This afternoon the DHS ICS-CERT published the latest version
of the ICS
Monitor covering activities in May and June of this year. While this issue
contains a lot of the standard full-color glossy self-advertisement that we
have come to expect from this periodic report there are three interesting
articles that are well worth reading.
Incident
Investigation
This has become a standard feature in the Monitor; a
sanitized report on an on-site investigation carried out by ICS-CERT in the
period covered. There are no real details about the incident other than the
owner expected possible ‘APT activity’ on their control system network.
The real value of the article is that it points out that the
facility did just about nothing to protect its control system. For example, it
was not able to enumerate all of the devices on the network. It had no network
logs to use for a forensic investigation. Finally, there was not even a good
delineation of who was responsible for the various sectors of the network. If
there is a need to baseline bad performance this article describes just such an
installation.
Situational Awareness
The other two articles of note are found in this section of
the Monitor. The first deals with internet connections and the other with using
YARA for malware detection.
The first one starts off with the title “If You’re
Connected, You’re Likely Infected” and then goes on to discuss the following
basic techniques to protect your control system network:
∙ Isolate your ICS network from the
internet;
∙ Limit and secure the use of
remote access to your control system environment;
∙ Assign a manager responsible for
cybersecurity; and
∙ Implement best practices for cybersecurity.
No real new information here, though I am a little surprised
(and pleased) to see the brief section on management responsibility.
The third article worth reading is titled: “Using YARA for Malware Detection”. This
nearly full page article provides a pretty readable guide to how to use the
YARA tool. It almost certainly is not quite detailed enough to actually allow
someone to use the tool (it is only a page long and fairly generic), but it
should be enough to allow a manager to nod his head in the proper places when
the control system engineer gives the 30 second version as an explanation for
what he is trying to do.
Lies, Damn Lies and Statistics
Okay, a catchy title, but the first two are not apparently
appropriate to this update on ICS-CERT incident statistics. As is usual it is
not clear from the article just how many of the 108 enumerated “cyber incidents
impacting critical infrastructure in the United States” in the first half of FY
2015 (so a full quarter behind) actually involve industrial control systems.
Critical Manufacturing is now the hardest hit sector (20.2%) since the Energy
Sector has been broken out into its constituent parts (Electric 13%, Petroleum
8%, Natural Gas 4%, and Miscellaneous 3% - Total 28%).
The interesting set of statistics here is found in the chart
on incident reporting. Only 27% of the incidents were reported by asset owners
while ‘federal partners’ accounted for 45%. Researchers even accounted for 17%.
It is not clear if this is just a case of asset owners not knowing about
ICS-CERT, not wanting to report to ICS-CERT, or exactly what.
The final set of statistic is shown in the source of the ‘Attempted
Infection Vector’. Fully 19% are listed as ‘scanning’ which most cybersecurity
experts do not really count as an attack (and, to be fair, ICS-CERT is not reporting
any of these as attacks). The scary part is that the single largest ‘infection
vector’ is ‘Unknown’ at 28%. It is hard to share meaningful information about ‘Unknown’.
Recommendation
This is a short read, has some good information, and you cannot
beat the price. I would recommend that you go ahead and download a copy. I did.
1 comment:
It would have been nice to say if they found "APT" and what it was. While real world example of bad network segmentation was stressed, they didn't really give a clear "lessons learned" on incident response or when to engage it. They just insinuated that forensic information was tainted or destroyed then proceeded to detail the investigative milestones.
Post a Comment