​​Need help? Call Us: (805) 505-7375                  Check Novesh's Event Calendar for our Exciting Cybersecurity Workshops at Thousand Oaks City Hall.                                                  

OT/ICS Cyber Attacks & How to Prevent Them with IEC 624

March 20, 2023 by
OT/ICS Cyber Attacks & How to Prevent Them with IEC 624
Reza Abdolee

As our world increasingly relies on technology, securing critical infrastructure systems such as Industrial Control Systems (ICS) and Operational Technology (OT) becomes more crucial. Cyberattacks targeting these systems can have devastating consequences, ranging from operational disruptions to physical damage and even loss of life. That's why governments and organizations around the world are taking steps to improve the cybersecurity of ICS and OT systems. In this blog, we will look at 8 recent OT/ICS cyberattacks and explore how adherence to the IEC 62443 guidelines and implementation of effective security controls could have prevented them.

Colonial Pipeline Cyber Attack

In May 2021, the Colonial Pipeline, which supplies nearly half of the fuel to the US East Coast, was hit by a ransomware attack. The attackers used a known vulnerability in an outdated VPN system to gain access to the company's network and deploy ransomware. The attack forced the pipeline to shut down for several days, causing fuel shortages and price hikes.

Prevention: The IEC 62443 standard provides several guidelines and controls that could have prevented or mitigated this attack. First, the standard recommends keeping all software and hardware up to date with the latest security patches and updates to minimize vulnerabilities. Additionally, the standard advises implementing strong access controls, including multi-factor authentication and secure passwords, to prevent unauthorized access to critical systems.

Oldsmar Water Treatment Plant Attack

In February 2021, an attacker gained unauthorized access to the ICS system of the Oldsmar Water Treatment Plant in Florida and attempted to poison the water supply by increasing the amount of sodium hydroxide (lye) in the water to toxic levels. Fortunately, the attack was detected and prevented before any harm was done.

Prevention: The Oldsmar Water Treatment Plant attack could have been prevented by following IEC 62443 guidelines on user authentication and system hardening. By implementing strong user authentication measures and regularly updating and patching the system, the attacker would have been unable to gain unauthorized access to the system.

SolarWinds Supply Chain Attack

In 2020, the SolarWinds cyber attack targeted several US government agencies and private companies. The attackers used a backdoor Trojan that was hidden in a software update from SolarWinds, a network management company. The malware allowed the attackers to gain access to the victim's network, steal sensitive data, and even move laterally to other networks.

Prevention: The SolarWinds attack was highly sophisticated and required a deep understanding of the victim's network. However, it could have been prevented by following the IEC 62443 guidelines and implementing multiple layers of security controls. Specifically, ensuring the security of the software supply chain and regularly testing and updating software could have prevented the attackers from infiltrating the network. Additionally, implementing network segmentation could have limited the attackers' ability to move laterally within the network.

Triton/Trisis Malware Attack

In 2017, the TRITON/TRISIS attack targeted a Saudi Arabian petrochemical plant. The attackers used a malware that targeted the plant's Safety Instrumented System (SIS), which monitors critical industrial processes and automatically takes actions to maintain safe operations. The malware was designed to manipulate the SIS, potentially causing physical damage and endangering workers' lives.

Prevention: The TRITON/TRISIS attack was highly sophisticated and required a deep understanding of the plant's industrial control systems. However, it could have been prevented by following the IEC 62443 guidelines and implementing multiple layers of security controls. Specifically, applying network segmentation to the SIS network could have prevented the malware from infiltrating the system. Additionally, regularly testing and updating the SIS software could have prevented the attackers from exploiting known vulnerabilities.

Ukrainian Power Grid Attack (2015 and 2016): 

In December 2015 and December 2016, two separate cyberattacks caused widespread power outages in Ukraine. The attacks targeted the country's power grid and were attributed to Russian state-sponsored hackers. The attackers used spear-phishing emails to gain access to the control systems and then deployed malware to disrupt the grid's operation. 

Prevention: The attacks could have been prevented if the Ukrainian power grid had implemented the IEC 62443 guidelines, which recommend implementing security controls such as network segmentation, access controls, and intrusion detection systems. By dividing the network into security zones and implementing proper access controls, the attack could have been contained to a single zone, minimizing the impact of the attack.

Attack on Saudi Aramco: 

In August 2012, the Saudi Arabian national oil company, Saudi Aramco, suffered a significant cyber attack, which resulted in the disruption of the company's internal network and the deletion of data on over 30,000 workstations. The attack was carried out using a piece of malware known as Shamoon, which was designed to overwrite the master boot record of targeted computers, making them inoperable. The Shamoon malware was delivered through a spear-phishing campaign targeting specific employees within the organization. Once the malware infected a system, it would spread throughout the network and eventually delete data on the infected systems.

Prevention: The attack on Saudi Aramco highlights the importance of implementing proper network segmentation and access controls as per the IEC 62443 standard. By dividing their network into security zones and implementing firewalls and access control policies, organizations can limit the spread of malware and reduce the impact of a potential cyber attack. Additionally, implementing strong authentication mechanisms such as multi-factor authentication and regularly patching and updating systems can help to prevent attackers from exploiting known vulnerabilities in the network. Regular security assessments and penetration testing can also help identify and address potential security weaknesses in the network.

Stuxnet Attack

Stuxnet was a computer worm. It was designed to target specific industrial control systems, specifically those used in Iran's nuclear program. The worm was able to infiltrate the systems through infected USB drives and then spread throughout the network. Once inside the system, Stuxnet was able to manipulate the programmable logic controllers (PLCs) that controlled the centrifuges used in the nuclear program, causing them to malfunction and eventually break down.

Prevention: To prevent a Stuxnet-like attack, the IEC 62443 standard recommends several security controls, including: a) network Segmentation: Dividing a network into smaller, isolated segments can help to limit the spread of malware and other malicious activity. This can be achieved using firewalls, routers, and other network security devices, b) Access Control: Limiting access to critical systems and data can help to prevent unauthorized individuals or software from making changes to the system. Access control can be achieved through authentication and authorization processes, as well as the use of intrusion detection and prevention systems, and c) Patch Management: Regularly updating and patching software and systems can help to address vulnerabilities and prevent attackers from exploiting them. The IEC 62443 standard recommends developing and implementing a patch management policy to ensure that all systems are kept up to date.

In conclusion, cyberattacks on OT and ICS systems can have severe consequences, including disruption of critical infrastructure, loss of revenue, and potential harm to human life. The IEC 62443 guidelines provide a comprehensive approach to securing these systems by providing security controls and recommendations for implementing security measures. By implementing these guidelines, organizations can reduce the risk of cyberattacks and ensure the safety and security of their operations.

Enhance Your ICS’ Security Posture with NOVESH

NOVESH offers the best IT & OT cybersecurity services using top-notch technology to ensure you never have to worry about your business data confidentiality and breaches. To better safeguard your industrial control system, reach out to our professionals to implement IEC 62443 zones and conduits to ensure maximum protection.

Contact us to join hands with the world-leading cybersecurity service providers to protect assets from cyber threats and safeguard your business data.

Share this post
Archive