Select Page

As head of the security research team at Nozomi Networks Labs, today I’m proud to introduce our review of the OT/IoT threat landscape for the first half of 2020 (1H). During this time, our team saw an increase in threats to OT and IoT networks, especially IoT botnet, ransomware and COVID-19-themed attacks.

These attack types align with global computing and socio-economic trends. The rapid rise in IoT devices and connections, the worldwide COVID-19 pandemic, and the increasing growth and sophistication of cyber criminals using ransomware for financial gain are the significant drivers.

Our report provides an overview of the most active threats we saw in 1H, insight into their tactics and techniques, and recommendations for protecting your critical networks. Read on to learn some of the report’s highlights.

The latest Nozomi Networks OT/IoT Security Report finds IoT botnets, shifting ransomware and COVID-19 themed attacks have increased the security stakes for enterprises worldwide.

IoT Malware Threats are Growing Rapidly

IoT malware threats are growing and will be an important component of the threat landscape for the foreseeable future. Several factors are contributing to this unprecedented growth, including:

  • Exponential growth in the number of IoT devices.
  • The insecure deployment of IoT devices that are directly accessible through the internet.
  • A lack of security updates for IoT devices, leaving devices vulnerable to common (non-zero-day) exploits by many threat actors.
  • The lack of visibility into IoT device security posture experienced by many asset owners.

IoT devices are an easy and plentiful target for attackers. Popular examples of IoT
malware observed in 2020 1H are shown above. See full Infographic.

One of the interesting botnets is Dark Nexus, discovered in April 2020. Its code development process is quite intriguing. Dark Nexus operators frequently issue new updates similar to releases you see with commercial software. Additionally, Dark Nexus operators brazenly hawk their DDoS mitigation services on the open internet.

From a technical point of view, what stands out about Dark Nexus when compared to competing botnets is the elaborate mechanisms it uses to profile the processes running on the infected device. The goal of these mechanisms is to identify suspicious processes that might hinder the smooth execution of the malware.

While Dark Nexus initially infected only a few thousand devices, numbers can fluctuate quickly, and defenders should keep an eye on this type of threat.

Shifting Ransomware Escalates Enterprise Risk

Ransomware attacks targeting a variety of industry verticals remain commonplace. What is changing is the significance of the targets. Ransomware gangs have shifted their focus to larger, more critical targets with deeper pockets, including manufacturers, energy operators, local municipalities, and others.

Ransomware operators typically encrypt files and demand ransom payments from affected parties. Now they also exfiltrate company data and threaten to leak it publicly, as a way to apply more leverage.

Ransomware attackers are demanding higher ransoms and aiming at larger, more critical organizations. They are now deploying a two-pronged approach that combines data encryption with data theft. See full Infographic.

See our report to learn details about these ransomware threats:

COVID-19-Themed Malware Take Advantage of Remote Work and a Climate of Anxiety

The COVID-19 global pandemic has provided threat actors with more vectors and opportunities for exploitation. The attack surface for most companies has greatly expanded with the fast switch to work-from-home policies. Some companies have infrastructure that allows remote work, such as VPNs and work laptops. Many others were not prepared and had to quickly come up with solutions, opening the door to security risks.

Furthermore, the climate of anxiety and uncertainty caused by COVID-19 makes targets more susceptible to social engineering attacks. Threat actors primarily used phishing emails in the initial attack phase to lure users into giving up personal information or executing malicious software.

An example is the Chinoxy Backdoor malware family. It embeds a document containing information related to COVID-19 assistance in a .rtf file exploiting CVE-2017-11882. The exploit is used to drop malicious binaries in the machine, which use HTTP over port 443 for C&C communication.

When threat actors gain access to systems and exfiltrate network data, they always leave a trail. That’s good news because the trail can be identified and quickly acted on if you have clear visibility into what’s happening in your OT/IoT networks.

The COVID-19 global pandemic has provided threat actors with more opportunities for exploitation, particularly remote access and social engineering focused attacks. Cybercrimes increased dramatically. See full Infographic.

ICS Vulnerabilities Remain a Challenge

Vulnerabilities discovered in ICS systems provide attackers with opportunities to disrupt or manipulate data, which can impact physical processes and be extremely dangerous. It is therefore important to take the trends in vulnerabilities and weaknesses into account when evaluating security risks.

The number of vulnerabilities tracked by ICS-CERT in the first half of 2020 grew significantly compare to 2019. A reasonable course of action for asset owners is to reduce exposure by addressing easy-to-mitigate vulnerabilities first. Over time, more and more vulnerabilities can be mitigated.

Improper input validations and buffer overflow vulnerabilities lead the 2020 chart in terms of numbers. While the former falls into the easy-to-mitigate category, the latter is more difficult to address. Buffer overflowsrequire firmware updates from vendors, the replacement of old equipment, or other mitigations. Unfortunately, this group will likely continue to represent a significant percentage of the vulnerabilities discovered for the next few years.

Overall, a multi-pronged strategy of monitoring, vulnerability elimination and vulnerability mitigation is recommended

Shifting OT/IoT Threats Call for High Cyber Resiliency

We expect that attacks from IoT botnets, ransomware and COVID-19-themed malware will continue to grow, though they will shift and adapt in the second half of the year. Given that threats are increasing and constantly changing, it’s important to maintain high cyber resiliency and fast response capabilities.

In this regard, security gaps related to people, processes and technology have a large impact. For example, the separation of IT and OT in organizations with increasingly connected IT, OT, and IoT systems can lead to blind spots. But, with the right technology and a focus on best practices, you can increase visibility and operational resiliency.

We encourage you to subscribe to Nozomi Networks Labs and utilize our cybersecurity community resources to stay on top of the latest threats.

Related Content

TI-DS-v20-thumbnail
RESEARCH REPORT

OT/IoT Security Report

Rising IoT Botnets and Shifting Ransomware Escalate Enterprise Risk
2020 1H

Find out about:

  • The OT/IoT threat landscape:
    • IoT malware
    • Ransomware
    • COVID-19-themed malware
  • The tactics and techniques of the most important threat actors
  • The top 2020 ICS vulnerabilities and their ongoing impact on risk
  • Recommendations for securing OT/IoT networks
TI-DS-v20-thumbnail
WEBINAR

OT/IoT Security Report 2020

DURATION: 30 Minutes

Join us to learn about:

  • The OT/IoT threat landscape
  • The tactics, techniques and procedures of the most important threat actors
  • The top 2020 ICS vulnerabilities and their ongoing impact on risk
  • Recommendations for securing OT/IoT networks

Panelists:

  • Andrea Carcano, Co-founder & CPO
  • Alessandro Di Pinto, Security Research Manager
  • Ivan Speziale, Security Researcher

Nozomi Networks Solution

Share This