Risk to Supply Chain: customers and suppliers up and down the supply chain may be affected by the attack, through exposure of proprietary information as well as malware infections through interconnected systems with Visser’s systems and through spear-phishing (electronic communications containing malware)
IT-to-OT: as in the recently-reported ransomware attack on natural gas pipeline operations, the attackers used an IT malware to attack an industrial organization IT assets (rather than affecting industrial operations).
A different kind of ransomware: DoppelPaymer follows the MO set by other groups, including Maze, Sodinokibi, Nemty and Snatch, whereas rather than just encrypting and preventing access to data, sensitive information is published on the dark net.
What can be done to secure my OT network from similar attacks?
IEC62443-compliant risk assessment: The first step would be performing a thorough OT risk assessment, in accordance with the IEC62443 standard, to discover vulnerabilities including open ports and connections, lack of IT/OT network segmentation, external linking, etc. The assessment should produce a roadmap for risk mitigation which may include changes to network topology, stricter user access policies, and any other hardening measure.
Threat detection and monitoring: Ongoing mitigation should utilize an OT-dedicated threat detection and monitoring system, capable of detecting threats specific to industrial operations.
Without proper measures set in place, one possible outcome of the attack is the spreading of malware to up- and downstream supply chain partners, through interconnected systems as well as through spear-phishing.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.