The Benefits of Deception for SCADA Environments - Attivo Networks
Attivo Networks Blogs

The Benefits of Deception for SCADA Environments

Written By: Carolyn Crandall, CMO & Chief Deception Officer – Recently, SC Magazine published an article covering several vulnerabilities that Positive Technologies found in GE supervisory control and data acquisition (SCADA) systems where an attacker could intercept passwords and disrupt utility and factory operations. While this particular vulnerability is limited to GE Proficy and Cimplicity SCADA systems, other manufacturers face similar issues. Such vulnerabilities are troubling because most companies are unable to reliably monitor the networks where SCADA systems communicate, nor are they consistently patched and updated. SCADA systems were meant to be open, robust, and easily operated and repaired, and as such, security is not natively part of their design. Many of these solutions also run on older XP operating systems, where security patches are no longer available and given the cost and complexity to upgrade, are kept in production. As a result, they continue to be vulnerable to typical network attacks and possess a strong need for efficient early detection.

Conventional incident response plans don’t account for SCADA, as responding to an attack on an industrial control system (ICS) is completely different from a traditional incident. Some of the standard IR steps just don’t translate to a power plant or manufacturing plant. The SCADA environment is chiefly concerned with uptime, and operators of those networks rarely apply vendor patch updates for security bugs and other issues if the patch could potentially disturb an existing system configuration, or require any downtime or disruption. Plants will not allow an incident response team to reboot running systems during an investigation, risking disruption to operations. Recovery is challenging, as programmable logic controllers (PLCs) cannot be re-imaged the same way a desktop computer can. Logging is another issue, as most industrial systems don’t typically collect event logs like a conventional computer does, or if it does, the logs may not feed to a SIEM. This makes it difficult to investigate an incident, let alone determine where the attack originated from in the first place.

The extent to which SCADA systems can be leveraged by an attacker was first demonstrated by the Stuxnet malware, identified in 2010, that targeted Iran’s nuclear centrifuges. The malware targeted programmable logic controllers (PLCs) made by Siemens, which allow the automation of electromechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or centrifuges for separating nuclear material. Anonymous sources in the Washington Post claimed the worm was designed to sabotage Iran’s nuclear program with what would seem like a long series of unfortunate accidents. Stuxnet reportedly ruined almost one-fifth of Iran’s nuclear centrifuges.

The current batch of vulnerabilities won’t necessarily cause this much damage, but they do require some measure of concern. The vulnerabilities found in General Electric’s Proficy and Cimplicity line of HMI/SCADA systems allow malicious actors to capture passwords and potentially cause read/write failures on authorization databases. Positive Technologies also found a critical fault in the security mechanism of these systems that allows remote access to industrial process controllers. With this much access, an attacker can wreak havoc on a manufacturing process and erase historical data needed to investigate the issue.

So how do organizations reliant on SCADA systems secure their environment? The Attivo Networks ThreatMatrix Deception and Response platform is a recognized by Gartner, Inc. and other analysts for its effectiveness in detecting threats in specialty networks, particularly SCADA.

Attivo Networks takes a different approach to detecting cyber-attacks on ICS- SCADA devices. Instead of relying on signatures or known attack patterns, Attivo uses deception technology to lure the attackers to a BOTsink engagement device. Customers have the flexibility to install their own Open Platform Communications (OPC) software while running popular protocols and PLC devices on the BOTsink solution making it indistinguishable from production SCADA devices. This provides real-time detection of attackers that are conducting reconnaissance to mount their attacks on critical facility and energy networks. Additionally, BOTsink forensics capture information including new device connections, issued commands and connection termination, enabling administrators to study the attacker’s tools, techniques, and information on infected devices that need remediation.

The Attivo SCADA solution is provided through a custom software image that runs on its BOTsink appliance or virtual machine. SCADA BOTsink deployment and management are provided through a central dashboard, which provides network visibility, device management, and threat intelligence dashboards and reporting.

Regardless of the threat or SCADA device in use, the ThreatMatrix platform provides the needed visibility to in-network threats and forensic reports to promptly shut down attacks on critical infrastructure that may range from fuel sensors to critical infrastructure in auditoriums, or even cruise ship infrastructure. Although each of these is very different, the need is the same, protect the infrastructure so that there is no disruption to service, man-made disaster or risk to human safety.

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise

RSS

Leave a Comment

Your email address will not be published. Required fields are marked *

thirteen + 10 =

Ready to find out what’s lurking in your network?

Scroll to Top