{"id":2647,"date":"2014-09-24T17:58:45","date_gmt":"2014-09-24T17:58:45","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2647"},"modified":"2020-12-22T12:43:05","modified_gmt":"2020-12-22T17:43:05","slug":"so-malware-attacks-against-critical-infrastructure-are-inevitable-whats-next-2","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/so-malware-attacks-against-critical-infrastructure-are-inevitable-whats-next-2\/2647\/","title":{"rendered":"So malware attacks against critical infrastructure are inevitable. What&#8217;s next?"},"content":{"rendered":"<p>Today we are <a href=\"https:\/\/www.kaspersky.com\/about\/news\/virus\/2014\/What-Types-of-Data-Loss-Keep-Industrial-IT-Managers-Awake-at-Night\" target=\"_blank\" rel=\"noopener nofollow\">publishing<\/a>\u00a0research that paints quite a grim picture: A quarter of organizations handling critical infrastructure report malware attacks. We are talking about an environment that is supposedly protected at all costs from all kinds of intrusions. Why is that? Let me explain why critical security breaches happen and our view on the proper protection methods.<\/p>\n<p>Critical infrastructure operators are often reluctant to deploy full-scale anti-malware protection. They are worried about compatibility, performance, compliance, and most importantly: possible downtime. In a critical environment such as the infrastructure of an oil\/gas company, one minute of downtime may cost anywhere between $20,000 and $500,000. It\u2019s no surprise that some companies prefer to deploy protection partially, or rely on the \u201csecurity by obscurity\u201d approach (see <a href=\"http:\/\/media.kaspersky.com\/pdf\/DataSheet_KESB_5Myths-ICSS_Eng_WEB.pdf\" target=\"_blank\" rel=\"noopener nofollow\">\u201c5 Myths of Cyber Security\u201d<\/a>).<\/p>\n<blockquote class=\"twitter-pullquote\"><p>So #malware attacks against #critical infrastructures are inevitable. What\u2019s next? #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FMS5n&amp;text=So+%23malware+attacks+against+%23critical+infrastructures+are+inevitable.+What%26%238217%3Bs+next%3F+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>As our research shows, malware is the true enemy. The potential impact of a misconfigured security solution is nowhere near the devastating consequences of a true security breach. Critical systems are prone to all types of cyber attacks, but these three are the most likely:<\/p>\n<ul>\n<li>An attack using a sophisticated Stuxnet-like cyberweapon. Always complex, always targeted, very hard to mitigate. Luckily, such attacks are not widespread, as of today.<\/li>\n<li>Generic malware attack. This one is the most frequent, caused by wreckless handling of critical control systems. Wreaks havoc in obsolete and largely unprotected environments, but it is less likely to damage the modern system.\u00a0 Our whitepaper on Critical Infrastructure protection provides more data: <a href=\"http:\/\/media.kaspersky.com\/en\/business-security\/critical-infrastructure-protection\/Cyber_A4_Leaflet_eng_web.pdf\" target=\"_blank\" rel=\"noopener nofollow\">link<\/a>.<\/li>\n<li>An APT. An attack that is not Stuxnet-style in terms of complexity, but still a targeted one. As we see from the recent attack investigations (see our report on <a href=\"https:\/\/securelist.com\/blog\/research\/65240\/energetic-bear-more-like-a-crouching-yeti\/\" target=\"_blank\" rel=\"noopener\">Energetic Bear<\/a>), control environments are now being used as an entry point to further infiltrate the entire network of a company in order to steal sensitive information.<\/li>\n<\/ul>\n<blockquote class=\"twitter-pullquote\"><p>Malware attacks on critical infrastructures require the right strategy to counter #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FMS5n&amp;text=Malware+attacks+on+critical+infrastructures+require+the+right+strategy+to+counter+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>There is a high chance of a successful malware attack in a critical environment, and there are numerous ways to infiltrate the system: via a vulnerable software, using social engineering, USB thumb drives, etc. What is the right strategy to protect a company against it?<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-2619\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/09\/06020136\/wide21-1.png\" alt=\"wide2\" width=\"1000\" height=\"524\"><\/p>\n<p>We believe\u00a0it is the proper combination of allowlists (critical machine runs only critical software, everything else is blocked) and a modern anti-virus engine with a strong heuristics-based detection method that protects from APTs, software vulnerabilities, etc. It doesn\u2019t sound like a big deal since all vendors offer such functionality. But the key is the right configuration and usage\/maintenance\/update. An out-of-the-box security solution won\u2019t fit the critical environment and may lead to the highly feared downtime. Only a\u00a0carefully tuned, tailored solution, customized by both company engineers and security vendor experts, will protect the critical environment safely and effectively.<\/p>\n<p>For more on critical infrastructure protection watch this video:<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/DdlOKy43oig?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Critical infrastructure operators are often reluctant to deploy full-scale anti-malware protection. They are worried about compatibility, performance, compliance, and the most important thing: possible downtime. But our research shows that malware is the true enemy.<\/p>\n","protected":false},"author":316,"featured_media":15935,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[312,756],"class_list":{"0":"post-2647","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-attack","10":"tag-critical-infrastructure"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/so-malware-attacks-against-critical-infrastructure-are-inevitable-whats-next-2\/2647\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/so-malware-attacks-against-critical-infrastructure-are-inevitable-whats-next-2\/2647\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/so-malware-attacks-against-critical-infrastructure-are-inevitable-whats-next-2\/2647\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/attack\/","name":"attack"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/316"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2647"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2647\/revisions"}],"predecessor-version":[{"id":38193,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2647\/revisions\/38193"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15935"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}