Phishing and detection arms races ramp up

Nov. 18, 2020
System integrator Grantek details how cybersecurity providers are ramping up their efforts

Unfortunately, just as cybersecurity remedies improve, malware also grows more sophisticated and widespread.

"With so many people working at home due to COVID-19, there are more connections to virtual private networks (VPN) at all levels. However, this is inspiring some hackers to develop phishing as a service (PhaaS) as a business model, and offer PhaaS kits with preconfigured code on the dark web," says Jacob Chapman, industrial IT and cybersecurity director at Grantek, a CSIA-certified system integrator and business consultant with offices across the U.S. and Canada. "This lets even amateur users pay a fee and launch their own phishing or fear-mongering campaigns that can be distributed not just via email but also using social media. The pandemic is just an added distraction and hook, which allows them to collect more usernames and passwords that they can resell.  Ultimately, large data sets of user’s personal and professional login credentials end up on markets for others to purchase."

Fortunately, Chapman adds that cybersecurity providers are ramping up their efforts, too, some included as part of the Trump Administration's Operation Warp Speed public-private partnership that's funding COVID-19 therapies, which also requires suppliers to prove their cybersecurity preparedness to receive funding. "Our pharmaceutical and life science clients have varying levels of cybersecurity," he says. "Some have network segmentation and traffic management to prevent malware from moving around within their infrastructure, while others have network intrusion detection systems (NIDS), such as those from Claroty, Nozomi or CyberX."

Chapman explains that NIDS have been required to receive certain funding through  Operation Warp Speed, and administered by the Biomedical Advanced Research & Development Authority (BARDA) at the U.S. Dept. of Health and Human Services (HHS). "Intrusion detection on IT systems is very important, but many users don't realize they also need cybersecurity for their operations technology (OT) that's separate from their information technology (IT). Luckily, funding is available," he adds. "We've seen the requirements from BARDA, and we provided OT solutions to help meet them. As usual, this involves segmenting their networks, installing OT NIDS to look for anomalous ICS traffic or devices that haven't tried to connect before, and hardening devices by reviewing PLC and HMI logic, closing unneeded Ethernet ports, and running only necessary services.

Chapman reports that NIDS help maintain much-needed asset inventories; build a full list of all devices on a process control network; map which devices are communicating with each other; and help determine those needing patching or lifecycle replacement. "IT often has a NIDS, but OT and controls need it, and they make visible an incredible amount of detail, too," he says. "It doesn't just indicate that a PLC is on the network, but shows the position of a run-remote key, for example. It can also identify what module is in each slot on its chassis based on the firmware each one is running, as well as the firmware and known vulnerabilities for each. This list can also map and trace devices, and help users find the cause of certain problems."

Despite its capabilities, Chapman cautions that NIDS isn't a cure-all because cybersecurity must be addressed across entire infrastructures and facilities, and NIDS can't assist networks that are islanded. "NIDS provide a powerful improvement to overall cybersecurity, but it's not a substitute for defense-in-depth approaches which cover all areas equally as IEC 62443 emphasizes. The standard has sections that service providers, hardware manufacturers, and owners and end users need to follow, and allows independent cybersecurity audits and reporting back on how well providers meet its requirements."

[sidebar id=1]

About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...