Redbot Security | Water, Power & Transportation ICS/SCADA



How vulnerable is our Nation’s Critical Infrastructure?

Redbot Security

The basic necessities of life; water, power and transportation are threatened by lack of resources to protect the systems that provide our nation’s basic needs. Nation State Threat Actors are aggressively ramping up efforts to take our country down by targeting Industrial control systems and outdated SCADA systems while US organizations and plant operators are scrambling to not be a target.

“Following the hacking of a Florida water treatment plant early this year 2021, the Cybersecurity and Infrastructure Security Agency (CISA) is warning the operators of other plants “to be on the lookout” for hackers who exploit remote access software and outdated operating systems – and to take risk mitigation steps. “

To be on the lookout

Is this good advice? Yes. Is this practical advice? Hmmm…Understaffed water, power and transportation organization with limited resources and sparse security measures in place to combat the current threat landscape could be running a bit behind. “To be on the lookout” for sophisticated nation state threat actors is a daunting task to say the least, even with the latest threat detection and response solutions in place.

According to Michael Arceneaux, managing director of the Water Information Sharing and Analysis Center, a Washington, D.C.-based group, Water utilities that don’t have the resources and need technical training and help setting up secure systems, selecting software and hardware, and operating the technology.

Did you Know?

The CISA also warned that water treatment facilities that use unsecured or poorly configured remote access tools and outdated operating systems risk hacker attacks targeting their industrial control systems and SCADA systems

“Upgrading to an operating system newer than Windows 7 and securing TeamViewer are good recommendations not only for other organizations with ICS and SCADA but also for any organization in any industry that uses them” according to the U.S. Department of Defense.

Most companies and plant operators know that updating their outdated windows 7 computers and having systems routinely patched will help to mitigate risk, however when we look at ICS/SCADA vulnerabilities that can be exploited we can clearly see a larger picture of multiple paths that a “hacker” can travel down, nearly undetected.

Lets take a quick look at a few methods and vulnerabilities that enable systems to be compromised.

Discovery is often called one of the scariest search engine on the internet. Why? Shodan searches have discovered control systems for a water park, a command and control systems for nuclear power plants and other critical connected systems . Its easy for anyone to search for “default password” and it reveals countless printers, servers and system control devices that use “admin” as their user name and “1234” as a password, and not surprising many more connected systems require no credentials at all — all you need to discover this information is a web browser.

Reviewing top vulnerabilities that expose ICS/SCADA systems, Microsoft/ Cyberx 2019 Analysis of 1,821 IoT ICS networks yielded the following findings:

Outdated Operating Systems 62%

62% of sites have outdated and unsupported Microsoft Windows boxes such as Windows XP and Windows 2000, which means they no longer receive security patches from Microsoft. The figure jumps to 71% if we include Windows 7, which reaches end-of-support status in January 2020.

Unencrypted Passwords 65%

Nearly two-thirds of Operators (64%) have unencrypted passwords traversing across their networks — with more than half (54%) incorporating devices that are remotely accessible via standard remote management protocols such as Remote Desktop Protocol (RDP), SSH and VNC — making it fairly easy for bad actors to pivot undetected from a single compromised system.

Remote Accessible Devices 55%

As noted above, 54% of sites have devices that can be remotely accessed using standard protocols such as RDP, SSH, and VNC. A common attack vectors for ransomware is RDP, that enable attackers gain access by stealing remote access credentials through phishing attacks, social engineering or even basic brute force attacks. Remote access enables attackers to move laterally from IT to OT networks silently expanding their presence and potential damage throughout networks.

Did you know?
Direct Internet Connections 29%

More than a quarter (27%) of sites analyzed have direct connections to the internet, making them potential targets of malware, targeted attacks, and even simple phishing attacks. Penetration Testers and malicious hackers both know that it takes only one internet-connected device to provide that gateway into a IoT/ICS network.

Penetration Testing Can help your team find exploitable vulnerabilities before bad actors find them.

If you are looking to find exploitable vulnerabilities on your OT/IT networks, Manual Controlled Penetration Testing (MCPT) is an easy to execute cost effective solution.

With Redbot Security you get reports written by experts that highlight key data and exactly how targets were compromised as well as recommendations on best practices along with complete review of remediation recommendations.

Redbot Security’s MCPT is a complete service provided by our team of ICS/SCADA experts to ensure that vulnerabilities are minimized and that your defenses are running in top shape by offering the following:

  • ICS/SCADA Risk & Vulnerability Assessments
  • Penetration Testing (black-box, gray-box, white-box)
  • Real-World Attacker Tactics and Techniques- Controlled Manual Penetration Testing without Interruption
  • Actionable and easy-to-follow results – Risk Rating, Exploit Storyboard and Remediation Recommendations
  • Security Program Development and Deployment
  • ICS/SCADA Network Architecture
  • ICS Security Controls

Redbot Security’s hybrid approach to penetration testing sources industry-leading frameworks and combines senior-level talent with over 20 years of experience to tailor all client engagements. Some frameworks and testing guides leveraged by Redbot Security include:

• NIST Special Publication 800-115
• PCI Penetration Testing Guide
• Open Web Application Security Project
• OWASP Top 10 Lists
• OWASP Security Projects
• Pentation Testing Execution Standard (PTES)
• Open Source Security Testing Methodology Manual (OSSTMM)
• Information Systems Security Assessment Framework (ISSAF)
• MITRE ATT&CK Framework

Redbot Security – MCPT® is a controlled assessment of Networks and applications – safely identifying and validating real world vulnerabilities that are potentially exploitable. MCPT removes false positives – creating detailed remediation steps – resolving network and application security issues quickly.

Senior Level Personnel within Redbot Security’s combined Penetration Testing Team certifications:

Amazon Web Services Cloud Practitioner, CompTIA A+ CISSP, Certified Cloudera Administrator for Hadoop (CCAH), Certified Ethical Hacker (CEH), Cisco Certified Network Associate (CCNA), GIAC CompTIA Linux+, Marine Corp Red Team Operator, Metasploit Professional, Certified Specialist Nexpose, Certified Administrator (NCA,) Microsoft Certified Professional (MCP), CompTIA Network+, CompTIA IT, Operations Specialist (CIOS), CompTIA Secure Infrastructure Specialist (CSIS), Offensive Security Certified Professional (OSCP), GIAC Certified Penetration Tester (GPEN), Metasploit Professional, Certified Specialist Rapid7, Advanced Vulnerability Manager Rapid7, Network Assault Certified Rapid7, Application Assault Certified, GIAC Exploit Researcher, Advanced Penetration Tester (GXPN), GIAC Mobile Device Security Analyst (GMOB), GIAC Advanced Smartphone Forensics (GASF), GIAC Reverse Engineering Malware (GREM), GIAC Network Forensics Analyst (GNFA), GIAC Certified Intrusion Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE), GIAC Security Essentials (GSEC), Portswigger Burpsuite Certified Practitioner, Cisco Certified Network Associate (CCNA), Cisco Certified Network Associate-wireless, CompTIA Network+, US Navy Joint Cyber Analyst Course (JCAC)

More information -What is a critical infrastructure?

Critical infrastructures is an umbrella term for government assets that are essential in our health, jobs and the overall quality of our lives. There are main sectors such as:

• Dams Sector
• Chemical Sector
• Communications Sector
• Energy Sector
• Defense Industrial Base Sector
• Emergency Services Sector
• Critical Manufacturing Sector
• Commercial Facilities Sector

Examples of a critical infrastructure are roadways, railways, bridges, tunnels, clean water flow and overall, every day-to-day transportation which allows us to get to work, home and the grocery store down the street.

Other examples include:

• Communications
• Water dams
• Emergency services such as 911
• Nuclear Reactors, materials and waste
• Energy
• Finance 

References and Resources

• Reference 1
• Reference 2
• Reference 3
• Reference 4

Redbot Security

Redbot Security provides critical infrastructure testing without disruption. Our team is led by the Nation’s top ICS/SCADA and penetration testing experts. We have a proven track record and can help to secure your networks during these times of increased threats.

Learn More.

Related Posts