CRITICISM: OT and IoT network anomalies are ubiquitous 

CRITICISM: OT and IoT network anomalies are omnipresent - Image by Gerd Altmann on Pixabay
Advertising

Share post

A new report shows that network anomalies and attacks are the most common threats to OT and IoT environments, especially in the area of ​​critical infrastructure. Vulnerabilities in critical production areas have increased by 230 percent.

Nozomi Networks has released its latest Networks Labs OT & IoT Security Report. The experts' analysis shows that network anomalies and attacks represent the greatest threat to OT and IoT environments. Another reason for concern: vulnerabilities in critical production areas have increased by 230 percent. Therefore, cybercriminals have many more opportunities to access networks and cause these anomalies.

Advertising

Collected telemetry data from 25 countries

Nozomi Networks Labs collects unique telemetry data in OT and IoT environments in 25 countries, covering a variety of use cases and industries. Analysis of this data revealed that network anomalies and attacks accounted for the largest share (38 percent) of threats in the second half of 2023. Network anomalies, which are a major concern, increased by 19 percent compared to the previous reporting period. This in turn is an indication that there are criminals at work here who have a lot of know-how.

Network scanning topped the list of alerts for network anomalies and attacks, closely followed by TCP flood attacks. Large amounts of data are sent to systems in order to paralyze them or make them inaccessible. Accordingly, TCP flood and anomalous packet alerts have increased significantly over the past six months, both in terms of total alerts and average values ​​per customer, which have more than doubled and sixfold, respectively.

Advertising

Subscribe to our newsletter now

Read the best news from B2B CYBER SECURITY once a month



By clicking on "Register" I agree to the processing and use of my data in accordance with the declaration of consent (please open for details). I can find more information in our Privacy Policy. After registering, you will first receive a confirmation email so that no other person can order something you don't want.
Expand for details on your consent
It goes without saying that we handle your personal data responsibly. If we collect personal data from you, we process it in compliance with the applicable data protection regulations. Detailed information can be found in our Privacy Policy. You can unsubscribe from the newsletter at any time. You will find a corresponding link in the newsletter. After you have unsubscribed, your data will be deleted as soon as possible. Recovery is not possible. If you would like to receive the newsletter again, simply order it again. Do the same if you want to use a different email address for your newsletter. If you would like to receive the newsletter offered on the website, we need an e-mail address from you as well as information that allows us to verify that you are the owner of the e-mail address provided and that you agree to receive the newsletter. Further data is not collected or only collected on a voluntary basis. We use newsletter service providers, which are described below, to process the newsletter.

CleverReach

This website uses CleverReach to send newsletters. The provider is CleverReach GmbH & Co. KG, Schafjückenweg 2, 26180 Rastede, Germany (hereinafter “CleverReach”). CleverReach is a service that can be used to organize and analyze the sending of newsletters. The data you enter for the purpose of subscribing to the newsletter (e.g. email address) will be stored on the CleverReach servers in Germany or Ireland. Our newsletters sent with CleverReach enable us to analyze the behavior of the newsletter recipients. This can include It is analyzed how many recipients have opened the newsletter message and how often which link in the newsletter was clicked. With the help of so-called conversion tracking, it can also be analyzed whether a previously defined action (e.g. purchase of a product on this website) took place after clicking on the link in the newsletter. Further information on data analysis by CleverReach newsletter is available at: https://www.cleverreach.com/de/funktionen/reporting-und-tracking/. The data processing takes place on the basis of your consent (Art. 6 Para. 1 lit. a DSGVO). You can revoke this consent at any time by unsubscribing from the newsletter. The legality of the data processing operations that have already taken place remains unaffected by the revocation. If you do not want an analysis by CleverReach, you must unsubscribe from the newsletter. For this purpose, we provide a corresponding link in every newsletter message. The data you have stored with us for the purpose of subscribing to the newsletter will be stored by us or the newsletter service provider until you unsubscribe from the newsletter and deleted from the newsletter distribution list after you have canceled the newsletter. Data stored by us for other purposes remain unaffected. After you have been removed from the newsletter distribution list, your e-mail address may be stored by us or the newsletter service provider in a blacklist if this is necessary to prevent future mailings. The data from the blacklist is only used for this purpose and is not merged with other data. This serves both your interest and our interest in complying with the legal requirements when sending newsletters (legitimate interest within the meaning of Art. 6 Para. 1 lit. f GDPR). Storage in the blacklist is not limited in time. You may object to the storage if your interests outweigh our legitimate interest. For more information, see the privacy policy of CleverReach at: https://www.cleverreach.com/de/datenschutz/.

Data processing

We have concluded a data processing agreement (DPA) for the use of the above-mentioned service. This is a contract mandated by data privacy laws that guarantees that they process personal data of our website visitors only based on our instructions and in compliance with the GDPR.

123 percent increase in alerts

The number of access control and authorization threat alerts increased by 123 percent compared to the previous reporting period. In this category, alerts for multiple failed logins grew by 71 percent and brute force attacks grew by 14 percent. This trend highlights the ongoing challenges posed by unauthorized access attempts and shows that identity and access management in OT, as well as other challenges related to user passwords, continue.

Over the past six months, Nozomi experts have observed these five critical threat activities most frequently in real-world environments:

  • Network anomalies and attacks – 38 percent of all alerts
  • Authentication and password issues – 19 percent of all alerts
  • Access control and authorization issues – 10 percent of all alerts
  • Specific operational technology (OT) threats – 7 percent of all alerts
  • Suspicious or unexpected network behavior – 6 percent of all alerts

ICS vulnerabilities

Given this cluster of network anomalies, Nozomi Networks Labs identified the industries that should be on high alert based on an analysis of all ICS security alerts issued by CISA over the past six months. The manufacturing industry tops the list. Here the number of CVEs (Common Vulnerabilities and Exposures) has increased to 621, a dramatic increase of 230 percent compared to the previous reporting period.

Manufacturing, energy and water/wastewater continued to be the most vulnerable sectors for the third consecutive reporting period. However, the total number of reported vulnerabilities fell by 46 percent in the energy segment and by 16 percent in water supply/wastewater. Commercial real estate and communications moved into the top five, replacing food and agriculture and chemicals (both of which fell out of the top 5). Notably, healthcare, public administration, transportation and emergency services are all represented in the top 10. In the second half of last year:

  • CISA published 196 new ICS advisories on 885 common vulnerabilities and exposures (CVEs) - an increase of 38 percent compared to the previous half of the year.
  • 74 providers were affected – an increase of 19 percent.
  • The Out-of-Bounds-Read and Out-of-Bounds-Write vulnerabilities remained among the top CVE for the second year in a row - both are vulnerable to various attacks, including buffer overflow attacks.

Data from IoT honeypots

Nozomi Networks Labs also analyzed a large amount of data on malicious activity against IoT devices and identified some notable trends that the mentioned industries should consider. The results show that malicious IoT botnets remain active this year and that criminals continue to use these botnets to access IoT devices using standard credentials.

From July to December 2023, Nozomi Networks was able to determine a whole series of interesting numbers through the use of honeypots:

  • An average of 712 unique attacks per day (a 12 percent decrease from the daily average in the previous reporting period) - the day with the highest number of attacks was October 6th with 1.860 attacks.
  • The IP addresses of the attackers with high activity come from China, the USA, South Korea, India and Taiwan.
  • Brute force attempts remain a popular technique for gaining access to systems - standard credentials remain one of the main ways attackers gain access to the IoT. Remote Code Execution (RCE) also remains a popular technique, often used for targeted attacks and the distribution of various types of malware.

Nozomi Networks Labs' OT & IoT Security Report provides security professionals with the latest insights they need to re-evaluate risk models and security initiatives, as well as easy-to-implement recommendations for securing critical infrastructure.

More at NozomiNetworks.com

 


About Nozomi Networks

Nozomi Networks accelerates digital transformation by protecting critical infrastructure, industrial and government organizations from cyber threats. Nozomi Networks' solution provides exceptional network and asset visibility, threat detection and insights for OT and IoT environments. Customers rely on it to minimize risk and complexity while maximizing operational resilience.


 

Matching articles on the topic

AI-supported assessment of network vulnerabilities

Innovations continue to drive cybersecurity consolidation by eliminating outdated vulnerability management tools and extending AI-based risk prioritization to network assets ➡ Read more

Ransomware groups rely on more affiliate models

The APT groups DragonForce and Anubis introduce innovative approaches to expanding their activities and consider themselves a cartel. ➡ Read more

SMEs: Ransomware remains the No. 1 attacker

The new MDR report evaluates incident response incidents at SMEs - medium-sized companies in 2024 and shows that attacks with ransomware ➡ Read more

Majority of security experts consider cyber immunity to be effective

A recent survey of cybersecurity experts in companies in Germany shows a clear need for cybersecurity strategies that go beyond traditional solutions. ➡ Read more

Faulty ASUS software allows malware installations 

The pre-installed ASUS DriverHub software contains a critical security vulnerability that allows remote code execution of malware. Due to the faulty checking of ➡ Read more

Attacks on the water supply

Water is one of the most valuable resources as the basis of all life. It is therefore no wonder that water supply is increasingly becoming a goal ➡ Read more

PHASR proactively strengthens endpoint security

An industry-first endpoint security solution that hardens endpoints dynamically and tailored to each user: Bitdefender's PHASR. This ensures that security configurations ➡ Read more

Using exposure management against ransomware

A leading IT security company has published its latest cybersecurity report. Only a quarter of German security experts are optimally prepared for ransomware attacks. ➡ Read more