Identified: Risky OT and ICS devices in KRITIS

Share post

Armis identifies and publishes a study on the most risky OT and ICS devices in critical infrastructure. It shows the threats to critical infrastructure in manufacturing, utilities and transportation.

The one from the Armis Asset Intelligence and Security Platform Analyzed data monitoring more than three billion assets found that the operational technology (OT) and industrial control systems (ICS) devices that pose the greatest risk to these industries are engineering workstations, SCADA servers, automation servers, data historians, and programmable logic controllers (PLC).

Prioritization and vulnerability management remain an issue

🔎 The report identifies the top 5 most vulnerable OT and ICS devices in the enterprise (Image: Armis).

Research found that technical workstations saw the most attack attempts in the industry over the past two months, followed by SCADA servers. 56 percent of technical workstations have at least one unpatched critical vulnerability (Common Vulnerabilities and Exposures (CVEs)) and 16 percent are vulnerable to at least one dangerous CVE that was published more than 18 months ago.

Uninterruptible power supplies (UPS) are the third type of device that has been attacked the most in the past two months. Although critical for continuity in the event of a power outage, the data showed that 60 percent of UPS devices have at least one unpatched CVE vulnerability with critical severity, which, like TL Storm has shown could trick cybercriminals into damaging the device itself or other assets connected to it.

SPS: 40 percent of the controllers are unpatched

Another example is programmable logic controllers (PLCs), of which 41 percent have at least one unpatched CVE with critical severity. These legacy devices are critical because an attack could disrupt core operations. However, research has shown that they may be susceptible to high risk factors. An example of this is hardware or firmware that is no longer supported.

A number of other devices pose a risk to manufacturing, transportation, and utility environments because they had at least one malicious CVE released prior to January 2022: 85 percent of barcode readers, 32 percent of industrial managed switches, 28 percent of IP cameras and 10 percent of printers.

IP cameras and printers are also at risk

🔎 Even simple devices in the company have weak points that are repeatedly attacked (Image: Armis).

🔎 Even simple devices in the company have weak points that are repeatedly attacked (Image: Armis).

Across industries, OT companies are characterized by having multiple sites, multiple production lines, and complex distribution lines with large numbers of managed and unmanaged devices on their networks. In this context, understanding where the risk comes from and what remedial actions are required is a major challenge. This can be an obstacle to vulnerability management and provides an entry point for threat actors.

"Vulnerable devices are common in an ICS environment, so professionals need to see what assets are on their network and additional information about what those devices are actually doing," said Nadir Izrael, CTO and co-founder of Armis. “With contextual data, teams can define what risk each device poses to the OT environment, allowing them to prioritize remediation of critical and/or exploitable vulnerabilities to rapidly reduce the attack surface.”

There is a need for collaboration between OT and IT teams

Industries with OT have changed significantly in recent years due to the convergence of OT and IT. This convergence ushers in a new phase of the industrial age and enables cross-discipline collaboration, but in practice unified management of both environments has yet to happen. As OT teams focus on maintaining industrial control systems, mitigating risks to OT, and ensuring overall integrity within operational environments, the more IT-related tasks have been neglected.

Four of the top five risky devices run Windows operating systems, showing that a basic understanding of asset risk and securing vulnerable assets is still a challenge for IT and OT teams.

SMBv.1 protocol vulnerability further found

Armis studied device types and found that many of them are more vulnerable to malicious activity because they use the SMBv.1 protocol, outdated operating systems, and many open ports. SMBv.1 is an outdated, unencrypted and complicated protocol with vulnerabilities targeted in the notorious Wannacry and NotPetya attacks. Security experts previously advised companies to stop using this protocol, but data shows it is still being used in this space.

“From an organizational perspective, a risk-based approach to vulnerability management must go hand-in-hand with OT and IT departments working together to coordinate mitigation efforts,” says Izrael. “Cross-departmental projects help streamline processes and resource management, and improve compliance and data security. To meet the challenges of the new industrial age, security professionals need an IT/OT convergence security solution that protects all assets connected to the network.”

A platform that searches all compromised devices

The Armis Unified Asset Intelligence platform discovers all connected assets, maps out the communications and relationships between them, and adds contextual information to understand their context and the risk they may pose to the organization. It is purpose-built to protect OT and IT environments and can capture meaningful signals from hundreds of IT and OT platforms. The cloud-based threat detection engine uses machine learning and artificial intelligence to detect when a device is operating outside of its normal, known-good state and triggers an automated response to help manage the entire attack surface.

methodology

Armis calculated device risk by looking at all devices on the Armis Asset Intelligence and Security platform and determining which types had the highest risk factor and/or the most common vulnerabilities and exposures (CVEs). In addition, the level of business impact and endpoint protection had a weighted impact on the results.

More at Armis.com

 


About Armis

Armis, the leader in asset visibility and security, offers the industry's first unified asset intelligence platform that addresses the new, expanded attack surface created by connected assets. Fortune 100 companies trust our real-time and continuous protection to protect all managed and unmanaged assets across IT, cloud, IoT devices, medical devices (IoMT), operational technology (OT), industrial control systems (ICS) and 5G seen in full context. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a private company headquartered in California.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more