Page 131 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 131

The Ransomware Encryption Process

            Let’s go back to the beginning and discuss how these attacks encrypt systems in the first place.

            From the previous ransomware attacks we’ve researched, we learned that from the minute the attackers
            get initial access, they can encrypt the entire network in a matter of hours. In other cases, attackers would
            spend more time in assessing which assets they want to encrypt and they’d make sure they get to key
            servers such as storage and application servers.

            Most  of  the  recent  ransomware  attacks  you’re  reading  about  in  the  news  try  to  terminate  antivirus
            processes to make sure that their encryption process will go uninterrupted. Recent ransomware variants
            such  as  SNAKE,  DoppelPaymer,  and  LockerGoga  even  went  further  by  terminating  OT-related
            processes like Siemens SIMATIC WinCC, Beckhoff TwinCAT, Kepware KEPServerEX, and the OPC
            communications protocol. This made sure the industrial process was interrupted, and this increased the
            chances that the victims paid the ransom. These types of ransomware attacks were seen in the recent
            attacks of Honda and ExecuPharm.
































            Diagram #1 - An OT Security Challenge: Industrial Components Exposed to Encryption


            From what we’ve seen, ransomware generally encrypts Windows and Linux machines. We still haven’t
            seen any PLCs being encrypted. However, many industrial services are run on Windows / Linux machines
            - such as historians, HMIs, storage, application servers, management portals, and OPC client/servers.

            In  many  cases,  ransomware  operations  would  not  stop  in  the  IT  network,  and  will  also  attack  OT
            segments. More encrypted devices mean a higher monetary ransom demand from the attackers.

            Organizations must be able to monitor & detect threats across the IT/OT boundary to effectively identify
            risks before reaching process-critical endpoints.





                                                                                                            131
   126   127   128   129   130   131   132   133   134   135   136