Summary: This article discusses the release of a new open-source security tool by Microsoft that aims to improve threat analysis for industrial control systems and enhance security measures.
Threat Actor: N/A
Victim: N/A
Key Point:
- Microsoft has developed an open-source security tool called ICSpector, which scans programmable logic controllers (PLCs) used in industrial control systems, extracts information, and detects malicious code.
- The tool aims to address the gaps in threat analysis for industrial control systems and improve security measures to protect critical infrastructure.
Critical Infrastructure Security
,
Governance & Risk Management
,
Operational Technology (OT)
ICSpector Is Now on GitHub, Scans PLCs, Extracts Info and Detects Malicious Code
Microsoft has released a new open-source security tool to close gaps in threat analysis for industrial control systems and help address increased nation-state attacks on critical infrastructure.
See Also: How a Large Manufacturer Boosted Its Protection Against a New Wave of Cyberattack
The new tool, called ICSpector, is built on an open-source framework that facilitates the examination of industrial programmable logic controllers – a set of hardware and software components that are used for managing and controlling different operations within an industrial environment.
While PLCs are integral to industrial control systems and are used in water and power grid systems, analyzing them poses challenges because of a lack of adequate threat detection tools and a dearth of expertise in the sector, according to Microsoft. OT analysis often involves sorting through sensitive data collected from sensors and controllers, Microsoft said.
“One of the biggest challenges is retrieving the code running on the PLC and scanning it as part of an incident response to understand if it was tampered with because the PLCs are actively operating vital industrial process,” Microsoft said
Microsoft said the new tool, which is available on GitHub, can detect malicious modifications, extract the timestamp of the changes made to a system, and provide an overview of the execution flow of tasks within the system, the company said.
“Currently, the system supports three OT protocols: Siemens S7Comm, which is compatible with the S7-300/400 series, Rockwell RSLogix, using the Common Industrial Protocol, and Codesys V3,” the company said.
Concerns about poor OT security threat detection have been raised by other vendors including Dragos, which recently warned about the lack of adequate segmentation between OT and IT systems and the challenge it poses to threat detection. Poor multifactor authentication applied to critical OT assets also has resulted in increased hacks, the company said.
Adam Meyers, CrowdStrike’s senior vice president for intelligence, previously testified in a U.S. Senate committee hearing that internet-connected cellular connections for remote telemetry collection, especially in the water sector, for pipeline metering and billing information pose a threat from hackers (see: OT-IT Integration Raises Risk for Water Providers, Experts Say).
Nation-state hackers from Russia and China are targeting energy companies and water utilities with disruption and espionage campaigns, according to federal authorities, who warned earlier this month that U.S. critical infrastructure defenses are falling behind these adversaries (see: FBI Calls for Increased Funding to Counter Cyberthreats).
Energy companies are major targets of Russian-state-backed actors, who targeted at least 20 Ukrainian energy, water and heating industries in March. Attackers hit the water and wastewater sector with 27 publicly disclosed cyber events in the U.S. between 2006 and 2023, Dragos found.
Source: https://www.bankinfosecurity.com/microsoft-releases-new-open-source-tool-for-ot-security-a-24961
“An interesting youtube video that may be related to the article above”