SoatDev IT Consulting
SoatDev IT Consulting
  • About us
  • Expertise
  • Services
  • How it works
  • Contact Us
  • News
  • July 4, 2023
  • Rss Fetcher

Kaspersky experts have identified several key contributors to the success of Advanced Persistent Threat (APT) operations within victims’ networks. These factors include human elements, inadequate security measures, difficulties with updates and configuration of cybersecurity solutions, and other related issues.
Although some of these reasons may seem trivial, they are commonly encountered during incident response activities. To assist companies in mitigating these threats and promoting the adoption of best practices, the experts have compiled a list of the most prevalent issues:
Insufficient Isolation of OT Networks
The security of Operational Technology (OT) networks is compromised due to a lack of proper isolation, as highlighted by incident investigations conducted by Kaspersky experts. One common issue is the presence of engineering workstations that are connected to both the regular IT network and the OT network, leaving vulnerabilities in the system.
Relying solely on network equipment configuration for OT network isolation proves to be ineffective against experienced attackers who can easily reconfigure the equipment to their advantage. These attackers can exploit such configurations to control malware traffic or use them as a storage and delivery system for malware, even in supposedly isolated networks. Kaspersky has observed such malicious activities on multiple occasions.
The Human Factor in Cybercriminal Activities
Granting access to OT networks without considering proper information security measures can lead to exploitation. Remote administration utilities like TeamViewer or Anydesk, initially set up temporarily, often remain active and can be exploited by attackers.
Dissatisfied employees, driven by various motivations such as work assessments, income, or political factors, may engage in cybercriminal actions. Implementing a Zero Trust approach, where neither the user, device, nor application within the system is inherently trusted, can mitigate such risks.
Inadequate Protection and Configurations of OT Assets
Incident analysis has revealed several vulnerabilities in OT networks, including outdated security solution databases, missing or removed license keys, disabled security components, and excessive exclusions from scanning and protection. These shortcomings contribute to the spread of malware within the networks.
For example, outdated databases and failure to update security solutions automatically create opportunities for advanced threats to propagate quickly, especially in APT attacks, where sophisticated threat actors aim to avoid detection.
Insecure Configurations of Security Solutions
APT groups/actors critically depend on proper configurations of security solutions to prevent them from being disabled or abused. Attackers may hijack critical IT systems and target the administration servers of security solutions to gather information or use tools within the security system to spread malware to supposedly separate systems.
The Lack of Cybersecurity Protection in OT Networks
Surprisingly, some OT networks lack cybersecurity solutions installed on many endpoints, leaving them vulnerable to attacks. Even if the OT network is physically separated from other networks and not connected to the Internet, attackers can still find ways to gain access. For instance, they can distribute specially crafted malware through removable drives like USBs.
Challenges with Workstation and Server Security Updates
Industrial control systems have unique operational requirements, making tasks like installing security updates on workstations and servers challenging. These updates often require careful testing during scheduled maintenance, leading to infrequent updates. Threat actors take advantage of this delay to exploit known vulnerabilities and carry out attacks.
Updating the server’s operating system may even necessitate upgrading specialized software like SCADA servers, which can be costly. Industrial control system networks commonly have outdated systems as a result. Surprisingly, even Internet-facing systems in industrial enterprises, which are relatively easier to update, can remain vulnerable for extended periods, exposing operational technology (OT) to attacks and serious risks.
 

Previous Post
Next Post

Recent Posts

  • 5 Tips on How to be Vigilant on Social Media
  • IT News Africa and Infobip Exclusive Webinar on Digital Loan Recovery for Africa’s BFSI Sector
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 5 Dangers of Oversharing on Social Media
  • Can a dev environment spark joy? The Android team thinks so.

Categories

  • Industry News
  • Programming
  • RSS Fetched Articles
  • Uncategorized

Archives

  • May 2025
  • April 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023

Tap into the power of Microservices, MVC Architecture, Cloud, Containers, UML, and Scrum methodologies to bolster your project planning, execution, and application development processes.

Solutions

  • IT Consultation
  • Agile Transformation
  • Software Development
  • DevOps & CI/CD

Regions Covered

  • Montreal
  • New York
  • Paris
  • Mauritius
  • Abidjan
  • Dakar

Subscribe to Newsletter

Join our monthly newsletter subscribers to get the latest news and insights.

© Copyright 2023. All Rights Reserved by Soatdev IT Consulting Inc.