iTWire TV 160x1200notfunny

iTWire TV 160x1200notfunny

iTWire TV 705x108notfunny

Wednesday, 19 June 2024 11:13

Cyberattacks targeting operational technology mark a pivotal shift for Australian organisations

By Dragos

GUEST RESEARCH: Dragos, the global leader in cybersecurity for operational technology (OT) environments, has released its Australian 2023 OT Cybersecurity Year in Review report, providing an important view of the significant cybersecurity trends impacting industrial infrastructure organisations.

Of the 905 global ransomware incidents impacting industrial organisations last year, 13 incidents involved Australian organisations. Several incidents, such as DP World Australia, brought into focus the possibility of cascading effects and impacts of ransomware on industrial operations, supply chains, and consumers.

“With each passing year, the number of ransomware incidents globally climbs even higher, leading to cascading impacts for virtually every industrial sector, particularly manufacturing,” said Dragos Asia Pacific area vice president Hayley Turner.

“Meanwhile, the number of vulnerabilities present in industrial control systems (ICS) continue to grow exponentially, along with the adversaries’ appetite to exploit them.”

Based on customer engagements across various industries within the past year, electric, oil and gas, water, and manufacturing sectors made moderate improvements in their ICS/OT cybersecurity posture on average, but industrial organisations still struggle with passwords and still more are unable to detect threats to their ICS/OT environment.

“Now is time to take bigger strides,” continues Turner. “Addressing this challenge requires coordinated efforts from partners across Australia’s cybersecurity community and, when necessary, emergency measures to mitigate adverse effects on critical business operations and the communities they serve.”

Key vulnerability findings
In 2023, Dragos saw the emergence of three new threat groups, including Voltzite linked to Volt Typhoon, and found that ransomware continued to be the most reported cyber threat among industrial organisations with a nearly 50% increase in reported incidents. Globally, Dragos now tracks 21 threat groups engaged in OT operations in 2023.

Of the three new groups, Voltzite targets electric power generation, transmission, and distribution, and has also been observed targeting research, technology, defence industrial bases, satellite services, telecommunications, and educational organisations. The group overlaps with Volt Typhoon, a group that the US Government publicly linked to the People’s Republic of China. The group’s threat activities include living off the land techniques, prolonged surveillance, and data gathering aligned with Volt Typhoon’s assessed objectives of reconnaissance and gaining geopolitical advantage in the Asia Pacific region. They have traditionally targeted US-based facilities but have been seen targeting organisations in Africa and Southeast Asia.

Additional global findings include:
80% of vulnerabilities reside deep within the ICS network
16% of advisories were network exploitable and perimeter facings
53% of the advisories analysed could cause both a loss of view and loss of control, up from 51% in 2022
31% of advisories contained errors and Dragos provided mitigations for 49% of the advisories that had none

Key ransomware findings
Ransomware remains the number one attack globally in the industrial sector increasing 50% from 2022. Globally, Lockbit caused 25% of total industrial ransomware attacks, with ALPHV and BlackBasta accounting for 9% each. The manufacturing sector continues to be the primary target of ransomware and accounted for 71 % of all ransomware attacks. Ransomware groups do not explicitly target ICS and OT, but risks to these environments are introduced by precautionary operations shutdowns to limit the impact of an attack, flattened industrial networks, and the integration of ICS/OT kill processes into ransomware strains.

The Lockbit 3.0 compromise of DP World Australia in November, which handles 40% of goods coming in and out of Australia, led to the shutdown of land-side port operations for three days while the incident was contained. Though no ransomware was deployed in this case, it was not until 10 days after first detecting the incident that DP World Australia was able to clear 100% of the backlog, comprising 30,137 containers.

Threats to Australian infrastructure escalated
Australia’s Cyber and Infrastructure Security Centre (CISC) and a joint effort by agencies from the Five Eyes intelligence Alliance shed light on the intensifying OT cyber threat landscape, with a sharp focus on foreign espionage and interference as prime threats to critical infrastructure.

The Australian Signals Directorate’s Annual Cyber Threat Report revealed a 50% jump in cyber incidents targeting such infrastructure, highlighting the alarming trend that these sectors are increasingly preyed upon out of motivation to gain geopolitical advantages. The involvement of sophisticated threat groups underscores the critical necessity for robust cybersecurity measures and the importance of private and public partnerships in Australia and internationally. Reinforcing cybersecurity defences and forging strong international alliances are paramount for safeguarding national interests and ensuring the resilience of critical infrastructure in the face of complex escalating threats.

Key steps taken to ensure security of Australia’s critical infrastructure
In 2023, the CISC has advanced its efforts to bolster national cybersecurity and resilience, particularly in ICS/OT environments where the challenge of detecting sophisticated threats is increasingly paramount. Key initiatives include the publication of critical infrastructure asset class definition guidance on 12 May 2023, aimed at enhancing operational resilience across 22 sectors, and the activation of the Critical Infrastructure Risk Management Program. The program, part of a trio of security obligations introduced by recent amendments to the Security of Critical Infrastructure Act 2018, alongside Mandatory Cyber Incident Reporting and the Critical Infrastructure Asset Register, marks a strategic endeavour to elevate Australia’s critical infrastructure security.

“These steps signal the urgency and importance of robust asset monitoring, intelligence-based detections for sophisticated threats, and a coordinated response to safeguard essential services that Australians rely upon,” concludes Turner.

As ICS/OT cybersecurity becomes a top priority, from boardrooms to the manufacturing floor, leaders and their teams must work together to implement programs and critical safeguards. A first step in implementing critical cybersecurity controls is achieving alignment on the key priorities. Dragos recommends Australian organisations download the SANS Institute identified five critical controls for ICS/OT cybersecurity.

The Australian 2023 Dragos OT Cybersecurity Year in Review report, and the accompanying executive summary, can be downloaded here.

About Dragos
Dragos has a global mission to safeguard civilisation from those trying to disrupt the industrial infrastructure we depend on every day. The Dragos Platform offers the most effective industrial cybersecurity technology, giving customers visibility into their ICS/OT assets, vulnerabilities, threats, and response actions. The strength behind the Dragos Platform comes from our ability to codify Dragos’s industry-leading OT threat intelligence, and insights from the Dragos services team, into the software. Our community-focused approach gives you access to the largest array of industrial organisations participating in collective defence, with the broadest visibility available. Our solutions protect organisations across a range of industries, including electric, oil & gas, manufacturing, building automation systems, chemical, government, water, food & beverage, mining, transportation, and pharmaceutical. Dragos is privately held and headquartered in the Washington, DC area with regional presence around the world, including Canada, Australia, New Zealand, Europe, and the Middle East.

Read 1162 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




EXL AI IN ACTION VIRTUAL EVENT 20 MARCH 2025

Industry leaders are looking to transform their businesses and achieve measurable outcomes with AI.

As organisations across APAC navigate the complexities of AI adoption, this must-attend event brings together industry leaders, real-world demonstrations, and visionary panel discussions to bridge the gap between proof-of-concepts and enterprise-wide AI implementation.

Learn how to overcome common challenges in deploying AI at scale.​

Unlock cost savings, efficiency, and better customer experiences with AI.

Discover how industry expertise and data intelligence enable practical AI deployment.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments