F-Secure’s report highlights that threat actors are advanced and persistent, but companies are using outdated systems and technology to save money. Poor security posture, prioritization, and awareness are also gifts to attackers

Helsinki, Finland – April 16, 2019 — /BackupReview.info/ — Malicious actors are targeting critical infrastructure (CNI) sites and energy distribution facilities exponentially. Interconnected systems in the energy industry increase vulnerabilities, and cyber attacks often go undetected for some time.

As energy companies save costs against the backdrop of lower oil prices, consolidating operations can weaken business resilience and redundancy levels. This gives rise to new, single critical points of failure, with any disruption across the supply chain potentially having increased consequences.

“Espionage and sabotage attacks against CNI organizations have increased over the years and I don’t think we have seen it all yet,” says Sami Ruohonen, Labs Threat Researcher at Finnish cyber security company F-Secure.

Connecting Industrial Control Systems (ICS) to the Internet is increasing, and a considerable number of CNI systems in use today were installed and built before 24/7/365 internet connections were the norm and the advent of Stuxnet. Many Operational Technology (OT) components have built-in remote operation capabilities, but are either partly or entirely lacking in security protocols such as authentication.

Moreover, cyber security was not a realistic threat when these systems were manufactured, and legacy protocols and systems never had the built-in security controls that we take for granted today. Transitioning these systems to the Internet has opened them up to attacks from a myriad of angles.

“Critical Infrastructure due to its nature is an interesting target for a foreign nation-state, even during peacetime,” Ruohonen explains.

F-Secure’s report shows that:

  • A variety of different adversaries, each with their own motivations and tradecraft, constantly strive to compromise organizations that operate critical infrastructure
  • Attackers have more time than their targets and will take months to plan their attack
  • People are the weakest link in production, with company employees seemingly being criminals’ go-to target
  • Attackers continue to succeed mainly due to organizations’ lack of mature cyber security practices
  • Nation-state sponsored Advanced Persistent Threat (APT) groups are relentless, and continue to seek network foothold positions on CNIs and espionage opportunities in the interests of exercising political leverage
  • Nine different attackers/malwares/techniques targeting the energy industry stand out, with spear phishing being the most common initial supply chain attack technique
  • Keeping a small attack surface in the energy industry – while often pitched as the best way to mitigate the risk of acyber attack – is simply not possible

While breaches are a certainty, Ruohonen advises organizations review their cyber security posture to implement latest technologies such as an endpoint detection and response (EDR) solution.

“EDR is a quick way to tremendously increase capabilities to detect and respond to advanced threats and targeted attacks which might bypass traditional endpoint solutions,” he explains. “Managed EDR solutions can provide monitoring, alerting, and response to cover the needs 24/7. This means organizations’ IT teams can operate during business hours to review the detections while a specialized cybersecurity team takes care of the rest,” says Ruohonen.

The complete report is available herehttps://s3-eu-central-1.amazonaws.com/evermade-fsecure-assets/wp-content/uploads/2019/04/15105531/F-Secure_energy_report.pdf

More informationhttps://blog.f-secure.com/cyber-attack-powerlessness-in-the-energy-industry/

About F-Secure
Nobody knows cyber security like F-Secure. For three decades, F-Secure has driven innovations in cyber security, defending tens of thousands of companies and millions of people. With unsurpassed experience in endpoint protection as well as detection and response, F-Secure shields enterprises and consumers against everything from advanced cyber attacks and data breaches to widespread ransomware infections. F-Secure’s sophisticated technology combines the power of machine learning with the human expertise of its world-renowned security labs for a singular approach called Live Security. F-Secure’s security experts have participated in more European cyber crime scene investigations than any other company in the market, and its products are sold all over the world by over 200 broadband and mobile operators and thousands of resellers.

Founded in 1988, F-Secure is listed on the NASDAQ OMX Helsinki Ltd.

f-secure.com | twitter.com/fsecure | facebook.com/f-secure

Contact:
F-Secure media relations
Sandra Proske
+49 176 7003 6664
Sandra.Proske@f-secure.com

Source: F-Secure

 

 

General Tags: online backup reviews, online backup providers directory, software as a service, compare online backups, CEO interviews, backing up online, data security, SaaS, online backup companies, online backup, data storage, online data backup, online backup services, online file storage, top rated online backups, online backup news, cloud computing, online file backup

Like us on Facebook




===========================
Do you like this post? Subscribe to our RSS feed ===========================



Share/Save/Bookmark

Related posts:

  1. Dell EMC Cyber Recovery Software Delivers Last Line of Data Protection Defense Against Cyber Attacks
  2. Cyber Essentials Scheme will Have Pivotal Role in Protecting Against 2015’s Cyber-Attacks
  3. Dropping Elephant: Cyber-espionage Group Hunts High Profile Targets with Low Profile Tools
  4. Phishing in the C-Suite: 96% of Executives Vulnerable to Attacks
  5. F-Secure’s New Service Pits Man and Machine Against Targeted Cyber Attacks
  6. KineticD Online Data Backup Expert Tips: Defending Against Cyber Attacks with Online Data Backup
  7. Retailers Experience Two Cyber Attacks Every Week
  8. Kaspersky Lab Discovers Smart Home Hub Vulnerable to Remote Attacks
  9. DNS Now your First Line of Defense against Cyber Attacks
  10. VeriStor and Thycotic Partner to Prevent Cyber Attacks through Privileged Account Password Protection

Tags: