text
stringlengths 4
429
|
---|
were Israeli SCADA systems for power plants and other systems. Meanwhile, |
Operation Save the Arctic |
targeted |
multiple oil companies around the globe in protest against drilling plans in the Arctic. |
Disgruntled employees are also a source of attacks that should not be underestimated. With their knowhow about |
internal critical processes and systems they often know how to inflict serious damage. They may be able to perform |
system modifications that could go unnoticed for a long periods. |
Page 16 |
Targeted Attacks Against the Energy Sector |
Protection and mitigation |
For all regular client computers, the well-established best practice guidelines apply. These computers are often |
the first ones to be attacked. Once compromised, the attacker will use these computers and try to explore deeper |
into internal networks. Securing and hardening of deployed operating systems with a working strategy for patch |
deployment is important. Reoccurring security awareness training can help users to identify social engineering |
attempts and prevent them from falling victim to them in the first place. |
The company can perform penetration testing on Web and network applications but also on ICSs to identify and |
remedy any vulnerability. For examples Web applications should be tested against SQL injection attacks. This can |
also help confirm if applied polices are followed through, if the patch level is correct on all computers and if systems |
are compliant. |
Companies can monitor the Internet for information about attacks in the same vertical and apply lessons learned |
where possible. |
In addition, different layers of security products can help achieve better overall protection. |
Security Information and Event Manager system (SIEM): Using a SIEM can help correlate all related alerts in |
one place. This centralized view can be cross referenced with threat intelligence data to generate prioritization and |
an action plan. Painting the bigger picture of the overall security state can reveal previously unnoticed attacks. |
For example failed login attempts on internal servers could indicate a password breach. This includes logging of |
critical systems and synchronization of time among multiple systems. |
Ingress and egress filtering: Filtering the network traffic with firewalls, content filters and IPS allows the control |
of data flows. This can prevent attackers from reaching internal systems. It is important to also monitor outbound |
traffic, as data exfiltration is a key point for cyberespionage. It should be noted that with the increased use of |
cloud services and mobile devices, some traffic might never pass through the company |
s gateways. Where traffic |
blocking is too disruptive at least monitoring should be implemented. |
Data loss prevention (DLP): DLP solutions can track the access and flow of critical information and prevent it |
from leaving the company or encrypt it automatically. |
Endpoint protection: Depending on the usage pattern of the computer, different solutions are available to protect |
the endpoint. Antivirus solution with proactive detection methods like behavioral analysis and reputation scanning |
can prevent unknown malware from installing itself. HIPS (host based intrusion prevention systems), behavioral |
lockdown or whitelisting can protect computers from any kind of unwanted tampering without the need of |
constant updates. |
System protection: For non-standard IT systems, hardening can increase the security. On industrial systems |
which are not often updated or that cannot be updated, exploitation can be prevented with the help of lockdown |
solutions like Symantec Critical System Protection (CSP). Through policies, only trusted system applications are |
allowed to run. ICS should be regularly checked and upgraded if new firmware exists. Where this is not possible |
HIPS and behavioral lockdown tools can be used to secure computers. |
Email filtering: Proper email filtering can prevent many spear phishing attempts from reaching users. They can |
help minimize the risk of an untrained user falling for social engineering tricks. |
Authentication: Some of the ICS contain hardcoded passwords and, wherever possible, these should be changed. |
ICS frequently use weakly authenticated protocols that allow for impersonation attacks. Where possible those |
authentication methods should be upgraded or at least closely monitored. Strong authentication or PKI should be |
used where applicable. |
Industrial control systems (ICS) should be specially protected and monitored. The control system and control |
network should be secured. Where possible, ICS should be separate from the Intranet. Isolating these networks alone |
is often not enough to protect the control network, but it can make it more difficult for attackers to succeed. For |
some systems it can make sense to have a plan to quickly disconnect or separate critical machines in the event of a |
detected cyberattack. |
Page 17 |
CONCLUSION |
In the second |
half of 2012, the |
energy sector was |
the second most |
targeted with 16 |
percent of all the |
targeted attacks. |
Targeted Attacks Against the Energy Sector |
Conclusion |
Cyberespionage campaigns and sabotage attacks are becoming increasingly common, with countless threat |
actors attempting to gain a foothold in some of the best protected organizations. At this stage, roughly |
five targeted attacks per day are being mounted on firms in the energy sector. These attacks have become |
increasingly sophisticated, although the capabilities and tactics used by these threat actors vary considerably. |
In the second half of 2012, the energy sector was the second most targeted with 16 percent of all the targeted |
attacks. This strong increase was mainly due to a large scale attack against one global oil company. In the first |
half of 2013, the energy sector was ranked fifth with 7.6 percent of all attacks focused on this sector. In general |
we have observed that attackers are becoming more efficient and focusing on smaller operations that attract |
less attention. |
The attackers tend to go after valuable information |
such as maps of a new gas field |
but the sector is also |
a major target for sabotage attacks, which will not generate direct profit for the attacker. Such disruptive |
attacks do already happen and may lead to large financial losses. State sponsored agents, competitors, internal |
attackers or hacktivists are the most likely authors of such sabotage attacks. |
Fortunately, there have not been many successful sabotage attacks against energy companies to date. However, |
the increasing number of connected systems and centralized control for ICS systems means that the risk |
of attacks in the future will increase. Energy and utility companies need to be aware of these risks and plan |
accordingly to protect their valuable information as well as their ICS or SCADA networks. |
Page 19 |
APPENDIX |
Targeted Attacks Against the Energy Sector |
Appendix |
A. Spear phishing |
Social engineering themes used |
Social engineering is an essential part of spear phishing campaigns. A cleverly chosen, enticing message may prompt |
Subsets and Splits