Hello guys, Here we are back again with the OT/SCADA Series of Blogs.

Today, we will be learning about OT attacks and Vulnerabilities.
Security threats and security posture of organizations those who use OT with evolving security threats need to attach the most importance OT security strategies to address security issues.

We will discuss about various OT threats and attacks such as
1. Hacking Industrial Networks
2. HMI attacks
3. Side-channel attacks
4. Hacking PLCs,
5. Hacking Machines via RF remote controllers, etc.

OT Vulnerabilities

Since IoT converged with OT, attack surface areas of OT systems have also increased.

Vulnerability Description
Publicly Accessible OT Systems OT systems directly connected to Internet so vendors can remotely perform maintenance and diagnostics.
Insecure Remote Connections Corporate networks use jump boxes to establish remote connectivity with the OT network.
Missing Security Updates Outdated Software versions
Weak Passwords Default usernames and passwords for OT systems.
Insecure Firewall Configuration Misconfigured access rules allow unnecessary access between corporate IT and OT networks.
OT Systems placed withing Corporate IT network Interconnected Corporate IT network and OT systems, ability to gain unauthorized access to corporate IT systems through insecure OT devices.
Insufficient security for corporate IT network from OT systems OT systems use outdated legacy and are accessed from remote locations.
Lack of Segmentation Several OT networks have a flat and unsegmented configuration, which assumes all systems have equal importance and functions.
Lack of Encryption and Authentication for Wireless OT networks Insecure and Outdated Protocols Ability to perform sniffing and authentication bypass attacks.

OT Threats

Maintenance and Administrative Threat – Attackers inject and Spread malware into target the maintenance and administration of OT Network.

Data Leakage
Protocol Abuse
Potential Destruction of ICS Resources
Reconnaissance Attacks
Denial of Service Attacks
HMI based Attacks
Exploiting Enterprise-Specific Systems and Tools
Spear Phishin
Malware Attacks
Exploiting unpatched Vulnerabilities
Side-Channel Attacks
Buffer Overflow Attack
Exploiting RF Remote Controllers

Table of Contents

Social Media