Read this important advisory from CISA regarding Operational Technology and Industrial Control Systems vulnerabilities. #ICSsecurity #OTsecurity
🚨CISA released an alert warning that bad actors continue to exploit OT and industrial systems using unsophisticated means. It’s an important message for anyone in ICS security since much of the exploitation they’re seeing is preventable with relatively simple fixes. Though ICS, of course, has a slew of unique challenges that can be a barrier to implementation. The alert notes that “Exposed and vulnerable OT/ICS systems may allow cyber threat actors to use default credentials, conduct brute force attacks, or use other unsophisticated methods to access these devices and cause harm.” They urged operators to implement the recommendations in the CISA resource Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity. Here are a few key recommendations from the CISA resource: ⚠️“Disconnect all HMIs, such as the touchscreens used to monitor or make changes to the system, or programmable logic controllers (PLCs), from the public-facing internet. If remote access is necessary, implement a firewall and/or virtual private network (VPN) with a strong password and multifactor authentication to control device access.” ⚠️“Implement multifactor authentication for all access to the OT network.” (For additional information, see CISA’s More than a Password resource). ⚠️“Immediately change all default and weak passwords on HMIs and use a strong, unique password. Ensure the factory default password is not in use. Open the remote settings panel to confirm the old password is no longer shown.” ⚠️“Keep VNC updated with the latest version available and ensure all systems and software are up to date with patches and necessary security updates.” ⚠️“Establish an allowlist that permits only authorized device IP addresses. The allowlist can be refined to specific times of the day to further obstruct malicious threat actor activity; organizations are encouraged to establish alerting for monitoring access attempts.” ⚠️“Log remote logins to HMIs, taking note of any failed attempts and unusual times.” See the alert on CISA’s Cybersecurity Alerts and Advisories page (separate from their News page): Threat Actors Continue to Exploit OT/ICS through Unsophisticated Means SEP 25, 2024 - Alert
CMO | Cybersecurity Expert | B2B Technology Executive
1moDirect link to CISA's advisory: https://www.cisa.gov/news-events/alerts/2024/09/25/threat-actors-continue-exploit-otics-through-unsophisticated-means