MITRE Att&ck, which stands for Adversarial Tactics, Techniques and Common Knowledge, is a knowledge base of adversary tactics and techniques that help inform the cybersecurity industry. MITRE recently released an Att&ck knowledge base specifically designed for industrial control systems (ICS). ICS are found in industries such as electric, water, wastewater, oil and natural gas, transportation, chemical, pharmaceutical, and various manufacturing sectors. These systems enable the regular automation of key processes that everyone relies on, and any compromise on their operation could impact the health and safety of humans.
According to the MITRE Att&ck document, adversary TTPs associated with ATT&CK for ICS fall under the following broad categories:
• Blocked or delayed flow of information through ICS networks, which could disrupt ICS operation.
• Unauthorized changes to instructions, commands, or alarm thresholds, which could damage, disable, or shut down equipment, create environmental impacts, and/or endanger human life.
• Inaccurate information sent to system operators, either to disguise unauthorized changes, or to cause the operators to initiate inappropriate actions, which could have broad negative effects.
• ICS software or configuration settings modified, or ICS software infected with malware, which could have broad negative effects.
• Interference with the operation of equipment protection systems, which could endanger costly and difficult-to-replace equipment.
• Interference with the operation of safety systems, which could endanger human life.
Next in this blog series, we will detail Network Service Scanning. The aim is to help you understand the MITRE Att&ck walk-through, and their mitigation techniques, as well as offer our own insight.
How It's Done:
Network service scanning involves discovering services on networked systems, via port scanning or probing. Port scanning is a technique used to identify open ports and services on a host network. It detects which ports are open, closed or filtered by a firewall by interacting with the TCP/IP ports on a system. Depending on the specific port numbers detected, the service behind the port can often be determined.
The Triton and PLC-Blaster attacks serve as prime examples of this technique being utilized, as adversaries often probe for specific ports with various tools.
Recommended Mitigation Techniques:
Your systems should work, and your network should be protected with the strongest security possible. With Dispel, protect your network with Moving Target Defense.
Ask us questions or get your demo at https://dispel.io