I’ve been saying for years that supervisory control and data acquisition (SCADA) systems and industrial control systems (ICS) have a greater risk of being hacked. Unless changes and upgrades are made to these mission critical systems, a devastating hack is bound to happen. And it turns out that I was right.
The Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) just released a joint report that provides information on persistent threats that successfully breached government networks along with organizations in the energy, nuclear, aviation, and manufacturing sectors.
SCADA/ICS systems are the backbone of manufacturing and other industrial sites, combining hundreds of onsite systems into one central control network. Unfortunately they typically use outdated operating systems, making themselves an easy access point for hackers looking to infiltrate the system. Manufacturing was the third most attacked industry in 2016 beyond the general services industry, and the financial/insurance industry.
Disabling a mission critical network in a nuclear power plant, water treatment facility, or even in manufacturing plants can have devastating effects. Hackers target these organizations because they are interested in extortion of funds, disruption of essential services to cause chaos and physical harm, and theft of intellectual property. Hacks have obvious monetary consequences, but in some cases they can even lead to loss of life.
Hackers have grown more confident over the years creating sophisticated hacking schemes using spear phishing emails, infrastructure targeting and credential gathering from compromised accounts to break into their desired network. This aggressive activity towards critical infrastructure is frightening since this is the first large scale successful attack in the US. Regardless of what information the hackers were able to gain access to, we don’t want our enemies to learn how to cause more permanent damage in the future.
Managers in industrial and other related organizations need to be aware of their normal network traffic and activity. Without a baseline, there is no way to understand what’s irregular and needs to be investigated, and what simply is a result of daily activity. A network TAP is the industry best practice to ensure full visibility into your network.
Attempts at network infiltration can be detected by comparing IP addresses and domain names found in the indicators of compromise (IOC) listed in the DHS/FBI report and comparing them to unusual IP addresses, traffic spikes at odd hours of the day, unusual ports open, and the obvious alarms from your monitoring tools. When you use a TAP, you are assured the data you’re looking at is the true story.
Have I scared you yet? Don’t let yourself get surprised by an attack on your network. The only way to ensure that you see 100% of your network traffic is by using a Network TAP. Protect yourself and your organization by reading the latest whitepaper, Protecting the Data: 5 Tools to Fight Against Today’s Threats.
If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.
If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.
While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.
Some of you may have noticed a flaw in the logic behind this solution! You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.
Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.
Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.
Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.