Technical Brief: Strengthening OT/ICS Cybersecurity in 2024 and Beyond

Technical Brief: Strengthening OT/ICS Cybersecurity in 2024 and Beyond
Photo by Alex Simpson / Unsplash

Introduction The cybersecurity landscape for Operational Technology (OT) and Industrial Control Systems (ICS) grew increasingly complex in 2024, marked by rising geopolitical tensions and a heightened awareness among adversaries. These adversaries view OT/ICS environments as potential attack vectors for disruption. As a result, organizations face escalating pressure to improve the visibility and resilience of their OT/ICS networks. This brief outlines key trends, threats, and actionable strategies to bolster your OT/ICS cybersecurity posture.

Key Trends and Threats in 2024

  • Lowering Barrier to Entry: Adversaries find it easier to target OT/ICS.
  • Growing Awareness: OT/ICS is now seen as an effective attack vector by a wider range of adversaries.
  • Basic Techniques are Effective: Simple methods, like manipulating internet-exposed HMIs, can cause significant disruptions.
  • Ransomware Targeting Manufacturing: Manufacturing environments are heavily targeted due to the immediate pressure of downtime. In 2024, 50% of ransomware targeted manufacturing.
  • Hacktivist Activity: Hacktivists increasingly target OT for disruptive amplification of their messages.
  • Living off the Land (LOTL): Threat groups such as VOLTZITE utilize tools already present on compromised systems.
The Tractor Tech Tug-of-War: Farmers, Manufacturers, and the Right to Repair
Introduction Modern agriculture is increasingly reliant on advanced technology. From GPS-guided autosteering to sophisticated onboard computers, today’s farm equipment is a far cry from the tractors of the past. This technological revolution, however, has sparked a significant conflict between farmers and manufacturers over the right to repair. Farmers are finding

Prominent Threat Actors

  • KAMACITE: Collaborated with ELECTRUM, targeting Ukrainian critical infrastructure and European oil and gas entities. They used the Kapeka backdoor and spear-phishing techniques.
  • ELECTRUM: Worked with KAMACITE and hacktivists, developing the AcidPour wiper. They concealed their cyberattack against Kyivstar using hacktivist personas.
  • VOLTZITE: Compromised SOHO routers, interacted with GIS, and used compromised infrastructure as relay points to enumerate internet-exposed critical infrastructure.
  • GRAPHITE: Targeted hydroelectric generation facilities and industrial/energy organizations in Eastern Europe and Asia, leveraging compromised Ubiquiti Edge Routers.
  • BAUXITE: Implicated in global campaigns targeting OT/ICS entities, sharing technical overlaps with the pro-Iranian CyberAv3ngers. They affected critical infrastructure in the U.S., Europe, Australia, and West Asia.
  • CyberArmyofRussia_Reborn (CARR): A pro-Russia hacktivist group targeting critical sectors in the U.S., such as water, wastewater, oil, and natural gas.
  • BlackJack: Claimed responsibility for breaching Moskollektor, disrupting industrial sensors in Moscow using Fuxnet malware.
Open vs. Closed Source in Agriculture Equipment: The Software Debate, Licensing Fees, GPS, and the Right to Repair
1. Introduction The modern farming landscape is more than just fields and tractors—it’s a sophisticated ecosystem of sensors, satellite connectivity, and advanced machinery. As agricultural equipment becomes increasingly digitized, the software driving these machines has become a focal point for discussions around ownership, access, and innovation. At the

ICS Malware and Exploitation

  • Fuxnet: Allegedly used by BlackJack to disable sensors and destroy sensor gateways in Moscow.
  • FrostyGoop: Impacted heating systems in Ukraine by manipulating ENCO controllers.
  • DLL Hijacking: Dragos tracked 104 DLL hijacking vulnerabilities impacting industrial software. Stuxnet exploited DLL hijacking.
Cybersecurity in Construction and the Role of IoT in Equipment
Introduction As construction sites grow increasingly connected—hosting drones, sensors, autonomous vehicles, and other smart devices—cybersecurity has emerged as a critical priority. Today’s construction projects demand not only the efficient coordination of labor and resources but also the secure management of a complex, digital ecosystem. From blueprints to

Vulnerability Landscape

  • Incorrect Data: 22% of analyzed advisories contained incorrect data.
  • Deep Network Vulnerabilities: 70% of vulnerabilities are located deep within OT networks.
  • "Now, Next, Never" Framework: Dragos' framework helps prioritize vulnerabilities based on operational impact, exploitability, and available mitigations.
Understanding the Evolving Landscape of Agricultural Machinery Standards
Below is a comprehensive, in-depth article discussing ISO 24882, ISO 11783, and ISO 25119—three key standards shaping modern agricultural machinery. Feel free to tailor this write-up to your preferred length or style. Technical Documentation: Cybersecurity and IoT in the Trucking Industry1. Introduction Connected commercial trucks today rely on a

Essential Cybersecurity Strategies

To defend against these evolving threats, organizations must implement key strategies:

  • Implement the SANS ICS 5 Critical Controls: These remain the best defense.
  • Focus on the Basics: Prioritize fundamental security measures.
  • Enhance Network Security Monitoring: Employ ICS protocol-aware network visibility for quick compromise scoping and root cause analysis.
  • Prioritize Vulnerability Management: Identify and address critical vulnerabilities. Use the "Now, Next, Never" framework to prioritize vulnerabilities based on their impact on operations, exploitability, and available mitigations.
  • Develop and Update Incident Response Plans: Ensure plans address responses to incidents like ransomware or PLC logic modification.
  • Establish a Defensible Architecture: Conduct annual attack surface analysis and secure network gateways (VPN, RDP, SSH).
  • Increase Visibility and Monitoring: Implement OT-aware monitoring solutions to detect subtle adversary movements.
  • Secure Remote Access: Scrutinize ad hoc access points with increased logging, alerting, and multi-factor authentication.
  • Adopt Risk-Based Vulnerability Management: Focus on real-world threats and verify CVE accuracy, prioritizing those causing loss of view or control.
  • Restrict access to engineering ports on PLCs with fieldbus communications features and to fieldbus couplers and protocol translators.
  • Change default passwords on IoT equipment, restrict access to device management interfaces, and monitor for exploitation.

Specific Actions to Consider

  • Fieldbus Equipment: Restrict access to engineering ports on PLCs with fieldbus communication features.
  • IoT Equipment: Change default passwords, restrict access to device management interfaces, and monitor for exploitation. Have a plan if these systems fail.
  • Third-Party Risks: Implement a Software Bill of Materials (SBOM) to list all software versions and add-on components.
  • DLL Hijacking: Hunt for DLL hijacking vulnerabilities and implement mitigations.
  • Modbus/TCP: If using Modbus/TCP, assess the implementation of the SANS ICS 5 Critical Controls.
  • SSH: Identify assets with SSH exposed to the internet and conceal access behind a VPN. Audit SSH keys and ensure strong passwords.
  • VNC: Restrict access to VNC servers, especially on ports TCP/5800, TCP/5900, and TCP/5901. If remote access is needed, use a VPN and change default credentials.
Technical Documentation: Cybersecurity and IoT in the Trucking Industry
1. Introduction Connected commercial trucks today rely on a variety of sensors and electronic control units (ECUs) to improve safety, efficiency, and driver comfort. As vehicles incorporate more Internet of Things (IoT) technologies—such as LiDAR, radar, cameras, and advanced telematics—cybersecurity becomes critical. This document provides guidance on secure

Conclusion

The OT/ICS threat landscape requires proactive and adaptive cybersecurity strategies. By understanding the evolving tactics of adversaries and implementing foundational security measures, organizations can significantly reduce their risk and protect critical operations. Prioritize the SANS ICS 5 Critical Controls, enhance network monitoring, and adopt a risk-based approach to vulnerability management to build a robust and resilient defense.

NHTSA Cybersecurity Guidelines: Ensuring Vehicle Safety in the Digital Age
Introduction As modern vehicles continue to adopt connected, autonomous, shared, and electric (C.A.S.E) technologies, cybersecurity has emerged as a top priority in the automotive world. The U.S. National Highway Traffic Safety Administration (NHTSA)—responsible for regulating motor vehicle and highway safety—has emphasized the need for

Read more