Global geo-political conflicts are aggressively ramping up activity from state sponsored threat actors in what is being considered an enduring and significant threat to National Security. Seventy-five percent of cybersecurity decision makers within CNI organisations, reported a stark rise in cyberattacks since the start of the Ukraine war. Cyber Attacks Against UK CNI Increase Amidst Russia-Ukraine War | Bridewell
Operational Technology (OT), including Industrial control systems (ICS), Programmable Logic Controllers (PLCs) and supervisory control and data acquisition (SCADA) systems amongst other legacy components, form the bedrock to the Nation’s Critical National Infrastructure - Transportation, Communications, Health, Defence, Energy, Water and so on.
OT systems and networks were originally designed to operate industrial processes safely and reliably ‘without’ connections to external networks. This has changed. The need and desire for business agility and cost reduction has led to the integration of such air-gapped environments into business networks and cloud infrastructures. Other contributory factors: -
All these have greatly increased the size, complexity, and elasticity of underlying networks - and massively expanded the potential attack surface. Perpetrators are able to exploit vulnerabilities within the IT environment, to move laterally within organisations, turning IT problems into much more impactful OT system issues.
Where the potential disruption of a cyber-attack is great, as in the case with the Critical National Infrastructure, the ideological or/and financial gain to the perpetrator is accordingly immense.
One of the first sophisticated cyber-attacks was considered to be Stuxnet (2010). This State sponsored ‘digital weapon’ malware was introduced via a compromised USB flash-drive to target programmable industrial control systems within an air-gapped environment. Four different zero-day security vulnerabilities plus the installation of kernel mode rootkit and stolen digitally signed certificates, culminated in the malfunction of almost one fifth of Iran’s nuclear centrifuges.
In 2021 hacked credentials and an unprotected legacy VPN were at the root of the Colonial Pipeline cyber-attack, which caused major disruptions to gas delivery up and down the East Coast, and finished up costing the US fuel pipeline nearly $5m (£3.6m) in ransom payment to the cyber-criminal gang ‘DarkSide’ (Colonial hack: How did cyber-attackers shut off pipeline? - BBC News).
‘Human error’ continues to rank as the greatest intentional or unintentional threat (e.g. weak passwords, USB misuse, clicking on a ‘phish’), paving the way for malware and ransomware to gain their initial foothold.
In both CNI attacks above, critical assets were breached through the exploitation of existing vulnerabilities in the network -i.e. the introduction of a contaminated USB stick; capability constraints of incumbent security solutions to secure against zero-day exploits and kernel/registry level malicious activity; weak password control and inappropriate permissions to critical assets.
In an era where cyber-breaches break seemingly impenetrable barriers, ‘lessons learned’ from these past attacks should help inform the selection of appropriate security solutions.
Risks may be mitigated, and the attack surface greatly reduced through a combination of air gapping, appropriate security software and endeavouring to simplify the overly complex.
Each of the above areas can be fully addressed using more advanced cyber security solutions such as those offered by RevBits, currently deployed within CNI organisations operating air-gapped and on-prem OT environments. You can find out more about how RevBits is assisting clients within the OT arena here.
Furthermore, to simplify and improve visibility, a Cyber Intelligence Platform may provide a centralised ‘single pane of glass’ view, to enable ‘cross modular actionable intelligence’ across all of those aforementioned ‘solutions’ for rapid response, improved security outcomes and a vastly reduced ‘attack surface.’
The Cyber Security Programme provides a channel for our industry to engage with commercial and government partners to support growth in this vital sector, which underpins and enables all organisations. The programme brings together industry and government to overcome the joint challenges the sector faces and to pursue key opportunities to ensure the UK remains a leading cyber nation, including on issues such as the developing threat, bridging the skills gap and secure-by-design.
Our new group will keep techUK members updated on the latest news and views from across the Cyber security landscape. The group will also spotlight events and engagement opportunities for members to get involved in.