Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • CISA, NSA Lay Out Recommendations for Protecting OT Assets
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

CISA, NSA Lay Out Recommendations for Protecting OT Assets

6 years ago David Bisson
CISA, NSA Lay Out Recommendations for Protecting OT Assets

The Cybersecurity & Infrastructure Security Agency (CISA) and the National Security Agency (NSA) laid out a series of recommendations for critical infrastructure owners and operators to protect their operational technology (OT) assets.

In an alert published on July 23, CISA published an alert in which it recognized malicious actors’ growing willingness to target OT assets.

The government body attributed these ongoing attacks to the increasing number of OT devices connected to the internet. As it explained in its bulletin:

Legacy OT assets that were not designed to defend against malicious cyber activities, combined with readily available information that identifies OT assets connected via the internet (e.g., Shodan,[2] Kamerka [3]), are creating a “perfect storm” of 1) easy access to unsecured assets, 2) use of common, open-source information about devices, and 3) an extensive list of exploits deployable via common exploit frameworks [4] (e.g., Metasploit,[5] Core Impact,[6] and Immunity Canvas [7]).

In particular, CISA noted that malicious actors had taken to launching spearphishing attacks, deploying crypto-ransomware, modifying control logic and parameters on PLCs along with executing other techniques. Those and other tactics had resulted in the loss of productivity and revenue, reduced availability of assets on the OT network and/or disruption to an organization’s physical processes.

Acknowledging those threats, CISA and NSA recommended that owners and operators of OT implement several best security practices. These should include the following

  • Develop an OT resilience plan: Organizations need to have a resilience plan in the event that they suffer a security incident. This plan should involve creating a plan to ensure the continued operations of industrial control systems (ICSes) if certain assets go down in an attack. It should also include developing a data backup strategy and testing it regularly.
  • Exercise an incident response plan: Additionally, organizations need to make sure they can respond to an incident in a timely matter. Towards that end, they need to have a plan that takes key roles and decision points into consideration. They can then test that plan by conducting tabletop incident response simulations.
  • Monitor the OT network for potential threats: To provide an optimum level of security, organizations need to monitor the OT network for all instances of external access to the OT network. They should also monitor controllers for unauthorized change attempts.

For additional guidance on building resilience and monitoring for threats in the OT network, click here.

The post ” CISA, NSA Lay Out Recommendations for Protecting OT Assets” appeared first on TripWire

Source:TripWire – David Bisson

Tags: CERT, Critical Severity, Encryption, Exploit, Goverment, Malware, Phishing, Ransomware, TripWire

Continue Reading

Previous Learn Machine Learning and AI – Online Training Program @ 93% OFF
Next Encryption Under ‘Full-Frontal Nuclear Assault’ By U.S. Bills

More Stories

  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

3 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

4 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

8 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

Securing the Mid-Market Across the Complete Threat Lifecycle

8 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

11 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

14 hours ago [email protected] (The Hacker News)

Recent Posts

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
  • Securing the Mid-Market Across the Complete Threat Lifecycle
  • Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT