Connect with us

Cyber Security

Kaspersky Industrial Cybersecurity Now Delivers EDR

Published

on

With new EDR functionality in Kaspersky Industrial CyberSecurity, customers can now gain instant visibility on operational technology (OT) security incidents and run response actions. The solution also helps reveal hidden weaknesses in networks, be it vulnerabilities, misconfigurations, or incompliance with policies and regulations. With the new features of active polling and a physical topology map, organizations can see even more of the assets in their OT network and how they interconnect. These new capabilities and the deeper integration of Kaspersky Industrial CyberSecurity for Nodes and Kaspersky Industrial CyberSecurity for Networks greatly enhance the OT visibility and control, compliance, and threat protection.

IT and OT convergence bring a growing number of connections, equipment, and services to industrial organizations. Maintaining control, availability, security, and compliance will require a new generation of dedicated cybersecurity solutions. According to IDC Worldwide IT/OT Convergence 2022 Predictions, by 2024, 30% of industrial enterprises will incorporate centralized security management tools to bridge the IT/OT gap. The renewed Kaspersky Industrial CyberSecurity platform comes alongside this trend.

With EDR in Kaspersky Industrial CyberSecurity for Nodes, a cybersecurity team can track malicious activity, analyze the root cause through attack spread path visualization, and run response actions on SCADA computers and operator workstations. The product provides a wide range of response actions that do not impact the industrial process unless there is explicit operator intervention, including quarantining or removing a malicious object, prohibition running a malicious process in the future, and so on. To ensure the threat does not spread to other machines, security specialists can create indicators of compromise (IoCs) or artifacts to indicate a system has been breached and run a cross-endpoint response based on these IoCs.

The EDR functionality is delivered as part of KICS for Nodes without the need to install additional hardware. It works on any operating system, including Windows XP, and is optimal for industrial networks as it doesn’t overload them with traffic and has no impact on ICS hosts. On top of this, it doesn’t require any specific skills from IT or OT security administrators.

With Kaspersky Industrial CyberSecurity for Networks, customers can implement a risk-oriented approach to cybersecurity. The product can now detect weaknesses that can potentially put OT integrity at risk or cause technology process disruption. The areas covered include vulnerable network architecture (access to external networks, lack of segmentation, multi-homed devices); weak host security settings (open ports, lack of authorization, disabled firewalls); obsolete, vulnerable, unwanted, unencrypted protocols, and anomalies in network protocols; outdated OS; unauthorized devices; and vulnerabilities in the PLCs. All risks are scored for severity in the management console, so security teams can focus on the most critical ones first.

The updated Kaspersky Industrial CyberSecurity for Nodes is able to automatically audit OT hosts or a group of hosts for vulnerabilities in the software, misconfigurations, and compliance with local or international regulations and corporate policies. The product uses open vulnerability and assessment language (OVAL) content to assess hosts. By default, the product provides a SCADA vulnerability database from Kaspersky ICS-CERT in OVAL format. Any OVAL database can be used, be it the NIST, CIS, or other regulations or custom samples.

Network and device visibility is enhanced thanks to active polling and the industrial network physical topology map in Kaspersky Industrial CyberSecurity for Networks. Active polling helps to identify assets in OT systems and their configuration, while a topology map visualizes the network architecture: how assets are physically connected and communicate with each other. With this data, OT operators or security teams can quickly understand elements such as where in the network a problem occurs and to what physical object in the production area it refers, allowing them to fix it faster.

Kaspersky Industrial CyberSecurity for Nodes also gives OT security experts a portable USB scanner to use on machines for which policies restrict the installation of any software, including cybersecurity products. These can be old endpoints with outdated software or those that are too critical to install something on them. Another use case is subcontractors’ equipment, which they may use inside the customer’s OT network. OT security specialists can use a simple USB flash drive to download the scanner from KICS for Nodes and then use it to scan the isolated machine. The scanner doesn’t install anything on the machine but provides information about any threats found on it, so security teams can plan the necessary actions.

As a platform, Kaspersky Industrial CyberSecurity also ensures native integration of all its components, including KICS for Nodes for Windows and Linux, KICS for Networks, and orchestration through a single management platform. Deeper integration of KICS for Nodes and KICS for Networks enables network alerts enriched with data about a host, its processes, and under which user it was launched. IT/OT security teams, SOC analysts, and SCADA operators now have more visibility over suspicious actions as a result and can make informed decisions about response actions.

“With this update, we are empowering our customers with a risk-oriented and compliance-oriented OT security management platform. Kaspersky Industrial CyberSecurity shines the light on incidents and hidden vulnerabilities, misconfigurations, and other weaknesses to minimize the risk of disruption to critical industrial processes. Along with corporate cybersecurity products, Kaspersky Industrial Cybersecurity is a crucial element of the ecosystem for industrial organizations to protect their assets from any threat vector, whether it exploits IT or OT. And through the native integration of all components in the ecosystem, and with a single management platform, we are gradually implementing the extended detection and response (XDR) concept for industrial cybersecurity in our portfolio,” commented Andrey Strelkov, Senior Product Manager at Kaspersky.

Cyber Security

FortiGuard Labs Contributes to INTERPOL Multinational Cybercrime Suppression Operation in Africa

Published

on

Sharing threat intelligence and working with other threat intelligence organizations improves protections for customers and enhances the effectiveness of the entire cybersecurity industry.

Recently, FortiGuard Labs provided evidentiary support to INTERPOL and African Member countries as part of the Africa Cyber Surge Operation (ASCO) to help detect, investigate, and disrupt cybercrime through coordinated law enforcement activities, utilizing INTERPOL platforms, tools, and channels in close cooperation with AFRIPOL.

The ACSO is a multinational cybercrime suppression operation focused on identifying cybercriminals and compromised infrastructure in the African region. The INTERPOL Cybercrime Directorate and INTERPOL Support Program for the African Union (ISPA) collaborated with AFRIPOL and 27 INTERPOL member countries to leverage this intelligence and combat the growing threat of cybercrime across the continent.

The successful Cyber Surge operation and transfer of knowledge to multiple law enforcement agencies in the African region is the result of continued threat information sharing and trusted cooperation between INTERPOL, FortiGuard Labs, and other INTERPOL private partners.

FortiGuard Labs provided actionable threat intelligence over a six-month period, which consisted of botnet, command, and control (C2), and malware infrastructure research, including C2 and malware and botnet victims located within the African continent.

“The Africa Cyber Surge Operation, launched in July 2022, has brought together law enforcement officials from 27 countries, working together for almost four months on actionable intelligence provided by INTERPOL private partners,” Craig Jones, Director of the Cybercrime Directorate with INTERPOL comments. “This intelligence focused on opportunities to prevent, detect, investigate and disrupt cybercrime through coordinated LE activities utilizing INTERPOL platforms, tools, and channels. This operation focused both on cybercriminals and compromised network infrastructure in Africa, allowing member countries to identify more than 1,000 malicious IP addresses, dark web markets, and individual threat actors, enhancing cooperation between INTERPOL, AFRIPOL, and the member countries, and contributing to connecting policing for a safer world.”

“The Africa Cyber Surge Operation is a shining example of how shared threat intelligence on threat actors and joint operations across trusted partners can increase the cyber resilience of an entire region,” highlights Derek Manky, Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs. “It also shows how valuable cybersecurity training and education is to help close the cyber skills gap and effectively disrupt cybercrime at scale. We will continue to work with our private and public sector partners such as INTERPOL around the world to help make our digital world a safer place.”

For more than a decade, FortiGuard Labs has helped inform and protect customers, partners, and governments around the world. As a leader in the threat intelligence community, its mission is to provide the best threat intelligence designed to protect customers from malicious activity and sophisticated cyberattacks. The team is composed of some of the most knowledgeable threat hunters, researchers, analysts, engineers, and data scientists in the industry, working in dedicated threat research labs all around the world.

Fortinet has been an active member of the Global Cybercrime Expert Group and trusted partner to INTERPOL dating back to 2015 and became an INTERPOL Gateway partner in 2018. This ongoing collaboration has resulted in greater threat intelligence standards and protocols across the industry as well as impactful global cybercriminal takedowns.

In addition to INTERPOL, FortiGuard Labs is committed to partnership and cooperation with global law enforcement, government organizations, and industry organizations. Some of the global partnerships include being a founding member and regular contributor of the World Economic Forum’s (WEF) Centre for Cybersecurity as part of its Partnership Against Cybercrime (PAC), serving as a long-standing member of the NATO Industry Cyber Partnership (NICP), contributing to the development of STIX/TAXII protocols with MITRE & OASIS​, being an official Research Partner with MITRE Engenuity’s Center for Threat-Informed Defense (Center), co-founding the Cyber Threat Alliance (CTA), working in partnership with the computer incident response organization FIRST, and more.

Continue Reading

Cyber Security

Lookout Threat Lab Discovers Predatory Loan Apps on Google Play and Apple App Store

Published

on

Lookout, Inc. has announced the discovery of nearly 300 loan apps that exhibit predatory behavior such as exfiltrating excessive user data from mobile devices and harassing borrowers for repayment. These apps, which were found in Africa and Southeast Asia, as well as India, Colombia, and Mexico, purportedly offer quick, fully-digital loan approvals with reasonable loan terms. In reality, they exploit victims’ desire for quick cash in an attempt to ensnare borrowers into predatory loan contracts and require them to grant access to sensitive information on their devices such as contacts, phone history, and SMS messages — information that would not be required in a valid loan application process.

In addition to predatory requests for excessive permissions, many of the loan operators display scam-like actions. Victims have reported that their loans came with hidden fees, high-interest rates, and repayment terms that were much less favorable than what was posted on the app stores. Lookout Threat Lab also found evidence that the data exfiltrated from devices were sometimes used to pressure the customer for repayment – a common threat tactic to disclose a borrower’s debt or other personal information to their network of contacts.

In total, Lookout researchers uncovered 251 Android apps on the Google Play Store with more than 15 million collective downloads. The team also identified 35 apps on the Apple App Store that were in the top 100 finance apps in their regional stores. Lookout has been in contact with Google and Apple about these apps and, at the time of publishing, none of them are available for download.

“Mobile apps have made managing our lives a lot easier and are a convenient way to interact with businesses such as financial institutions. However, when entrusting any app with sensitive personal information, it is extremely important to stop and ask yourself if the information being requested makes sense and if the business behind the app is a trusted entity,” said Ruohan Xiong, senior security intelligence researcher, Lookout. “As these predatory loan apps have demonstrated, app permissions could easily be abused if users are not careful. While there are likely dozens of independent operators involved, all of these loan apps have a very similar business model – to trick victims into unfair loan terms and then extort payment.”

Continue Reading

Cyber Security

Dragos Participates in Global Security Forum in Riyadh

Published

on

Dragos, Inc. announced that it participated in the Global Cybersecurity Forum, held in Riyadh recently. The two-day event attracted cybersecurity experts and leaders from all over the world. Ben Miller, who represented Dragos as its Vice President of Services, spoke on the concluding day of the forum, about the threat of supply chain and third-party attacks. In his session, titled, “Pervasive and Insecure,” he discussed supply chain risk in critical infrastructure, examining the complex reality of third-party and supply chain attacks and sharing perspectives on the unseen vulnerabilities and how to address them.

Miller highlighted the complex nature of supply chain attacks, which potentially contain widespread vulnerabilities in the OT and industrial control systems (ICS). He outlined Dragos’ specific focus on the Kingdom’s supply chain risk in critical infrastructure including refineries and water treatment plants, as “Energy and water are specific focuses of ours in the region as they are critical not just to the economy but also to every person who lives here,” he said.

Giving an outline of the Dragos plan to help organizations detect and respond to the threat challenges posed to critical infrastructure in Saudi Arabia, he said, “We need to focus on educating the workforce, building a new understanding of how OT is different from IT, and gaining visibility and insights into what is happening in our critical infrastructure.” OT cybersecurity is in many ways a new field, he said.

“We need to communicate the needs of OT security as right now the concern exists but the specific needs aren’t well understood by asset owners. They do understand that digital transformation is happening and they need to secure it. I would focus on this business case and speak to the need for OT-specific monitoring, defensible architectures, and OT-specific incident response plans,” the Dragos official said.

Miller said supply chain attacks in critical infrastructure are complex with many suppliers, vendors, integrators, and long lifecycles that measure in decades. Commenting on the need to build industrial cyber resilience to keep such threats in check, he said: “The first challenge in the OT space is gaining visibility into what assets one has. You can’t defend something if you don’t know it exists.”

When it comes to safeguarding cyberspace, he had a few words of advice for Saudi Arabia, “The Kingdom should realize the potential challenges as early as possible. Commending the country’s efforts in cybersecurity. Over the last few years, Saudi Arabia has focused heavily on cybersecurity by investing in key programs and events such as the Global Cybersecurity Forum. The Kingdom of Saudi Arabia has impressed many by taking one of the world’s leading positions in developing and maintaining a cyber ecosystem. Therefore, the Kingdom now has a vantage point to bridge global cyber divides and ensure that cybersecurity benefits all societies in the region.”

A global expert in industrial cybersecurity himself, Miller joined other renowned thought leaders in the field, including Dr. Albert Antwi-Boasiako, Directory-General of the Cyber Security Authority, Ghana; Mary O’Brien, General Manager, IBM Security; Lothar Renner from Cisco Security; and Dr. Victoria Coates, Former Senior Advisor to the US Secretary of Energy.

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.