Research & Reports

ICS Information Security Assurance Framework 10

February 2, 2020 | Adeline Zhang

2.3.2 ICS Vulnerability Trend As industrial control has been delving deeper in recent years, more and more ICS vulnerabilities are discovered by researchers. As vulnerabilities publicly available are only a small portion of those hidden in ICSs, the possibility of ICS vulnerabilities being stashed as potential cyber weapons cannot be ruled out. The following sections […]

ICS Information Security Assurance Framework 9

February 1, 2020 | Adeline Zhang

2.3 Vulnerabilities in ICS Assets Most ICS security mechanisms are short of authentication, encryption, and audits, and therefore such ICS assets are rather vulnerable. When connecting to the Internet, ICSs are susceptible to external probes or identification via special fields included in information returned through public or private communication protocols, web services, telnet, and FTP. […]

ICS Information Security Assurance Framework 8

January 25, 2020 | Adeline Zhang

2.2.3 New ICS Attack Framework “TRITON” In the middle of November 2017, the Dragos, Inc. team found malware tailor-made for ICSs and identified it as TRISIS (referred to as TRITON in this document) because it fixed it gaze on Schneider Electric’s Triconex safety instrumented system (SIS), enabling the replacement of logic in final control elements.

Cybersecurity Insights-14

January 23, 2020 | Adeline Zhang

Analysis of IoT Attack Sources From NSFOCUS’s IoT threat intelligence, we can associate DDoS attack events with IoT devices. Further analysis of IoT devices compared to source IP addresses of DDoS attacks found that 3.14% of DDoS attackers are IoT devices. Though this proportion is relatively small, the number of DDoS source IP addresses is […]

ICS Information Security Assurance Framework 7

January 23, 2020 | Adeline Zhang

2.2.2 Dragonfly 2.0 Malware The Dragonfly organization, also known as Energetic Bear, mainly carries out cyber espionage activities targeting electric power operators, major power generation enterprises, petroleum pipeline operators, and industrial equipment providers in the energy sector. According to a Joint Analysis Report (JAR) released by the Department of Homeland Security (DHS), Dragonfly is a […]

IP Reputation Report-01192020

January 22, 2020 | Adeline Zhang

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 19, 2020.

ICS Information Security Assurance Framework 6

January 21, 2020 | Adeline Zhang

2.2 ICS-Targeting Malware Analysis In recent years, more and more malware took ICSs as targets, causing an increasingly great damage. The following sections analyze major ICS-targeting malware.

ICS Information Security Assurance Framework 5

January 19, 2020 | Adeline Zhang

Typical ICS Security Incidents As ICSs are increasingly informatized and open, more and more attacks are hitting ICSs, doing an increasing harm. ICS-targeted attacks use the IT network as a springboard to affect the operating of OT systems. Currently, attacks against ICSs are carried out to achieve three purposes: disrupting the normal operating of ICSs, […]

ICS Information Security Assurance Framework 4

January 18, 2020 | Adeline Zhang

Technical Trend of ICS Information Security 1.3.1 General Introduction As the application of IT technologies in industrial fields is expanding in breadth and depth, ICSs are facing an increasing number of security risks. ICSs’ original security protection systems which feature border separation and protection tend to be associated and integrated with business. With the emergence […]

ICS Information Security Assurance Framework 3

January 17, 2020 | Adeline Zhang

Development of ICS Information Security Since the Stuxnet virus explosion, countries all over the world have taken ICS security issues to a new height by actively working out and introducing related policies, standards, technologies, and solutions. A look into ICS security developments around the world reveals that the USA is the first to research and […]