Telemetry data from Nozomi Networks reveals a significant increase of 230% in vulnerabilities within critical manufacturing in operational technology (OT) and Internet of Things (IoT) environments. This poses a serious threat to the security of these networks.
Description
The analysis of data from the last half of 2023 shows that IoT and OT networks are subject to highly sophisticated attacks [1]. Network anomalies and attacks accounted for 38% of threats during this period [2]. This surge in vulnerabilities has provided more opportunities for threat actors to access networks and cause disruptions. Access control and authorization threats have also seen a substantial jump, with a 123% increase in alerts. The Cybersecurity and Infrastructure Security Agency reported a 38% increase in identified vulnerabilities affecting industrial control systems (ICS) [1], with manufacturing vulnerabilities dominating the list [1]. The manufacturing [1], energy [2] [4], and water/wastewater industries remain the most vulnerable [2], while commercial facilities and communications have also become targets [2].
Managers of OT/IoT need to enhance their security measures to protect against these threats. Prioritizing strategies such as network segmentation [1], asset discovery [1], vulnerability management [1], patching [1], logging [1], endpoint detection [1], and threat intelligence can help minimize risk and maximize operational resiliency [1]. It is crucial to address the ongoing use of default credentials by threat actors against IoT devices, as attackers are adopting more sophisticated methods [1] [3].
Conclusion
The increase in vulnerabilities within critical manufacturing in OT and IoT environments poses a significant risk to the security of these networks. Threat actors are becoming more sophisticated in their methods, targeting critical infrastructure directly [1] [4]. It is imperative for managers to prioritize security measures and implement strategies to minimize risk. The manufacturing [1], energy [2] [4], and water/wastewater industries are particularly vulnerable [2], but other sectors are also at risk. Addressing the ongoing use of default credentials by threat actors is crucial. The future implications of these vulnerabilities and attacks require continuous vigilance and proactive measures to ensure the security and resilience of these networks.
References
[1] https://www.darkreading.com/iot/iot-networks-face-bug-barrage-advancing-adversaries
[2] https://www.nozominetworks.com/press-release/pervasive-ot-iot-network-anomalies-raise-red-flags-as-threats-to-critical-infrastructure-become-more-sophisticated
[3] https://www.infosecurity-magazine.com/news/critical-manufacturing-surge/
[4] https://www.itsforhome.com/2024/02/08/surge-in-critical-manufacturing-vulnerabilities-raises-concerns-for-ot-iot-security/