed up with CatAB, Moxa’s local representative, known for delivering top-notch industrial data communication boards and equipment since 1988.

Read more...
Local range of planetary units
SEW-EURODRIVE Editor's Choice Motion Control & Drives
As SEW-EURODRIVE South Africa actively extends its offerings to customers, the SEW PPK and SEW P2.e industrial gearbox ranges are good examples of solutions that are well suited to the local business environment.

Read more...
Case History 195: Unstable reboiler steam flow
Michael Brown Control Engineering Editor's Choice
A high-pressure steam flow control in a reboiler on a column in a petrochemical refinery continually cycled when placed in automatic. Several attempts had been made to tune the controller, but these had been unsuccessful.

Read more...
Open control system for retrofit of conveyor control system
Beckhoff Automation Editor's Choice
For every online retailer, warehouse logistics is part of the critical infrastructure. An Australian office equipment supplier has retrofitted the warehouse logistics installation of its central warehouse, and replaced the proprietary decentralised controllers of the conveyor lines with PC-based control from Beckhoff, based on powerful EtherCAT communication.

Read more...
Digital industrial platforms and why they are important
Editor's Choice
One of the most significant trends driving digital transformation is the emergence of digital industrial platforms. This article will briefly explore what digital industrial platforms are, why they are important, and how they might shape the future of industrial automation.

Read more...
Celebrating 65 years: rebuilding and redefining its legacy
Editor's Choice News
Founded in 1959 by Neill Simpson, Axiom Hydraulics has grown into one of South Africa’s elite hydraulic companies. Over the past six and a half decades they’ve weathered many challenges, but none as devastating as the fire of 2023.

Read more...
Young robotics team takes world title
igus Editor's Choice News
In an inspiring demonstration of innovation and teamwork, Texpand, a young South African robotics team, recently made history by winning the 2024 FIRST Tech Challenge World Championships.

Read more...
SAIMC: It’s not black and white
SAIMC Editor's Choice SAIMC
Grey imports are a problem worldwide, not least in the automation industry in South Africa. The Supplier Advisory Council (SAC) operates under the umbrella of SAIMC, and is tackling this problem head-on.

Read more...
Loop signature 25: Tuning part 3 - Results of tuning a particular simple self-regulating process by several different methods.
Michael Brown Control Engineering Editor's Choice
A couple of SWAG methods of tuning were given in the previous Loop Signature article. I have tuned a simple self-regulating process using those methods, and two other tuning methods, one of them being the sophisticated Protuner tuning package, which is the system I employ. The tests were performed on a very accurate and powerful simulation package, and the results are compared below.

Read more...
PC-based control for advanced hydrogen storage technology
Beckhoff Automation Editor's Choice PLCs, DCSs & Controllers
The proportion of renewable energies from solar, wind and water is rising continuously. However, sufficient storage options are of the essence to use these energies as efficiently as possible. GKN Hydrogen offers a particularly compact and safe option, low-pressure metal hydride hydrogen storage systems with PC-based control from Beckhoff.

Read more...