https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

IIoT/Manufacturing


Getty Images

IIoT Software Vulnerabilities Fuel Critical Infrastructure Attacks—Again

The newly discovered vulnerabilities in the the NicheStack TCP/IP stack make it easier for malicious attackers to launch critical infrastructure attacks.
  • Written by Lauren Horwitz
  • 16th August 2021

In August 2021, Forescout Research Labs and JFrog Security Research identified 14 vulnerabilities affecting the NicheStack TCP/IP stack, which the organizations dubbed INFRA:HALT.

TCP/IP stacks enable vendors to implement basic network communications for IP-connected systems, including IT, operational technology (OT) and Industrial Internet of Things (IoT) devices.

Indeed, NicheStack is present in myriad OT devices that are commonly used in several critical infrastructure sectors, such as manufacturing plants, water treatment, power generation and more.

The new vulnerabilities enable remote code execution, denial of service, information leak, TCP spoofing, or DNS cache poisoning.

Critical Infrastructure Attacks Reveal ICS Weak Spots

The vulnerabilities discovered illuminate the risk to critical infrastructure systems should they be compromised by malicious actors. These systems are aging and vulnerable, said experts.

“It is … an unfortunate example of the huge vulnerability of an aging infrastructure that has been connected, directly or indirectly, to the Internet,” said Curtis Simpson, CISO at Armis in a recent article on increasing attacks on critical infrastructure.

Forrester Research’s Brian Kim said that critical infrastructure organizations need to focus on identifying vulnerable OT devices within their estate, then focus on building a zero-trust strategy, using least privilege and network segmentation to prevent malicious actors from gaining access to critical systems.

“One of the best ways we can reduce the impact of a breach is a zero-trust strategy by limiting the communications of these ICS [industrial control systems],” Kime said.. “We can create an allow list that only allows communications with control systems that run a process–allowing least privilege for network connections … is a best practice. And ideally, we should have a barrier between IT and OT and segment each facility to have its own network.

JFrog and Forescout research teams will present a webinar on August 19 to provide additional information about how these vulnerabilities were identified and how they can be mitigated.

Critical Infrastructure Attacks on the Rise

Last year, there were some 65,000 ransomware attacks, according to the Recorded Future, a Boston-based cybersecurity firm.

Cyberattacks on critical infrastructure present certain benefits from the attackers’ perspective, even if the objective of attackers is not a payout.

First, malicious attackers can gain access to these vulnerable devices with ease, as OT devices may be older and lack the security protocols of newer technologies. Second, once critical operations are affected, it can grind operations to a halt. Affected organizations have great incentive to pay ransomware demands just r resume operations.

“The nature of these vulnerabilities could lead to heightened risk and expose national critical infrastructure at a time when the industry is seeing an increase in OT attacks against global utilities, oil and gas pipeline operators as well as healthcare and the supply chain,” wrote Forescout Research Labs in an announcement regarding the vulnerabilities.

Third, access to OT devices can always provide entrée to other systems within organizations.

“Once accessed, the stack becomes a vulnerable entry point to spread infectious malware across IT networks,” the researchers continued.

Kime noted that attacks like the recent one on Colonial Pipeline revealed that critical infrastructure systems are interconnected, creating the opportunity for ripple effects within these systems, then across the chain to IT systems as well.

“An event like Colonial Pipeline has revealed that these are more systems of systems rather than independent, isolated sectors that operate within their own little world,” Kime said.

Ultimately, Kime noted, critical infrastructure operators need to shift their perspective to enable more thoroughgoing protection of the critical infrastructure they manage.

“There should be a strong focus among critical infrastructure on not just security but resilience,” he said.

 

 

Tags: Hardware-based security IIoT/Manufacturing Technologies

Related


  • Volkswagen Deploys Nokia’s Private 5G Technology
    The technology is set to drive real-time IoT data uploads to Volkswagen’s production vehicles as well as intelligent robotics and wireless assembly tools
  • Image shows a smart factory and wireless communication network.
    Case Study: New Product Introduction of Cellular Connected Device
    In the smart city/connectivity and telecommunications markets, flexibility is critical. Innovation moves at the speed of light and there’s a great deal of competition to get to market first with a product that meets customer needs. That’s why more providers are turning to trusted partners like Benchmark to add speed, talent, and flexibility to their […]
  • Intel, Samsung Back $57M Funding for Landing AI
    The investment will help drive new iterations of the company’s product, which streamlines machine vision delivery for smart factory IoT networks.
  • Open Source IoT Development Tools vs. Vendor-Supported Tools
    More enterprises are exploring the development of their own Internet of Things (IoT) applications for company-specific use cases that can optimize operations, revenue gains and cost savings.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • How IIoT Is Transforming Product Design and Manufacture
  • HPE Edgeline Converged Edge Systems
  • Smart Factory Technology Upgrades: 5G, Cybersecurity Dominate
  • At Microsoft Ignite: How IoT and Robotics Are Driving Industry 4.0

Roundups

View all

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

IoT Product Roundup: Amazon, Synaptics, Urban Control and More

27th April 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

The U.S. Army is getting a 5G boost for #AR #VR capabilities from #5G network provider @OceusNetworks.… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

@IoTWorldSeries and The #AISummit will be hosted this year in Silicon Hills, the tech hub of Austin, Texas. Acces… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Hannover Messe 2022: @BoschGlobal,@BostonDynamics robotics showcased. @hannover_messe dlvr.it/SQzhr1 https://t.co/vHWRmsIGcm

24th May 2022
IoTWorldToday, IoTWorldSeries

📣JUNE DIGITAL SYMPOSIUM Drive your strategy forward and stay on the #Healthcare and #IndustrialIoT pulse with key… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Hyundai Investing $5B on Autonomous Driving and Robotics dlvr.it/SQzfZh https://t.co/1Jyr4Xlord

24th May 2022
IoTWorldToday, IoTWorldSeries

Partner with @IoTWorldToday to reach your prospects and accomplish your goals in 2022. Download our 2022 IoT Mark… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Explore Emerging Tech For Enterprises at @TechXLR8 2022 this June ➡️ Join us from 1-3 June in harnessing the pow… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Clearview AI has been fined $9.4 million for collecting images of people from social media platforms to add to its… twitter.com/i/web/status/1…

24th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X