卡巴斯基:2023年ICS網絡威脅預測報告(英文版)(9頁).pdf

編號:145569 PDF  DOCX  中文版 9頁 208.76KB 下載積分:VIP專享
下載報告請您先登錄!

卡巴斯基:2023年ICS網絡威脅預測報告(英文版)(9頁).pdf

1、 ICS cyberthreats in 2023 WWhat to expecthat to expect Evgeny Goncharov 22.11.2022 Version 1.0 ICS CYBERTHREATS IN 2023 WHAT TO EXPECT 1 2022 AO KASPERSKY LAB Developments in the APT world.2 Changes in attack geography.2 Changes in industry focus.2 Continuing attacks on traditional targets.2 Other c

2、hanges in the threat landscape.3 Risk factors due to geopolitical ebb and flow.3 Additional technical and technological risk factors.5 Most noteworthy techniques and tactics in future attacks.6 Some final thoughts.7 Cybersecurity incidents were plentiful in 2022,causing many problems for industrial

3、infrastructure owners and operators.However,luckily,we did not see any sudden or catastrophic changes in the overall threat landscape none that were difficult to handle,despite many colorful headlines in the media.As we see it,the coming year looks to be much more complicated.Many people may be surp

4、rised by unexpected twists and turns,though we should already be examining these eventualities today.Below we share some of our thoughts on potential developments of 2023,though we cannot claim to be providing either a complete picture or a high degree of precision.As we analyze the events of 2022,w

5、e must profess that we have entered an era where the most significant changes in the threat landscape for industrial enterprises and OT infrastructures are mostly determined by geopolitical trends and the related macroeconomic factors.Cybercriminals are naturally cosmopolitan;however,they do pay clo

6、se attention to political and economic trends as they chase easy profits and ensure their personal safety.APT activity,which is traditionally ascribed to intelligence agencies of various governments,always occurs in line with developments in foreign policy and the changing goalposts inside countries

7、 and inter-governmental blocks.ICS CYBERTHREATS IN 2023 WHAT TO EXPECT 2 2022 AO KASPERSKY LAB Developments in the APT world Internal and external political changes will deliver new directions for APT activity.Changes in attack geography Attack geography will inevitably change following transformati

8、ons of existing and the emergence of new tactical and strategic alliances.As alliances shift,we see cybersecurity tensions arise between countries where such tensions had never existed.Yesterdays allies become todays targets.Changes in industry focus We are going to see APT activity change the focus

9、 on specific industries very soon because the evolving geopolitical realities are closely intertwined with economic changes.Therefore,we should soon see attacks targeting the following sectors representing the real economy:Agriculture,manufacturing of fertilizers,agricultural machinery and food prod

10、ucts all as a result of upcoming food crises and shifting food markets;Logistics and transport(including transportation of energy resources)due to the on-going changes in global logistics chains;The energy sector,mining and processing of mineral resources,non-ferrous and ferrous metallurgy,chemical

11、industry,shipbuilding,instrument and machine-tool manufacturing,as the availability of these companies products and technologies is part of the foundation for the economic security of both individual countries and political alliances;The alternative energy sector,specifically where it is on the geop

12、olitical agenda;High-tech,pharmaceuticals and medical equipment producers,since these are integral for ensuring technological independence.Continuing attacks on traditional targets Naturally,we will still see APT attacks on traditional targets,with the main APT attack focus definitely including:ente

13、rprises in the military industrial complex,with geopolitical tensions,confrontations escalating to red alert status,along with the rising possibilities of military confrontations being the main drivers for the attackers;ICS CYBERTHREATS IN 2023 WHAT TO EXPECT 3 2022 AO KASPERSKY LAB the government s

14、ector we expect attacks to focus on information gathering regarding government initiatives and projects related to the growth of industrial sectors of the economy;critical infrastructure attacks aiming to gain a foothold for future use,and sometimes,for instance when conflicts between specific count

15、ries are in the“hot”phase,the goal may even be to inflict immediate and direct damage.Other changes in the threat landscape Other important changes in the threat landscape which we already see and which we believe will increasingly contribute to the overall picture include the following:A rising num

16、ber of hacktivists“working”to internal and external political agendas.These attacks will garner more results quantity will begin to morph into quality.A growing risk of volunteer ideologically and politically motivated insiders,as well as insiders working with criminal(primarily ransomware)and APT g

17、roups both at enterprises and among technology developers and vendors.Ransomware attacks on critical infrastructure will become more likely under the auspices of hostile countries or in countries unable to respond effectively to attacks by attacking the adversarys infrastructure and conducting a ful

18、l-blown investigation leading to a court case.Cybercriminals hands will be untied by degrading communications between law enforcement agencies from different countries and international cooperation in cybersecurity grinding to a halt,enabling threat actors to freely attack targets in hostile countri

19、es.This applies to all types of cyberthreats and is a danger for enterprises in all sectors and for all types of OT infrastructure.Criminal credential harvesting campaigns will increase in response to the growing demand for initial access to enterprise systems.Risk factors due to geopolitical ebb an

20、d flow The current situation forces industrial organizations into making an extremely complicated choice which products and from which vendors should they be using and why.ICS CYBERTHREATS IN 2023 WHAT TO EXPECT 4 2022 AO KASPERSKY LAB On the one hand,we are seeing failing trust relationships in sup

21、ply chains for both products and services(including OEM),which in turn increases the risks in using many of the products companies are used to:It becomes more difficult to deploy security updates when vendors end support for products or leave the market.This is equally applicable to degrading qualit

22、y of security solutions when regular updates cease due to security vendors leaving the market.We cannot totally rule out the possibility of political pressure being applied to weaponize products,technologies and services of some minor market players.When it comes to global market leaders and respect

23、ed vendors,however,we believe this to be extremely unlikely.On the other hand,searching for alternative solutions can be extremely complicated.Products from local vendors,whose secure development culture,as we have often found,is usually significantly inferior to that of global leaders,are likely to

24、 have silly security errors and zero-day vulnerabilities,rendering them easy prey for both cybercriminals and hacktivists.Organizations based in countries where the political situation does not require addressing the above issues,should still consider the risk factors which affect everyone:The quali

25、ty of threat detection decreases as IS developers lose some markets,resulting in the expected loss of some of their qualified IS experts.This is a real risk factor for all security vendors experiencing political pressure.The communication breakdowns between IS developers and researchers located on o

26、pposite sides of the new iron curtain or even on the same side(due to increased competition on local markets)will undoubtedly decrease the detection rates of security solutions that are currently being developed.Decreasing CTI quality unfounded politically motivated cyberthreat attribution,exaggerat

27、ed threats,lower statement validity criteria due to political pressure and in an attempt to utilize the governments political narrative to earn additional profits.Government attempts to consolidate information about incidents,threats and vulnerabilities and to limit access to this information detrac

28、t from overall awareness,since information may sometimes be kept under wraps without good reasons.And at the same time,this results in an increased risk of confidential data leaks(example:PoC of an RCE published by mistake in a national vulnerability database).This issue could be addressed by buildi

29、ng broad cybersecurity capacity in the public sector to ensure that responsible ICS CYBERTHREATS IN 2023 WHAT TO EXPECT 5 2022 AO KASPERSKY LAB treatment of sensitive cybersecurity information and efficient coordinated vulnerability disclosure can always be guaranteed.Additional IS risks due to the

30、growing role of governments in the operations of industrial enterprises,including connections to government clouds and services,which may sometimes be less protected than some of the best private ones.Additional technical and technological risk factors Digitalization in a race for higher efficiency

31、IIoT and SmartXXX(including predictive maintenance systems and digital twin technology)leads to significantly increased attack surfaces.This is confirmed by the attack statistics on CMMS(Computerized Maintenance Management Systems).It is significant that in this Top 10 ranking by the percentage of a

32、ttacked CMMS in H1 2022 we see the traditionally secure countries which are not seen in rankings based on the overall percentage of OT computers attacked in the country or based on the percentage of attacked OT computers by sector.Rising energy carrier prices and the resulting rises in hardware pric

33、es,on the one hand,will force many enterprises to abandon plans to deploy on premise infrastructure in favor of cloud services from third party vendors(which increases IS risks).In addition,this will negatively impact budgets allocated for IT/OT security.The deployment of various unmanned vehicles a

34、nd units(trucks,drones,agricultural equipment and so forth),which can be abused as either targets or tools for attacks.Top 10 countries ranked by the percentage of CMMS attacked in H1 2022 ICS CYBERTHREATS IN 2023 WHAT TO EXPECT 6 2022 AO KASPERSKY LAB Most noteworthy techniques and tactics in futur

35、e attacks Lets not indulge in any fantastic suppositions about tactics and techniques used by the most advanced attackers,such as APTs connected to intelligence agencies in leading countries,as we can then be waylaid by unexpected twists and turns.Lets also not discuss the tactics and techniques use

36、d by the numerous threat actors at the other end of the spectrum the least qualified ones,since it is unlikely that they will come up with something interesting or new,and the security solutions already in place at most organizations can effectively block their attacks.Lets focus instead on the midd

37、le of the spectrum the techniques and tactics used by the more active APT groups,whose activity is usually ascribed as being in line with the interests of countries in the Middle East and the Far East,as well as being used by more advanced cybercriminals,such as ransomware gangs.Based on our experie

38、nce of investigating such attacks and the related incidents,we believe that ICS cybersecurity specialists need to focus on the following tactics and techniques:Phishing pages and scripts embedded on legitimate sites.The use of Trojanized“cracked”distribution packages,“patches”and key generators for

39、commonly used and specialist software(this will be stimulated by rising license costs and the departure of vendors from certain markets due to political pressure).Phishing emails about current events with especially dramatic subjects,including events the root causes of which are political in nature.

40、Documents stolen in previous attacks on related or partner organizations being used as bait in phishing emails.The distribution of phishing emails disguised as legitimate work correspondence via compromised mailboxes.N-day vulnerabilities these will be closed even more slowly as security updates for

41、 some solutions will become less accessible.Exploiting foolish configuration errors(such as failing to change default passwords)and zero-day vulnerabilities in products from new vendors,including local ones.Mass rollouts of such products are inevitable,despite the serious doubts about the developers

42、 security maturity.For instance,recommendations such as“enter password xyz in the password field”can be found in installation instructions and user manuals in a surprising number of products from small local vendors.Furthermore,ICS CYBERTHREATS IN 2023 WHAT TO EXPECT 7 2022 AO KASPERSKY LAB you will

43、 rarely find information about vulnerabilities inherited from common components and OEM technologies on such vendors websites.Exploiting inherent security flaws in cloud services from local service providers and government information systems(see above).Exploiting configuration errors in security so

44、lutions.This includes the possibility of disabling an antivirus product without entering an administrator password(antivirus is almost useless if an attacker can easily disable it).Another instance would be the weak security of the IS solution centralized management systems.In this case,IS solutions

45、 are not only easy to bypass,but they can also be used to move laterally for instance to deliver malware or to gain access to isolated network segments and to bypass access control rules.Using popular cloud services as CnC even after an attack is identified,the victim might still be unable to block

46、it because important business processes could depend on the cloud.Exploiting vulnerabilities in legitimate software,for instance,using DLL Hijacking and BYOVD(Bring Your Own Vulnerable Driver)to bypass endpoint security solutions.Distributing malware via removable media to overcome air gaps,in those

47、 instances where air gaps actually do exist.Some final thoughts When writing about potential future issues,we did not aim to describe a full set of potential threats.Instead,we attempted to convey the impression of a global character of upcoming developments and to encourage our readers to assess th

48、ose issues(including similar ones not mentioned specifically in this paper)which are most relevant to their organization.We included only those developments and described only those risks which we believe to be most widespread and generally applicable to many organizations in many countries.Therefor

49、e,we kept the predictions less specific on purpose.Only you can determine which threats are relevant for you.Naturally,if you need some assistance with this rather complicated task,we are always ready to help.Our predictions are the sum of the opinions of our entire team based on our collective expe

50、rience in researching vulnerabilities and attacks and investigating incidents,as well as our personal vision of the main vectors driving changes in the threat landscape.We will be very glad if any of our negative predictions do not come true in 2023.We are always happy to discuss our ideas and we we

51、lcome your questions at ics-.ICS CYBERTHREATS IN 2023 WHAT TO EXPECT 8 2022 AO KASPERSKY LAB Kaspersky Industrial Control Systems Cyber Emergency Response Team(Kaspersky ICS CERT)is a global project of Kaspersky aimed at coordinating the efforts of automation system vendors,industrial facility owners and operators,and IT security researchers to protect industrial enterprises from cyberattacks.Kaspersky ICS CERT devotes its efforts primarily to identifying potential and existing threats that target industrial automation systems and the industrial internet of things.Kaspersky ICS CERT ics-

友情提示

1、下載報告失敗解決辦法
2、PDF文件下載后,可能會被瀏覽器默認打開,此種情況可以點擊瀏覽器菜單,保存網頁到桌面,就可以正常下載了。
3、本站不支持迅雷下載,請使用電腦自帶的IE瀏覽器,或者360瀏覽器、谷歌瀏覽器下載即可。
4、本站報告下載后的文檔和圖紙-無水印,預覽文檔經過壓縮,下載后原文更清晰。

本文(卡巴斯基:2023年ICS網絡威脅預測報告(英文版)(9頁).pdf)為本站 (Yoomi) 主動上傳,三個皮匠報告文庫僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對上載內容本身不做任何修改或編輯。 若此文所含內容侵犯了您的版權或隱私,請立即通知三個皮匠報告文庫(點擊聯系客服),我們立即給予刪除!

溫馨提示:如果因為網速或其他原因下載失敗請重新下載,重復下載不扣分。
客服
商務合作
小程序
服務號
折疊
午夜网日韩中文字幕,日韩Av中文字幕久久,亚洲中文字幕在线一区二区,最新中文字幕在线视频网站