JONATHAN JESSE | MAY 13, 2021


Securing critical infrastructure has been a growing concern for many years as major breaches spanning a wide range of industrial sectors consistently make headlines. The latest being the recent attack on Colonial Pipeline from a cyber-criminal group named Darkside, which came only days after the U.S. Department of Energy (DOE) announced a 100-day Plan to accelerate cybersecurity detection, mitigation and response across the electric utilities subsector and the U.S National Security Agency (NSA) released an advisory on ensuring the security of OT.
While the DarkSide attack only affected Colonial’s IT network, the company made the proactive decision to shut down their OT network so that the ransomware could not move laterally from the IT network to the OT network. Many years ago, OT networks were often air-gapped and didn’t have connectivity to IT systems. This reduced the overall risk of cyber threats impacting operations. Today, the reality is that these two network domains are widely becoming more converged to drive business improvements. This connectivity, while delivering business value, also introduces new risks that threaten the operational resiliency of the OT network that must be addressed.
How did the attack occur?
Perpetrated by DarkSide, of which Brian Krebs provides a closer look at this ransomware gang, first appeared on Russian language forums in August 2020 and provides a “Ransomware as a Service” platform to infect organizations with ransomware. FireEye also shines a light on the operations of DarkSide ransomware. There is a version for both Windows and Linux.
Multiple sources report this ransomware leverages several threat vectors to gain access and install the ransomware on the device.
CISA and FBI have published specific technical recommendations on this in Alert (AA21-131A), “DarkSide Ransomware: Best Practices for Preventing Business Disruptions from Ransomware Attacks.”
As IT and OT networks continue to converge, there are several areas that organizations should focus on to ensure proper integration and security across the entire enterprise. These activities span people, processes, and technology:
People:
Processes:
Technology:
How Forescout can help to secure your IT/OT/IoT converged infrastructure
Indicators of Compromise (IOCs) & Additional Information
Forescout has made available a package of IOCs for the eyeInspect Threat Library which conducts an automated and expansive series of checks to detect weaknesses and threats.
Recently added:
Several of the existing checks of the eyeInspect Threat Detection Add-Ons can help to cover the above-described scenario when the targets are Windows machines (not inclusive of all possible checks to spot unauthorized access). Updates will be implemented as new information is uncovered.
In today’s interconnected world, bad actors only need to find one vulnerability to exploit an organization’s network and data, whereas cybersecurity pros must focus on securing the entire enterprise (IT, OT, IoT) against a growing number of threats and attack vectors. Forescout is here to help you do that.
Active Defense for the Enterprise of Things.