Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • IT Network Attacks Can Impact Your OT Networks, Too
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

IT Network Attacks Can Impact Your OT Networks, Too

5 years ago Baksheesh Singh Ghuman
IT Network Attacks Can Impact Your OT Networks, Too

On May 8th, I was at a gas station filling up my car before a trip I was taking when the news about a cyberattack against a large pipeline company broke. The attack led them to halt all operations. Ultimately, the incident stemmed from a ransomware infection in which a well-known threat actor took volumes of corporate data in just two hours and made their demands including the threat to block and encrypt the company’s network. They even threatened to release the data to the internet. This was a moment of reckoning for the company and a scary place to be.

From IT to OT, a Possibility

This ransomware referenced above reportedly affected the pipeline company’s corporate IT network, not its OT network. Therefore, it did not affect fuel distribution operations directly. However, as a measure of precaution, the company halted operations. Taking certain systems offline is a good preventative measure, as it’s possible for threat actors to gain access to OT environments laterally from IT environments. This practice is becoming commonplace as a result of the IT-OT convergence. Regardless, this is another example of the fact that IT attacks can impact industrial operations. In a larger context of industrial operations and critical infrastructure, these cases can lead to all sorts of socio-economic problems that directly impact the lives of many people.

The ransomware event at this pipeline company underlines the urgency for critical infrastructure operators to safeguard their operations and OT. While attacks on critical infrastructure are rising, even in the case where operational disruption is not the attackers’ main goal, these cyber events are oftentimes having an impact on availability and safety. On the heels of the Biden administration’s 100-day plan to address U.S. energy infrastructure, this attack puts the need for industrial cybersecurity into focus yet again. Rightly so.

ICS a Growing Target

Cyberattacks against industrial networks are not new. There have been several examples of large-scale attacks in the past. Organizations are slowly preparing and implementing controls in order to detect, prevent and recover from such attacks. However, while digital transformation, industrial automation, Industrial Internet of Things (IIoT) and the IT-OT convergence are driving a more integrated approach to operations that offers many benefits, it’s expanded the possibilities of new vulnerabilities and attack vectors. The ability to move laterally from IT to OT or OT to IT is something organizations have to account for in their cybersecurity strategy. A separate IT and OT cybersecurity strategy will no longer suffice.

Reduce Threats and Recover

It’s widely accepted that it’s not whether you’ll be hit with a cyberattack but when. You can’t avoid all attacks, and you need to think about how quickly you can react and recover once you suffer an incident. Towards that end, here are some critical security controls that you can put in place to prevent attackers and malware from getting a foothold on your systems:

  1. Harden your OT and IT assets with a collective hardening strategy that includes secure configurations and vulnerability management.
  2. Employ continuous controls that detect change and anomalies and not just provide alerts.
  3. Enforce policies not just for the sake of compliance but also for security using standards from NIST, NERC and ISA.
  4. Ensure your interconnected devices and IIoT-type devices are also secure.
  5. Make sure your systems are able to provide you with a unified view into both IT and OT.
  6. Implement clear role-based access controls.
  7. Secure your IT-OT convergence and network to cloud/internet access points.

It all starts with visibility. You cannot protect what you cannot see. The oil & gas industry should also consider following their utilities counterparts and implement NERC-CIP-like controls to safeguard their assets/networks.

If you do not have adequate/sufficient resources, consider using a managed services offering like Tripwire’s ExpertOps. Tripwire solutions are designed to provide both IT and OT controls to enhance, augment and improve your cybersecurity posture. With Tripwire’s suite of integrated solutions, you can easily extend your IT controls into your OT network and OT controls into your IT networks, thus providing you with a unified view and approach to cybersecurity that helps to avoid incidents that can cause you irreparable damage.

You can find out more about Tripwire’s solutions at www.tripwire.com.

The post ” IT Network Attacks Can Impact Your OT Networks, Too” appeared first on TripWire

Source:TripWire – Baksheesh Singh Ghuman

Tags: Cloud, Critical Severity, Goverment, Malware, Ransomware, TripWire

Continue Reading

Previous Can Nanotech Secure IoT Devices From the Inside-Out?
Next Android Issues Patches for 4 New Zero-Day Bugs Exploited in the Wild

More Stories

  • Data Breach

The Buyer’s Guide to AI Usage Control

1 hour ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

7 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

8 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

19 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

23 hours ago [email protected] (The Hacker News)

Recent Posts

  • The Buyer’s Guide to AI Usage Control
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
  • Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
  • Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
  • DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT