Key Takeaway
Iranian-linked hackers target ICS and SCADA systems in U.S. critical infrastructure. APT33 exploits CVEs to disrupt operations in sectors like energy and transportation.
What Happened
Iran-linked threat actors have been identified in a series of attacks targeting Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems in critical infrastructure sectors within the United States. These activities have been ongoing for several months, with a noticeable increase in frequency and sophistication. The attackers are leveraging custom malware to infiltrate and manipulate Programmable Logic Controllers (PLCs), aiming to cause operational disruptions.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory detailing the tactics, techniques, and procedures (TTPs) observed in these attacks. Critical infrastructure sectors such as energy, water, and transportation have been identified as primary targets. The Iranian-backed group, known as APT33 (also known as Elfin or Refined Kitten), is believed to be behind these intrusions.
Technical Details
The attack vector involves the deployment of tailored malware that manipulates PLCs, targeting ICS and SCADA environments, which are crucial for the automated control of industrial processes. APT33 is employing credential harvesting and phishing campaigns to gain initial access. After infiltrating the network, attackers use lateral movement techniques to reach critical systems, where custom payloads are deployed to manipulate operational processes.
Notable Common Vulnerabilities and Exposures (CVEs) exploited by the group include CVE-2021-33044 and CVE-2021-22986, affecting certain SCADA and ICS platforms with CVSS scores of 9.8, denoting the high severity of these vulnerabilities. Malware indicators include unusual network traffic patterns to and from foreign IP addresses, process anomalies within control systems, and unauthorized configuration changes in PLCs.
Impact
Organizations within the energy, water, and transportation sectors are at significant risk due to the potential operational disruptions these attacks can cause. The threat extends to both the physical and digital domains, with attackers capable of altering industrial processes, posing threats to safety and operational integrity.
Beyond operational disruptions, the attacks threaten economic stability and public safety, with potential downstream effects including service outages, infrastructural damage, and an inadvertent cascade effect on related sectors. The U.S. government has heightened its call for vigilance and immediate action from all organizations that manage and operate critical infrastructure.
What To Do
- Conduct comprehensive reviews of existing ICS and SCADA security measures to identify and patch vulnerabilities in line with CVEs of interest.
- Implement network segmentation to isolate ICS networks from traditional IT environments, reducing the risk of lateral movement by threat actors.
- Utilize multi-factor authentication (MFA) to strengthen access controls and reduce the risk of credential theft.
- Deploy continuous monitoring solutions for detecting anomalies in network traffic and system processes, enabling rapid response.
- Conduct regular security awareness training for staff, specifically tailored towards recognizing and reporting phishing attempts.
Organizations must prioritize these actions to enhance their resilience against current and evolving threats. Collaboration with governmental bodies and leveraging threat intelligence sharing platforms can provide additional support in threat detection and incident response. Security operations teams should remain vigilant and proactively update defense measures to mitigate the risk posed by these advanced persistent threats.
Related:
Original Source
SecurityWeek →Related Articles
New Cyberattacks Linked to APT35 Targeting Critical Infrastructure
APT35, an Iranian APT group, has launched a targeted cyberattack campaign against critical infrastructure sectors in the US and Europe. Using spear phishing and exploiting vulnerabilities like CVE-2023-31821, they have affected multiple organizations in the energy and telecommunications industries.
Iranian-Linked Hackers Target U.S. Critical Infrastructure with PLC Exploits
An Iranian-linked cyberattack campaign targeted U.S. critical infrastructure by exploiting PLC vulnerabilities in Rockwell Automation products. These attacks focus on energy and utility networks, aiming for unauthorized access and potential system disruption.
North Korea's Lazarus Group Targets Cryptocurrency with Strike on Financial Sector
The Lazarus Group has targeted the cryptocurrency sector in a campaign exploiting vulnerabilities like CVE-2023-23397, aiming to steal digital assets. Defense strategies include patch management, zero trust, and phishing awareness.
Chinese APT Exploits Zero-Day Vulnerability in Critical Infrastructure Attack
APT41, a Chinese state-sponsored group, utilized a zero-day vulnerability to target critical infrastructure in North America and Europe. The attack compromised Siemens SIMATIC PLCs, impacting energy sectors. Organizations must enhance patching, monitoring, and adopt zero trust principles to defend against similar threats.