Critical Infrastructure: A Flashing Beacon For Cybercrime

In May of 2021, Colonial Pipeline, the largest pipeline system for refined oil products in the US, suffered a damaging cyberattack. The breach, a result of a vulnerable VPN password, caused the company to close down operations for a number of days, resulting in oil shortages on the East Coast. This is just one example of how devastating an attack on a critical industry can be.  
 
The UK government states there are thirteen sectors that come under the umbrella term ‘critical infrastructure’ including, chemicals, civil nuclear, communications, defense, emergency services, energy, finance, food, government, health, space, transportation, and water. All of these, which provide services that are essential to the day-to-day functioning of society, are hives of the most sensitive and confidential data that threat actors can easily be monetised on the Dark Web, driving further cybercrime and disruption.  
 
Unfortunately, the potential for widespread disruption has not gone unnoticed by cybercriminals. In fact, the US  Cybersecurity and Infrastructure Security Agency has urged the UK to act rapidly, warning that its government could be the victim of a 9/11 style cyberattack. This year also saw cybersecurity authorities in Australia, Canada, New Zealand, US and UK pleading for critical infrastructure defenders to prepare for an escalation in cyberattacks after the war between Russia and Ukraine.  
 
This increased risk has already been felt across the world with various national and public bodies being targeted, from governments in Cuba and Peru to water companies such as South Staffordshire Water as well as Denmark’s largest train operator and the NHS, which was impacted by a supply chain attack. With heightened political tensions across the globe, the potential for another attack on our critical infrastructure is not just concerning but highly likely. So, let’s take a look at what the current threat landscape looks like and how companies, as well as government agencies, can better protect themselves.  
 
Why Are Critical Industries More At Risk? 

This focus on critical infrastructure is intentional. Cybercriminals are fully aware of the impact that any disruption has on vital services, not just financially but also on public confidence. For example, in utilities, you cannot expect people to be without electricity or water, which means companies are more likely to pay in the event of ransomware. Hackers are also very observant and will strike during periods of unrest, for example using the ongoing energy crisis as an entry point for phishing or man-in-the-middle attacks.  
 
Another common risk factor among critical infrastructure organizations is that they all have a high level of interconnected legacy tech. This could include old devices that may not be used every day but are still active, or a machine that is critical to business processes but can only operate on older software that can’t be patched. Much of this legacy, although residing on our managed networks, does not sit within the ownership of our digital and security teams. It is true that some industries are more dependent than others, such as utilities, but everyone has their own battle to overcome.  
 
By not having a cohesive understanding of their technology estate, it makes it much harder for these industries to implement a holistic security strategy and also provides hackers with more ways to gain access to the wider network.  
 
Is Increased Connectivity The Problem? 

This problem has been exacerbated by the introduction of IoT devices which are incredibly complex to manage and are rarely built with security in mind. As companies collect more data and expand their network infrastructures, the more attractive they become to hackers and the harder it is to defend against threats.   
It’s vital that past experiences such as the Colonial Pipeline are not forgotten, but instead used to fuel next steps. While increased connectivity does widen the attack surface and make it more difficult to manage, there are technologies that help secure IoT devices against new threats and make this transition period smoother. 
 
It's important that we don’t stand in the way of technological progress. If we look at the transportation industry, when we board a plane, we have no idea whether a pilot is in control or if it is just on autopilot. But we still go on holiday and travel with confidence. It is possible to build the same level of trust when it comes to advances in driverless cars, despite their increased connectivity and reliance on IT. To get there, manufacturers need to be building security into these products. If things are designed with security in mind, they are less likely to get breached. This is a transferable message that needs to underpin every new decision, in every sector but especially critical infrastructure.  
 
Securing Our Future 

Many organizations are good with risk management but are missing the end-to-end cyber strategy that covers everything from employee engagement and BYOD security to firewall management and anti-malware protection.

Missing any one element can create vulnerabilities with damaging consequences. What is the takeaway from this? I think there are four key elements: 

1.    Communication is key:   You are only as strong as your weakest link so it’s crucial that there is an open dialogue within a company from the boardroom to the IT department. Any device that has access to the company network can allow hackers to gain access if it’s not properly managed. The problem is multiplied by the shift to home and hybrid working so organizations should be talking with employees and educating them on how to stay secure.   

2.    Visibility and segmentation:   It’s impossible to successfully secure a network without understanding the assets within it. Taking a full inventory, including cloud assets and data stores, will expose any weaknesses such as unpatched security updates or devices that have outdated firmware. Once you have mapped the network you can then implement strategies such as segmentation, which creates virtual internal barriers that stop hackers from moving laterally and creating widespread damage.  

3.    CISOs need to do their part:   The role of a CISO is to make sure that the board has greater understanding of the risks facing a business. Your job is to influence and make it clear to them in language they understand. This means spelling out the business consequences of weak security. There is a general lack of communication between CISOs and the wider business, and that needs to change in order to better secure our critical services.  

4.    Need for an overarching authority:   As we look at the challenges facing critical infrastructures, it's clear that companies in all sectors need to elevate their cybersecurity programs. But they cannot do it on their own. We need a unified regulatory body that can help these sectors implement standard practices. This will reduce disparities in cybersecurity spending, for example across energy and water.  
 
In the UK, our critical infrastructure is a bright flashing beacon attracting cybercriminals far and wide. The threat level continues to grow, and the consequences only become more severe. Now is the time to take action and prevention should be at the heart of every step they take to better secure themselves.  

Deryck Mitchelson is Field CISO EMEA at Check Point Software 

You Might Also Read:

Resilience Is Essential To Protecting Critical Infrastructure:

 

« US Bans Government Users From Using TikTok
IT Downtime Is Growing As Digital Transformation Speeds Up »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Omerta IT

Omerta IT

Omerta IT help you protect your organisation by helping ensure you have the best IT Security professionals working for you.

InfoSec World

InfoSec World

InfoSec World conference and expo covers all aspects of information security with a broad agenda of sessions on key security issues.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

GE Digital

GE Digital

GE Digital is a leading software company for the Industrial Internet. Products include Industrial Cyber Security for Operational Technology (OT).

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

AEC

AEC

AEC is a provider of information security products and services including risk analysis, penetration testing and the implementation of security solutions.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Mvine

Mvine

Mvine's primary business is authoring and selling Cyber-Secure Platforms for Collaboration Portals and for Identity Management as well as delivering cloud support services.

ENLIGHTENi

ENLIGHTENi

ENLIGHTENi are the platform to develop next-gen talent in Technology, Risk, and Cybersecurity. Our mission is to develop next-gen talent through challenge-based learning and team collaboration.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

Jump Capital

Jump Capital

Jump provides series A and B capital to data-driven tech companies within the FinTech, IT & Data Infrastructure, B2B SaaS and Media sectors.

PixelPlex

PixelPlex

PixelPlex is a blockchain and custom software development company with offices and developers in New York, Geneva, and Seoul.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

Cylab - Carnegie Mellon University

Cylab - Carnegie Mellon University

Carnegie Mellon University CyLab is the University's security and privacy research institute.