{"id":16055,"date":"2021-07-05T04:00:00","date_gmt":"2021-07-05T04:00:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/07\/05\/trend-micro-warns-of-ransomware-targeting-industrial-control-systems\/"},"modified":"2021-07-05T04:00:00","modified_gmt":"2021-07-05T04:00:00","slug":"trend-micro-warns-of-ransomware-targeting-industrial-control-systems","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/07\/05\/trend-micro-warns-of-ransomware-targeting-industrial-control-systems\/","title":{"rendered":"Trend Micro Warns of Ransomware Targeting Industrial Control Systems"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\"><!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p class=\"subheadline\">\n                               Latest report highlights United States as the prime target of global threat actors                            <\/p>\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media&#13;<br \/>\nOutReach<\/a>\u00a0&#8211;\u00a05 July 2021\u00a0&#8211;\u00a0<a href=\"https:\/\/www.trendmicro.com\/en_hk\/business.html\"\/> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\"\/>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\"\/>), a global cybersecurity leader, today released a new report highlighting&#13;<br \/>\nthe growing risk of downtime and sensitive data theft from ransomware attacks&#13;<br \/>\naimed at industrial facilities.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>Click here to read a full copy of the report,\u00a0<i>2020&#13;<br \/>\nReport on Threats Affecting ICS Endpoints<\/i>:\u00a0<\/b><a href=\"https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/news\/internet-of-things\/2020-report-ics-endpoints-as-starting-points-for-threats\">https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/news\/internet-of-things\/2020-report-ics-endpoints-as-starting-points-for-threats<\/a>\u00a0\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;Industrial&#13;<br \/>\nControl Systems are incredibly challenging to secure, leaving plenty of gaps in&#13;<br \/>\nprotection that threat actors are clearly exploiting with growing&#13;<br \/>\ndetermination,&#8221; said\u00a0<span class=\"xn person\">Ryan Flores<\/span>, senior&#13;<br \/>\nmanager of forward-looking threat research for Trend Micro. &#8220;Given the US&#13;<br \/>\ngovernment is\u00a0<a href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3213189-1&amp;h=3236890535&amp;u=https%3A%2F%2Fwww.reuters.com%2Ftechnology%2Fexclusive-us-give-ransomware-hacks-similar-priority-terrorism-official-says-2021-06-03%2F&amp;a=now+treating+ransomware+attacks\" target=\"_blank\" rel=\"noopener noreferrer\"><b>now&#13;<br \/>\ntreating ransomware attacks<\/b><\/a>\u00a0with the same gravity as terrorism, we hope our latest&#13;<br \/>\nresearch will help industrial plant owners to prioritize and refocus their&#13;<br \/>\nsecurity efforts.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Industrial&#13;<br \/>\nControl Systems (ICS) are a crucial element of utility plants, factories and&#13;<br \/>\nother facilities\u2014where they&#8217;re used to monitor and control industrial processes&#13;<br \/>\nacross IT-OT networks.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>If&#13;<br \/>\nransomware finds its way onto these systems, it could knock out operations for&#13;<br \/>\ndays and increase the risk of designs, programs, and other sensitive documents&#13;<br \/>\nfinding their way onto the dark web.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Trend&#13;<br \/>\nMicro&#8217;s report found that Ryuk (20%), Nefilim (14.6%), Sodinokibi (13.5%) and&#13;<br \/>\nLockBit (10.4%) variants accounted for more than half of ICS ransomware&#13;<br \/>\ninfections in 2020.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The&#13;<br \/>\nreport also revealed:<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<ul>\n<li><b>Threat actors are infecting ICS endpoints to mine for&#13;<br \/>\ncryptocurrency using unpatched operating systems still vulnerable to&#13;<br \/>\nEternalBlue.<\/b><\/li>\n<li><b style=\"font-size: 1rem\">Variants of Conficker are spreading on ICS endpoints running&#13;<br \/>\nnewer operating systems by brute-forcing admin shares.<\/b><\/li>\n<li><b style=\"font-size: 1rem\">Legacy malware such as Autorun, Gamarue and Palevo are still&#13;<br \/>\nwidespread in IT\/OT networks, spreading via removable drives.<\/b><\/li>\n<\/ul>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The&#13;<br \/>\nreport urged closer cooperation between IT security and OT teams to identify&#13;<br \/>\nkey systems and dependencies such as OS compatibility and up-time requirements,&#13;<br \/>\nwith a view to developing more effective security strategies.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Trend&#13;<br \/>\nMicro makes the following recommendations:<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<ul>\n<li>Prompt patching is vital. If this is&#13;<br \/>\nnot possible, consider network segmentation or virtual patching from vendors&#13;<br \/>\nlike Trend Micro.<\/li>\n<li>Tackle post-intrusion ransomware by&#13;<br \/>\nmitigating the root causes of infection via application control software, and&#13;<br \/>\nthreat detection and response tools to sweep networks for IoCs.<\/li>\n<li>Restrict network shares and enforce&#13;<br \/>\nstrong username\/password combinations to prevent unauthorized access through&#13;<br \/>\ncredential brute forcing.<\/li>\n<li>Use an IDS or IPS to baseline normal&#13;<br \/>\nnetwork behavior to better spot suspicious activity.<\/li>\n<li>Scan ICS endpoints in air-gapped&#13;<br \/>\nenvironments using standalone tools.<\/li>\n<li>Set up USB malware scanning kiosks to&#13;<br \/>\ncheck the removable drives used to transfer data between air-gapped endpoints.<\/li>\n<li>Apply principle of least privilege to&#13;<br \/>\nOT network admins and operators.<\/li>\n<\/ul>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-07-05\/84771\/trend-micro-warns-of-ransomware-targeting-industrial-control-systems\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Latest report highlights United States as the prime target of global threat actors HONG KONG SAR &#8211;\u00a0Media&#13; OutReach\u00a0&#8211;\u00a05 July 2021\u00a0&#8211;\u00a0 (;), a global cybersecurity leader, today released a new report highlighting&#13; the growing risk of downtime and sensitive data theft from ransomware attacks&#13; aimed at industrial facilities. &#13; &#13; Click here to read a full &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/16055"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=16055"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/16055\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=16055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=16055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=16055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}