A large-scale hacking attack has begun targeting facilities in CPS/OT environments in S.Korea.





Do we see the HMI screen being remotely controlled by hackers?

The hacker group (known for attacking Kansas water facilities last Sep) are sending remote commands and controls to power up OT equipment to maximum risk, but it's defenseless. Also an additional posting has been uploaded about the HMI screen being remotely controlled to manipulate the culture/irrigation facility in an acidic environment by hackers.

This is just one example. Hacking attacks against S.Korea have begun on a large scale. In particular, facilities in the CPS/OT environment are being targeted.


What can we imagine/expect here?

When we think about the chemical/pharmaceutical manufacturing environment related to explosion/contamination/death risks, the OT process recipe, etc. should be different, but the attack technique by an attacker may not be very different. 

There are various attack vectors for various OT environments, but above all, a solid countermeasure for the following scenarios is essential:

  1. Identifying vulnerable OT assets
  2. Profiling communication between internal OT assets & external malicious IPs
  3. Abnormal operation of #HMI/#EWS in Purdue L2 by remote execution
  4. Abnormal commands to controllers (#PLC/#DCS etc) in Purdue L1
  5. Block external malicious IPs and (if possible) isolate hacked HMI after discussion with the OT team

#CPS #OT #XIoT #IoT #IIoT #IoMT #CPSSecurity #OTSecurity #IoTSecurity #CPS보안 #OT보안 #IoT보안

Comments

Popular posts from this blog

Don't confuse DCS, PLC and SCADA in front of OT specialists

Top 20 Threat Scenarios & Playbooks for OT Security

Let's create our own ICS Labs in the VMs!