Detecting Malware Before It Strikes


Detecting Malware on Your Network Before it Causes Damage

Advanced malware threats designed to disrupt industrial processes typically go through lengthy infection, reconnaissance and lateral movement phases before executing their final ICS or SCADA attack.

One example is the TRITON malware that went beyond previous industrial cyberattacks to interact directly with a petrochemical plant’s Safety Instrumented System (SIS). The attack began with penetration of the IT network, then moved to the OT network via systems accessible to both environments. There, it infected the SIS system’s engineering workstation.

The attack reprogrammed the facility’s SIS controllers, causing them to enter a failed state, which fortunately resulted in an automatic shutdown of the industrial process. While TRITON failed to deliver its ultimate goal – a malicious OT payload, if left un-checked, malware can cause unpredictable and dangerous operational disruption.


Automated Monitoring of the Industrial Network to Identify Operational Anomalies

Nozomi Networks Solution: Alerts List The Nozomi Networks solution alerts security teams to early stage reconnaissance and compromise activities, and provides the information needed to respond before damage occurs. The Threat Intelligence service delivers up-to-date threat and vulnerability information to stay on top of the dynamic threat landscape and reduce mean-time-to-detection (MTTD).

An important part of neutralizing threats before disruption occurs involves early warning across all three phases of attack.

Nozomi Networks uses a hybrid approach to detect malware at each attack phase. This includes behavior-based anomaly detection and multiple types of signature and rules-based detection.

The solution alerts you about early stage infection and reconnaissance and provides information that helps you take action before a final attack occurs.

  • In Phase I, anomaly detection identifies malware that is beaconing out to an external Command and Control server (C&C) through its connections to a new public IP address. Then, using Yara rules, its built-in analysis toolkit immediately identifies specific files associated with the malware. Assertions can also be used to detect data and events in network traffic related to the presence of the malware at a particular site.
  • In Phase 2, the malware prepares for attack by triggering a learning process. During this phase, the solution’s anomaly detection identifies new commands in the host network and generates alerts that include command sources. Even if the malware uses regular industrial protocols to communicate, its messages will vary from the system’s baseline behavior, allowing them to be singled out.
  • In Phase 3, if an attack occurs, it is quickly identified and an alert is sent out. This enables you to implement new firewall rules, or take other actions to stop further attack commands.

Thanks to integration with multiple firewalls, the solution can go beyond detection to tackle prevention, by automatically triggering the implementation of rules that block an attack upon detection of irregular commands.

Stay Up-to-Date on Emerging Threats with Threat Intelligence

The Threat Intelligence service continuously updates the Nozomi Networks solution with rich data and analysis so you can detect and respond to vulnerabilities and emerging threats faster.

Vantage correlates Threat Intelligence information with broader environmental behavior to deliver maximum security and operational insight.

Let's get started

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.