The Cybersecurity and Infrastructure Security Agency (CISA) in concert with the National Security Agency (NSA) are alerting owners and operators of operational technology/industrial control systems (OT/ICS) that they are prime targets for nation-state hackers and other cyber criminals.
In a lengthy advisory, the two agencies are circulating a bulletin about control system defense of assets that operate, control and monitor day-to-day critical infrastructure and industrial processes. Control System Defense: Know the Opponent is intended to provide critical infrastructure owners and operators with an understanding of the tactics, techniques, and procedures (TTPs) used by malicious cyber actors.
The Bottom Line
Understanding that being targeted is not an “if” but a “when” is essential context for making ICS security decisions. By assuming that the system is being targeted and predicting the effects that a malicious actor would intend to cause, owner/operators can employ and prioritize mitigation actions.
This latest advisory builds on a prior NSA and CISA 2021 guide to stop malicious ICS activity against connect OT issued two years ago.
Per CISA and the NSA alert, cyber threat actors typically follow these steps to plan and execute compromises against critical infrastructure control systems:
Defending the Attack Surface
Malicious actors can conduct these steps in a coordinated manner, sometimes concurrently and repeatedly. Some mitigations include:
The combination of integrated, simplified tools and remote access creates an environment ripe for malicious actors to target control systems networks. New IT-enabled accesses provide cyber actors with a larger attack surface into cyber-physical environments. It is vital for OT/ICS defenders to anticipate the TTPs of cyber actors combining IT expertise with engineering know-how.