Disruptive attacks on critical infrastructure continue

The latest OT/IoT security report from Nozomi Networks Labs finds wiper malware, IoT botnet activity, and the Russia/Ukraine war significantly influenced the 2022 threat landscape. Continuing the trend that was observed in the first half of 2022, Nozomi Networks Labs researchers saw hacktivists shift tactics from data theft and Distributed Denial of Service (DDoS) attacks to utilizing more destructive malware in an attempt to destabilize critical infrastructure to further their political stance in the Russia/Ukraine war.

“Over the past six months, cyberattacks have increased significantly, causing major disruption to industries ranging from transportation to healthcare,” said Roya Gordon, Nozomi Networks OT/IoT Security Research Evangelist. “Railways, in particular, have been subject to attacks, leading to the implementation of measures designed to protect rail operators and their assets. As cyber threats evolve and intensify, it is important for organizations to understand how threat actors are targeting OT/IoT and the actions required to defend critical assets from threat actors.”

Nozomi Networks Labs analysis of customers’ intrusion alerts over the last six months found weak/cleartext passwords and weak encryption were the top access threats to critical infrastructure environments. This was followed by brute force and DDoS attempts. Trojans were the most common malware detected targeting enterprise IT networks, Remote Access Tools (RATs) topped the malware targeting OT, and DDoS malware targeted IoT devices.

Malicious IoT botnet activity remained high and continued to rise in the second half of 2022. Nozomi Networks Labs uncovered growing security concerns as botnets continue to use default credentials in attempts to access IoT Devices.

From July to December 2022, Nozomi Networks honeypots found:

· Attacks spiked in July, October and December with more than 5,000 unique attacks in each of those months.

· The top attacker IP addresses were associated with China, the United States, South Korea and Taiwan.

· “root” and “admin” credentials are still most often used as a way for threat actors to gain initial access and escalate privileges once in the network.

On the vulnerability front, manufacturing and energy remained the most vulnerable industries followed by water/wastewater, healthcare and transportation systems. In the last six months of 2022:

· CISA released 218 Common Vulnerabilities and Exposures (CVEs) – down 61% from the first half of the year.

· 70 vendors were impacted – up 16% from the previous reporting period; and

· Affected products were also up 6% from the first half of 2022.

HP kicks off global Amplify Partner Conference with future-ready strategy for driving greater collaboration and benefits.
CrowdStrike's strategic investment vehicle, the CrowdStrike Falcon Fund, has invested in Abnormal Security, the leading behavioral AI-based email security platform.
The adoption of the AI-powered platform follows a period of rapid growth for Gigaclear and aligns with the internet service provider’s data transformation strategy. This focuses on the implementation of best-in-class platforms and technology to deliver against its data privacy, compliance and data governance goals.
Veracode, a leading global provider of intelligent software security solutions, has opened its new engineering facility in Prague, Czech Republic (Prague Engineering Centre ). The center has been built in partnership with Accion Labs, a global provider of end-to-end software product engineering services, and will leverage expanded international support to deliver Veracode’s market-leading software security solutions.
Companies can continually evaluate and strengthen their security posture relative to their industry peers.
New research has found gaps in cybersecurity training.
Phishing attacks remain a significant threat to organizations. According to the data presented by the Atlas VPN team, based on the survey conducted by Egress with 500 cybersecurity leaders, 92% of organizations were victims of phishing in the past 12 months, and 86% experienced negative consequences as a result.
International research report by Westcon-Comstor reveals challenges of complex multivendor portfolios, and the need for distributor marketplaces to simplify and add value,