Dragos 2020 ICS Cybersecurity Year in Review
Dragos 2020 ICS Cybersecurity Year in Review
Dragos 2020 ICS Cybersecurity Year in Review
Contents
Introduction..............................................................................................................3
Key Highlights......................................................................................................... 4
In The Headlines.......................................................................................................5
Section One: ICS Threat Landscape........................................................................ 8
Key Updates on Existing Activity Groups.............................................................................. 10
2020’s New Activity Groups........................................................................................................11
STIBNITE..................................................................................................................................... 12
TALONITE................................................................................................................................... 13
KAMACITE..................................................................................................................................14
VANADINITE.............................................................................................................................. 15
Most Common TTPs Across All Industries.............................................................................16
Section Two: ICS Vulnerabilities............................................................................ 17
2020 Vulnerability Details...........................................................................................................19
2020 Vulnerability Severity......................................................................................................... 21
Actionable Guidance Missing in Most 2020 Advisories..................................................... 23
Severity Ratings of Vulnerabilities Remain Error-Prone.................................................... 25
Flaws in TCP/IP Stacks.................................................................................................................27
Vulnerabilities in VPN Appliances Facilitating Remote Work.......................................... 28
Section Three: Lessons Learned From the Front Lines........................................ 29
Visibility............................................................................................................................................ 31
Segmentation and Connections............................................................................................... 33
Cyber Readiness.............................................................................................................................37
Dragos Red Team......................................................................................................................... 39
Recommendations................................................................................................. 40
Increase OT Network Visibility................................................................................................. 40
Identify and Prioritize Crown Jewels........................................................................................ 41
Boost Incident Response Capabilities..................................................................................... 42
Validate Network Segmentation.............................................................................................. 43
Secure Credential Management...............................................................................................44
INTRODUCTION
1
The terms “ICS” and “OT” will be used interchangeably for the purpose of this report.
These terms are used differently in different communities.
KEY HIGHLIGHTS
Four new threat groups The abuse of valid
with the assessed accounts was the
motivation of targeting number one
ICS/OT were discovered, technique used
accounting for a 36% by named threats.
increase in known
groups.
IN THE HEADLINES
MITRE ATT&CK for ICS
MITRE introduced ATT&CK Ripple20, AMNESIA:33
for ICS in 2020 to codify and
communicate the unique threat
behaviors, or Tactics, Techniques, Third-party code integration can pose risks to
and Procedures (TTPs), that industrial operations. Many vendors do not track
ICS adversaries use against OT third-party code libraries, and therefore cannot
targets. This independent and accurately inform customers if their products
community-sourced framework are impacted. Vendors are beholden to software
provides a common lexicon manufacturers to release fixes for vulnerabilities
for categorizing ICS-specific that may impact thousands of products. For
TTPs to support reporting and example, security researchers disclosed multiple
further analysis. Dragos uses vulnerabilities in TCP/IP software libraries called
the framework internally and Ripple202 and AMNESIA:333 that potentially
continues to contribute to this impacted many ICS vendors. Example ICS devices
program and community resource. impacted include Programmable Logic Controllers
The Year in Review report (PLCs), Serial to Ethernet Converters, Protocol
leverages information from MITRE Converters, Remote Terminal Units (RTUs), digital
ATT&CK about observed activity protective relays, and some managed network
in ICS environments to help switches and routers. Most of the devices impacted
defenders mitigate threats to their by the vulnerabilities were not accurately identified
organizations. and did not have advisories released due to the
difficulty in understanding third-party code
adoption. Security design flaws in the impacted
EKANS
devices may make this collection of flaws
less relevant to adversaries, but the disclosure
highlights supply chain risks and complexity.
EKANS represents a specific threat to ICS because of its incorporation of potential process
and operational disruption features. This ransomware is capable of stopping ICS-related
Windows processes before initiating encryption. EKANS activity could produce an unstable
or physically disruptive situation by abruptly ending an operationally significant process.
The Dragos Intelligence team assesses EKANS is related to a previous strain of ransomware
called MEGACORTEX. Throughout 2020, Dragos identified new EKANS activity targeting
multiple verticals including electric, oil and gas, medical, pharmaceutical manufacturing, and
automotive. Public targets included Fresenius Kabi, a pharmaceutical division of the European
company Fresenius Group; global manufacturer Honda; and Italian energy company Enel.
2
https://www.jsof-tech.com/disclosures/ripple20/;
3
https://www.forescout.com/research-labs/amnesia33/
| ICS CYBERSECURITY YEAR IN REVIEW 2020
6
IN THE HEADLINES
U P P LY C H A I N
GLOB A L S
P R O M I S E
COM
Multiple ICS entities were impacted by a SolarWinds directly, and organizations were
massive supply chain compromise first unaware they had it in their environments.
revealed in December 2020.4 Adversaries More commonly though, many integrators,
compromised SolarWinds Orion business support contracts, and ICS suppliers
software to distribute malware. The use software, including SolarWinds, as
adversary had unfettered access for more white-labeled solutions. This means the
than 14 months and is thought to now product is in place but under a different
have access to other supply chain access name. Suppliers may use the software
points throughout the community. themselves on behalf of the client where the
Identifying SolarWinds in ICS compromised SolarWinds software was not
environments was challenging. To in the end-users ICS network. The software
respond appropriately, facilities required may have been present in the supplier or
accurate asset lists, software version integrator’s network and used in the end-
information, and network monitoring user’s networks across direct connections
to identity post-exploitation activity. or maintenance links. SolarWinds often
Dragos investigated numerous confirmed has access directly to the control level
compromises. The investigations reverted in ICS networks which would allow an
to limited host-based analysis and could adversary to not only have access to these
only capture days or weeks in analysis. In environments, but direct control of them.
an ICS network where not all endpoints Many organizations that did not believe they
can have robust host logging and in were impacted were compromised directly
compromises where adversaries leverage or accessed from compromised networks
the network extensively, it is preferred to due to third-parties.
have network traffic analysis and logging. Dragos is aware of at least two global
Given the current lack of visibility in ICS Original Equipment Manufacturers
industrial networks the assessment of (OEMs) that were using the compromised
SolarWinds’ compromise impact is likely SolarWinds software across maintenance
to not be fully understood for years. links into ICS networks, including where
In some cases plant personnel purchased there was turbine control software.5
4
https://www.dragos.com/blog/industry-news/responding-to-solarwinds-compromise-in-industrial-environments/;
5
Dragos attempted to inform both OEMs and eventually leveraged government organizations to ensure that the risk was understood.
IN THE HEADLINES
ICS Threat
Landscape
9
INTRODUCTION
Cyber risk to industrial sectors has grown and accelerated dramatically, led by ransomware
impacting industrial processes, intrusions enabling information gathering and process
information theft, and new activity from adversaries targeting ICS. Dragos emphasizes
the importance of understanding how adversaries steal information and gain access
to better prepare for adversary behavior in the future. Adversaries often build programs
and campaigns slowly over time, with later campaigns often being more successful and
disruptive due to previous efforts.
Some threats tracked by Dragos may proliferate into disruptive and destructive capabilities
later, though no such activity is observed at this time. For example, the team would track
a threat that was explicitly targeting electric companies with theming toward engineers,
engineering projects, or electric operations, though there may be limited or no visibility to
confirm if the adversary gained access to ICS networks. The team would not track a threat if
it was simply trying to gain access to an electric company. The fundamental assessment of
threats tracked by Dragos is that they are explicitly trying to gain access to ICS networks and
operations or are successful in achieving access.
These types of events, where adversaries gain access to ICS networks but do not have the
intention of currently disrupting them, are much more common than is publicly reported.
The threats are learning ICS. Although not every compromise will relate to an impact today,
many may inform the attacks of the future. Dragos tracks 15 threat Activity Groups, or threat
groups,6 with four of the groups discovered in 2020. Threats are growing at a rate three
times faster than they are going dormant.7 This is likely due to the increased investment
made by adversaries in targeting ICS over the last five to 10 years, and whose investment
will continue to accelerate the ICS threat environment.
Key Updates on
Existing Activity Groups
Throughout 2020, the 11 Activity Groups
identified prior to 2020 remained active
against industrial organizations. While
already covered in previous Year in Review
reports, the following key activities occurred
in 2020 that are worth noting:
In April, new DTrack malware emerged with the ability to communicate with Fujitsu
Systemwalker management software utilized in distributed computing and data
center management operations. Dragos associated this activity with the energy-
targeting group WASSONITE. Interaction with this type of software can significantly
impact data center and computational environments resulting in potential ICS or
broader operational impacts.
STIBNITE TALONITE
KAMACITE VANADINITE
8
https://www.wsj.com/articles/armenia-azerbaijan-conflict-11601325097 square ICS square Enterprise
COLLECTION
T1113 Screen Capture
T1005 Data from Local System
9
For more public information on these malware families reference Proofpoint’s reporting here:
https://www.proofpoint.com/us/threat-insight/post/lookback-malware-targets-united-states-utilities-sector-
phishing-attacks square ICS square Enterprise
10
It is common for the information security community to look at threat group names as names, when in reality they are
T0885 Commonly Used Ports
definitions. Sandworm is tracked by FireEye. While links can be seen to others’ groups, the definition, collection efforts,
and analysis of the FireEye analysts are distinct from those at Dragos and proprietary. Dragos decided to start tracking T0884 Connection Proxies
KAMACITE, associated with a link to Sandworm, upon new activity and unique collection emerging in 2020. 11 Dragos
has unique visibility and tracks intrusions that are still active as of this past year. Dragos tracks KAMACITE separately
from Sandworm activity. Dragos is not attempting to rename Sandworm, but is merely organizing the ICS activity square ICS square Enterprise
explicitly to support the development of defenses against this group.
| ICS CYBERSECURITY YEAR IN REVIEW 2020
15
Target Geography
VANADINITE
LATERAL MOVEMENT
T1078 Valid Accounts
13
12
11
10
9
8
7
Spearphishing Attachment
6
Standard Application
5
Valid Accounts
Layer Protocol
4
Supply Chain
Compromise
3
Scripting
2
1
T0859 T0865 T0853 T0869 T0862
ICS Vulnerabilities
18
INTRODUCTION
21% 23%
networking communication
equipment, VPNs, data historians, or
firewalls commonly deployed in ICS
networks. This number is up from
21 percent in 2019. ICS-targeting
adversaries, including VANADINITE
and PARISITE, have historically
leveraged such vulnerabilities for
initial access to target environments
and pose a risk to industrial operators.
These vulnerabilities are of particular
interest, as they can provide
immediate access to the ICS networks
bypassing enterprise security controls. 2019 2020
12
https://en.wikipedia.org/wiki/Purdue_Enterprise_Reference_Architecture
Immediate Action
A far-reaching threat or vulnerability calling for action broadly
across at least one industry.
Limited Threat
A limited threat, risk, or vulnerability requiring an applicability
assessment before taking action.
Possible Threat
Threat scenarios, research, and vulnerabilities relating to
operations but not requiring direct/immediate action.
No Action Required
Items of interest but likely requiring no action except in unique
threat models.
Hype
A story or vulnerability receiving coverage but not yet worth the
attention of operators.
Frequently, vendors will not provide advice to asset owners and operators if they
are unable to patch the identified vulnerability. Dragos identified 61 percent of
advisories contained a patch to fix the vulnerability, but no alternative mitigation if
patching was not an option.
26+74+B 22+78+B
Announced Announced
26% 22%
OF THOSE OF THOSE
Advisories that Advisories that
had no Practical had no Practical
2019 Mitigation Advice
2020 Mitigation Advice
76% 64%
74% 78%
OF THOSE OF THOSE
had a patch had a patch
Advisories that Advisories that
had no Alternate had no Alternate
Mitigation Mitigation
55% 61%
80%
50%
40%
30%
20%
10%
Severity Ratings of
Vulnerabilities Remain
Error-Prone
By Advisory By CVE
Advisories with (Error Rate)
Incorrect Data 43% Individual CVEs
2020
Contained Errors
33%
30% 2020
2019
19%
2019
1%
Identical Score
but Different
Exploitation Vector
By CVE
9% 24%
Devices that use third-party protocol stacks are often deeply embedded
systems. Exploitation requires understanding the Central Processing
Unit (CPU) architecture, memory layout, and hardware connections
of the vulnerable device. Developing a working exploit requires a deep
understanding of embedded systems. Once an exploit is developed, it
may not even function on the same product if, for example, the product
undergoes a hardware revision.
Fundamentally, these vulnerabilities are not a high risk for the industrial
sector. In the industrial space, embedded systems are still most often
“insecure by design,” or lacking some security protections. An example of
this is the APC Uninterruptible Power Supply (UPS) susceptibility to the
Ripple20 vulnerabilities. The researchers of the vulnerabilities developed
a working exploit for CVE-2020-11901 against the UPS, which could result
in shutting off the UPS. However, the UPS speaks an industrial protocol
called BACnet that lacks basic security protections. According to the
device instruction manual, and verified by Dragos, a BACnet control
point can be used to achieve the same effect using freely available tools.
Vulnerabilities
in VPN
Appliances
Facilitating
Remote Work
Several VPN appliance vulnerabilities were disclosed and fixed in 2020. These include
issues in non-industrial appliances that Dragos tracks and models that are specifically
marketed toward industrial customers. In 2020, Dragos tracked 13 advisories that
include VPN software and hardware commonly used in industrial environments and
gateways with optional VPN features. Impacted devices include Palo Alto Networks
Global Protect VPN client, Citrix Application Delivery Controller and Netscaler, and ICS-
specific VPN services Ewon, Cosy, and Flexy.
Enterprise VPN appliances are often used by industrial operators to provide remote
access to corporate and operations networks. Some OEMs provide VPN access
specifically for their ICS equipment, restricting connections or lateral movement to the
rest of the OT network. Many of these products are identified as belonging to utilities
via the popular search engine Shodan. Vulnerabilities in these products should be
remediated quickly.
End users should determine the exposure of VPN appliances. Industrial-specific VPN
appliances may provide direct access to process control systems. These devices are best
secured by using them in “client” mode where they may connect to a central server. The
central server may be hardened to prevent site-to-site communications between field
sites, and to monitor for suspicious behavior originating from field sites.
Lessons Learned
From The
Front
Lines
30
INTRODUCTION
For the last two decades, the prevailing strategies for safeguarding
ICS were focused on protecting the perimeter, preventative security
countermeasures, and internal segmentation. In that time, standards,
regulations, and best practices codified these methods. Other
focuses, such as detection, response, and recovery were included
but without equal emphasis or examples. The disparity has left
industrial organizations underdeveloped in these core capabilities in
an understandable, yet undesirable, situation. In general, the industry
lacks visibility into their ICS assets and activities, hampering the overall
cyber readiness and ability to understand and manage cyber risk.
These themes are confirmed based upon analysis of Dragos service
engagements in 2020.
• ARCHITECTURAL REVIEWS
• VULNERABILITY ASSESSMENTS
• PENETRATION TESTS
• TABLE TOP EXERCISES
• INCIDENT RESPONSE (IR)
Visibility
Over the course of the year, Dragos found
that 90 percent of its services customers
had limited to no visibility into their
ICS environments. While most clients
demonstrated a focus on an enhanced asset
inventory, this effort is only the foundation
for asset visibility. Many customers only
monitored the IT to OT boundary without
monitoring activity inside the ICS network.
Network analysts were blind to critical
network traffic. Some collected logs,
but few utilized centralized logging to
correlate various segments with network
traffic analysis. These steps are critical for
developing a full picture of what occurred
across industrial assets and sites.
100%
90%
90%
81% 2019
2020
80%
70%
60%
50%
40%
30%
20%
10%
Dragos’s incident response cases for 2020 provide further support for this lack
of visibility because none of them were augmented with any centralized or
automated host and network traffic logging. This significantly slows down the
incident response process, and in multiple cases, means that the asset owner or
operator is not able to get critical questions answered. In at least one case, the
impact led to public reporting without an understanding of root cause analysis
where cyber activity was heavily suspected, but no evidence was available.
2019 2020
Segmentation
and Connections
Although asset owners and operators Engagements Exhibiting
71+29+M
follow many of the best practices and Poor Security Perimeters
their applicable regulation, Dragos
71%
continues to observe instances of poor
segmentation with unexpected or
unknown connections from the ICS
network. About 88 percent of Dragos
services engagements involved significant
issues with network segmentation.
Examples of observations contributing
2019
to this statistic include flat networks,
where the only segmentation is the initial
firewall between the IT-OT boundary, and
88+12+M
unnecessary communication pathways
to critical assets within the network. To
further illustrate the incidence of poor
segmentation, consider that adversaries
accessed ICS networks directly from the
88%
internet in 100 percent of Dragos’s 2020
incident response cases. These findings
are directly related to the previous statistic
of 90 percent of organizations that lacked
OT visibility. Identifying architecture
2020
bypasses and rogue connections and
devices is nearly impossible without
visibility through network monitoring.
Organizations
that Lacked 54% 54%
Separate IT 2019 2020
and OT User
Management
100%
2019 100%
90%
80%
70%
60%
50%
33% 40%
2020
30%
20%
10%
2019 90%
2020 100%
Cyber Readiness
In 2020, Dragos conducted several tabletop Organizations that did not have
exercises and incident response readiness Defined IRP Ready to Test
workshops. The findings and outcomes of these
engagements further illustrate the industry’s
deep-seated, over-reliance on prevention and •• •• •• •• •• •• •• •• •• ••
the necessity of strengthening the pillars of
a successful ICS cyber strategy; detection, •• •• •• •• •• •• •• •• •• ••
response, and recovery.
•• •• •• •• •• •• •• •• •• ••
Dragos observed that 75 percent of clients did
•• •• •• •• •• •• •• •• •• ••
•• •• •• •• •• •• •• •• •• ••
not have clearly defined incident declaration
thresholds or categories of severity within
response plans. Detecting threat behaviors and
analyzing correlated datasets are generally the 75%
first steps an organization takes to recognize
an incident. The threshold for declaring an
incident depends on many factors including
threats, tactics, operational risk requirements,
governing laws, and industry regulations.
Once incidents were declared, incident
managers were often observed by Dragos to
have no documented guidance or playbook
for how to employ resources or capabilities.
Nearly 60 percent of organizations did not Organizations that had
have a solidified Incident Response Plan (IRP). a Solidified
Incident managers were often left to create
tactical response plans in real-time and in the
IRP Ready 58%
to Test 2020
middle of rapid escalations. In 2020, Dragos
observed that 75 percent of 2020 clients did not
have clearly defined or documented incident 33%
declaration thresholds or categories of severity 2019
available during activation of their incident
response plans.
•• •• •• •• •• •• •• •• •• ••
to communicate. Lack of effective communication
during a crisis can lead to inadequate resource
allocation, compound risks to assets and
personnel, and create lingering effects on bottom- •• •• •• •• •• •• •• •• •• ••
line operations. The periodic testing of IRPs can
act as a roadmap for corporate leadership to •• •• •• •• •• •• •• •• •• ••
convey strategic directives and objectives to an
incident response team. 100 percent of Dragos 62%
exercise participants strongly agree that exercises
are beneficial to long-term incident response
preparation and are a valuable way to identify areas
of improvement for industrial cybersecurity IRPs. Organizations that had
Difficulty Understanding
when to Declare an
Incident
83%
Dragos
2019 75%
customers 2020
who Agree
Tabletop
Exercises are
Beneficial to
IRPs
100%
of real-world
findings from Dragos Resulted in situations
penetration testing where the team could
engagements: have made changes in
• Executed the controller logic
propagation of malicious
85%
logic file updates from Remaining 15%
one asset to the entire that Detected Red Team
deployment. Activity in 2020
2020
0%
• Identified a Zero Day Dragos Customers’
exploit to remotely
execute arbitrary code
Detection Capabilities
Ineffective in 76%
as a read-only user on Preventing Dragos 2019
a Crown Jewel Human Red Team from • detected activity
Accessing Crown in real-time
Machine Interface (HMI). Jewels • deterred lateral
• Discovered hard-coded movement to
credentials on an ICS that other critical
monitors Crown Jewels. systems
12
https://www.dragos.com/resource/dependency-modeling-for-identifying-cybersecurity-crown-jewels-in-an-ics-environment/
Recommendations
As organizations strategize a path forward, Dragos recommends five key OT cybersecurity
initiatives to improve on in 2021 and beyond. These are based on the empirical evidence provided
throughout the report.
Dragos has included a graphic below each recommendation as a reference for asset owners
looking to implement the top five the recommendations of 2020. The recommendations listed
on the right are in descending order according to priority. Each recommendation has three or
more actions that may help asset owners achieve the desired goal of the recommendation. These
actions are numbered with the positive impact on that recommendation.
1
The top five recommendations to enhance the security of an ICS environment are:
Increase OT
Network Visibility
Visibility includes network monitoring, logging, and
maintaining a Collection Management Framework
(CMF).
NETWORK ASSET
MONITORING INVENTORY
1 2
HELP ACHIEVE
HOST/NETWORK COLLECTION INCREASE OT
TRAFFIC LOG MANAGEMENT VISIBILITY
AGGREGATION FRAMEWORK
3 4
Crown Jewels are those assets that exercise control over the components
most critical to the safe operation of the industrial process. Examples include
HMIs, engineering and operator workstations, gateways, and controllers.
3 Boost Incident
Response Capabilities
Incident response refers to an organization’s
approach for handling cybersecurity incidents.
COLLECTION
ASSET
MANAGEMENT
INVENTORY
FRAMEWORK
1 2
HELP ACHIEVE
HOST/NETWORK TABLETOP
TRAFFIC LOG BOOST IR
EXERCISES
AGGREGATION CAPABILITIES
3 4
4 Validate Network
Segmentation
This includes issues like weak segmentation
between IT and OT networks, permissive
firewall rulesets, and externally routable
network connections.
5 Secure Credential
Management
This includes accounts shared between IT and
OT, default accounts, and vendor accounts.
AD shared between the enterprise and ICS
networks is one of the most common findings
that should be mitigated.
ASSET SEPARATE AD
INVENTORY INFRASTRUCTURE
1 2
HELP ACHIEVE
RED/PURPLE SECURE
TEAM CREDENTIAL
MANAGEMENT
3
Dragos.com