text
stringlengths 4
429
|
---|
were Israeli SCADA systems for power plants and other systems. Meanwhile,
|
Operation Save the Arctic
|
targeted
|
multiple oil companies around the globe in protest against drilling plans in the Arctic.
|
Disgruntled employees are also a source of attacks that should not be underestimated. With their knowhow about
|
internal critical processes and systems they often know how to inflict serious damage. They may be able to perform
|
system modifications that could go unnoticed for a long periods.
|
Page 16
|
Targeted Attacks Against the Energy Sector
|
Protection and mitigation
|
For all regular client computers, the well-established best practice guidelines apply. These computers are often
|
the first ones to be attacked. Once compromised, the attacker will use these computers and try to explore deeper
|
into internal networks. Securing and hardening of deployed operating systems with a working strategy for patch
|
deployment is important. Reoccurring security awareness training can help users to identify social engineering
|
attempts and prevent them from falling victim to them in the first place.
|
The company can perform penetration testing on Web and network applications but also on ICSs to identify and
|
remedy any vulnerability. For examples Web applications should be tested against SQL injection attacks. This can
|
also help confirm if applied polices are followed through, if the patch level is correct on all computers and if systems
|
are compliant.
|
Companies can monitor the Internet for information about attacks in the same vertical and apply lessons learned
|
where possible.
|
In addition, different layers of security products can help achieve better overall protection.
|
Security Information and Event Manager system (SIEM): Using a SIEM can help correlate all related alerts in
|
one place. This centralized view can be cross referenced with threat intelligence data to generate prioritization and
|
an action plan. Painting the bigger picture of the overall security state can reveal previously unnoticed attacks.
|
For example failed login attempts on internal servers could indicate a password breach. This includes logging of
|
critical systems and synchronization of time among multiple systems.
|
Ingress and egress filtering: Filtering the network traffic with firewalls, content filters and IPS allows the control
|
of data flows. This can prevent attackers from reaching internal systems. It is important to also monitor outbound
|
traffic, as data exfiltration is a key point for cyberespionage. It should be noted that with the increased use of
|
cloud services and mobile devices, some traffic might never pass through the company
|
s gateways. Where traffic
|
blocking is too disruptive at least monitoring should be implemented.
|
Data loss prevention (DLP): DLP solutions can track the access and flow of critical information and prevent it
|
from leaving the company or encrypt it automatically.
|
Endpoint protection: Depending on the usage pattern of the computer, different solutions are available to protect
|
the endpoint. Antivirus solution with proactive detection methods like behavioral analysis and reputation scanning
|
can prevent unknown malware from installing itself. HIPS (host based intrusion prevention systems), behavioral
|
lockdown or whitelisting can protect computers from any kind of unwanted tampering without the need of
|
constant updates.
|
System protection: For non-standard IT systems, hardening can increase the security. On industrial systems
|
which are not often updated or that cannot be updated, exploitation can be prevented with the help of lockdown
|
solutions like Symantec Critical System Protection (CSP). Through policies, only trusted system applications are
|
allowed to run. ICS should be regularly checked and upgraded if new firmware exists. Where this is not possible
|
HIPS and behavioral lockdown tools can be used to secure computers.
|
Email filtering: Proper email filtering can prevent many spear phishing attempts from reaching users. They can
|
help minimize the risk of an untrained user falling for social engineering tricks.
|
Authentication: Some of the ICS contain hardcoded passwords and, wherever possible, these should be changed.
|
ICS frequently use weakly authenticated protocols that allow for impersonation attacks. Where possible those
|
authentication methods should be upgraded or at least closely monitored. Strong authentication or PKI should be
|
used where applicable.
|
Industrial control systems (ICS) should be specially protected and monitored. The control system and control
|
network should be secured. Where possible, ICS should be separate from the Intranet. Isolating these networks alone
|
is often not enough to protect the control network, but it can make it more difficult for attackers to succeed. For
|
some systems it can make sense to have a plan to quickly disconnect or separate critical machines in the event of a
|
detected cyberattack.
|
Page 17
|
CONCLUSION
|
In the second
|
half of 2012, the
|
energy sector was
|
the second most
|
targeted with 16
|
percent of all the
|
targeted attacks.
|
Targeted Attacks Against the Energy Sector
|
Conclusion
|
Cyberespionage campaigns and sabotage attacks are becoming increasingly common, with countless threat
|
actors attempting to gain a foothold in some of the best protected organizations. At this stage, roughly
|
five targeted attacks per day are being mounted on firms in the energy sector. These attacks have become
|
increasingly sophisticated, although the capabilities and tactics used by these threat actors vary considerably.
|
In the second half of 2012, the energy sector was the second most targeted with 16 percent of all the targeted
|
attacks. This strong increase was mainly due to a large scale attack against one global oil company. In the first
|
half of 2013, the energy sector was ranked fifth with 7.6 percent of all attacks focused on this sector. In general
|
we have observed that attackers are becoming more efficient and focusing on smaller operations that attract
|
less attention.
|
The attackers tend to go after valuable information
|
such as maps of a new gas field
|
but the sector is also
|
a major target for sabotage attacks, which will not generate direct profit for the attacker. Such disruptive
|
attacks do already happen and may lead to large financial losses. State sponsored agents, competitors, internal
|
attackers or hacktivists are the most likely authors of such sabotage attacks.
|
Fortunately, there have not been many successful sabotage attacks against energy companies to date. However,
|
the increasing number of connected systems and centralized control for ICS systems means that the risk
|
of attacks in the future will increase. Energy and utility companies need to be aware of these risks and plan
|
accordingly to protect their valuable information as well as their ICS or SCADA networks.
|
Page 19
|
APPENDIX
|
Targeted Attacks Against the Energy Sector
|
Appendix
|
A. Spear phishing
|
Social engineering themes used
|
Social engineering is an essential part of spear phishing campaigns. A cleverly chosen, enticing message may prompt
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.