Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on July 07, 2020, 06:08:17 PM

Title: US-CERT- AA20-049A: Ransomware Impacting Pipeline Operations
Post by: Netwörkheäd on July 07, 2020, 06:08:17 PM
AA20-049A: Ransomware Impacting Pipeline Operations

Original release date: February 18, 2020 | Last revised: June 30, 2020

Summary

Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) framework. See the MITRE ATT&CK for Enterprise and ATT&CK for Industrial Control Systems (ICS) frameworks for all referenced threat actor techniques and mitigations.



The Cybersecurity and Infrastructure Security Agency (CISA) encourages asset owner operators across all critical infrastructure sectors to review the below threat actor techniques and ensure the corresponding mitigations are applied.



CISA responded to a cyberattack affecting control and communication assets on the operational technology (OT) network of a natural gas compression facility. A cyber threat actor used a Spearphishing Link [T1192] to obtain initial access to the organization's information technology (IT) network before pivoting to its OT network. The threat actor then deployed commodity ransomware to Encrypt Data for Impact [T1486] on both networks. Specific assets experiencing a Loss of Availability [T826] on the OT network included human machine interfaces (HMIs), data historians, and polling servers. Impacted assets were no longer able to read and aggregate real-time operational data reported from low-level OT devices, resulting in a partial Loss of View [T829] for human operators. The attack did not impact any programmable logic controllers (PLCs) and at no point did the victim lose control of operations. Although the victim's emergency response plan did not specifically consider cyberattacks, the decision was made to implement a deliberate and controlled shutdown to operations. This lasted approximately two days, resulting in a Loss of Productivity and Revenue [T828], after which normal operations resumed. CISA is providing this Alert to help administrators and network defenders protect their organizations against this and similar ransomware attacks.


Technical Details

Network and Assets





Planning and Operations




Mitigations

Asset owner operators across all sectors are encouraged to consider the following mitigations using a risk-based assessment strategy.



Planning and Operational Mitigations





Technical and Architectural Mitigations





Resources




           

Revisions





           

This product is provided subject to this Notification and this Privacy & Use policy.





Source: AA20-049A: Ransomware Impacting Pipeline Operations (https://us-cert.cisa.gov/ncas/alerts/aa20-049a)