By now the ‘Air gapping’ myth should be expunged from every ICS/SCADA manager on earth. SCADA networks have been hacked on several known occasions and made the need for advanced SCADA security solutions crystal clear. But this weekend we learned that even non-targeted malware can pose a serious risk to our physical plants when the WannaCry/WannaCryptor ransomware found its way into several automotive manufacturing plants, telecommunication companies, and a metro rails system.
At least two car manufacturing plants shut down operations over the weekend due to the ransomware attack. The fact that a cyber attack that spreads via the internet was able to bring factory operations to a halt is a startling wake-up call the ICS/SCADA managers. OT teams are very focused on keeping operations up and running smoothly, and therefore security rarely makes it to the top of the priority list for busy OT teams. This latest ransomware serves to remind us all that security is a foundation of operational continuity.
The EternalBlue vulnerability exploited in this attack is one of the Microsoft exploits leaked in the last year by the Shadow Brokers group. Since Microsoft products are commonly found throughout ICS environments, including HMI stations and Historian database servers, ICS networks are at considerable risk. The difficulty is cataloging and updating all the Microsoft products with the latest security patches means that vulnerabilities abound in OT networks.
If WannaCryptor or one of its variants penetrates an organization with a SCADA network that runs unpatched Windows on its HMIs it could do the following damage:
Even if IT managers and security vendors manage to put an end to the WannaCryptor ransomware rampage soon, the astounding impact of this attack will not go unnoticed and copycats are likely to emerge. This ransomware attack could easily be tweaked to penetrate SCADA networks and encrypt resources critical to OT functions that could force entire factories or plants offline until ransom is paid. In the case of ransomware targeted specifically at SCADA we would expect extremely high ransom demands as the financial impact of halting operations for even one day is astronomical.
ICS/SCADA managers face a particularly difficult challenge keeping up with security patches and securing protocols since typical networks are several decades old and included not only IT components but also a wide variety of physical components, each with its own protocols. Therefore the first step ICS/SCADA managers can take right away is to scan the entire network to produce a complete and details network map.
Learn more about Cyberbit SCADAShield network mapping capabilities
Daniel Cohen-Sason is SCADAShield R&D Lead at Cyberbit