Welcome!

Linux Containers Authors: Liz McMillan, Yeshim Deniz, Elizabeth White, Pat Romanski, Zakia Bouachraoui

Press Release

Stuxnet Is the Tip of the SCADA Exploit Iceberg

NitroSecurity Addresses Diminishing “Air Gap” Protection, Compensating Controls and Defense Diversification

NitroSecurity, Inc., the leader in high-performance, content-aware security information and event management solutions (SIEM), today issued guidance for critical infrastructure providers in the wake of the Windows Shell vulnerability (CVE-2010-2568) and the Stuxnet Trojan that initially targeted Supervisory Control And Data Acquisition (SCADA) systems from Siemens Corporation.

Much has been made of the vulnerabilities in Windows software and hard-coded passwords in Siemens software that opened a door for infection of systems that in some cases are directly responsible for operating critical infrastructures such as electrical grids. While these are absolutely contributing factors in what some estimates place as high as 9,000 infection attempts per day, vastly more disturbing is the emergence of the first truly weaponized exploit to target SCADA systems. It's an exploit that in one case already has had a widespread impact on the systems of a German manufacturer, but the full extent of the threat to process control systems is still being determined.

Security advisories to date have focused on the signatures and rules being put into place by intrusion prevention systems and antivirus. However, little-to-no guidance has been issued as to the steps that could be taken, and controls put in place, to head off the next Stuxnet - which could very well already be active and embedded in control networks now.

"We can't simply focus on this or any specific vulnerability in isolation," said Eric Knapp, director of Critical Infrastructure Markets for NitroSecurity. "In reality, there will always be vulnerabilities. The good news is that these are well-defined and controlled systems, and while criminals may attempt to exploit this predictability, they'll never understand our own systems better than we do, and that gives us the advantage. Any variance in behavior is a clue, and can be used to catch them in the act."

With a strong heritage in critical and federal systems infrastructure protection, and a focus on NERC CIP compliance, NitroSecurity recommends that asset owners assess current electronic security perimeters within the context of increasingly more sophisticated attacks. In order to properly secure critical systems, assume the worst -that all systems are fully reachable and vulnerable in multiple ways. As such, NitroSecurity recommends the following defensive best practices:

  • Circle Each Wagon - Add multiple layers of protection at all possible perimeters - placing firewalls and intrusion prevention systems at the thresholds between critical enclaves and non-critical business networks, as well as between those networks and the internet.
  • Cover Your Assets - Blend protections around each critical asset, adding intrusion detection capabilities inside of control systems, monitor all application and data activity and leverage newer technologies such as application data monitoring and whitelisting.
  • Enforce Conformity - Unlike more dynamic business networks, a control network's behavior is highly predictable. By centralizing the intelligence and information from all protection mechanisms, anomalies can be identified and addressed immediately with very few "false positives."

"In a perfect world, default settings wouldn't exist to be exploited, and all software would be perfect, but it's crazy to expect that in the real world," Knapp continued. "It's easy to see how control systems can be open to attacks, and it's easy to see why they might be targeted. Hopefully, Stuxnet will be a wake-up call, because the next volley in the cyberwar could hit even harder, and we need to be ready for it."

For more information on specifically combating Stuxnet and other emerging security issues, please visit http://siemblog.com/.

About NitroSecurity
NitroSecurity develops high-performance security information and event management (SIEM) solutions that protect critical information and infrastructure. NitroSecurity solutions reduce risk exposure and increase network and information availability by removing the scalability and performance limitations of security information management. Utilizing the industry's fastest analytical tools, NitroSecurity identifies, correlates and remediates threats in minutes instead of hours, allowing organizations to quickly mitigate risks to their information and infrastructure. NitroSecurity serves more than 500 organizations in the energy, healthcare, education, financial services, government, retail, hospitality and managed services industries. For more information, please visit http://www.nitrosecurity.com.

More Stories By Maggie Roth

Maggie Roth is an associate account executive at CHEN PR, a high-tech public relations firm based in Waltham, MA. CHEN PR understands that the effective practice of PR starts with insightful, expert counsel and ends with meticulous, well-orchestrated execution across all media, venues, and constituencies.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...