Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

In LockerGoga’s Aftermath: 3 Guiding Principles for Your OT Security Defense Strategy

Automatically finding relevant assets can empower you to apply patches so you can remediate vulnerabilities within your attack surface before attackers can exploit them.

In 2019, LockerGoga took a major aluminum producer’s operations offline — that much we know. But many people don’t know that LockerGoga has a common thread with Triton, Shamoon, Petya and other attacks that inflict damage to critical infrastructure and industrial operations around the globe.

When these attacks happen — whether to your organization or others — it’s always a good idea to conduct a post-mortem analysis to learn from the attack and help secure your operation from future attacks. 

Here are three key takeaways to help strengthen your defense strategy:

1. Security today makes a more secure tomorrow

The commonality between LockerGoga and other attacks? There were multiple occurrences of each in the wild. 

For example, LockerGoga was first detected in January 2019, yet in March it made a second appearance when it shut down an aluminum producer, which had to move to manual operations. LockerGoga made an additional appearance in April 2019. 

Shamoon appeared as early as 2012 and reappeared again in 2016 and 2017. 

Similarly, Triton made its debut in 2017. We saw it again in 2018 and then again in early 2019. 

Attackers are recycling these exploit tools, so there’s a good probability that whatever resource you use to secure your organization the first time will help avoid revisiting them over and over.

2. Basic maintenance is generally not happening in your OT environment  

Industrial organizations have experienced quantum paradigm shifts in the last five years, which makes them more attractive and easier to successfully attack. 

Whereas industrial processes and operational technology (OT) networks were once isolated, today they are not. Thanks to the digital convergence of IT and OT environments and the implementation of industrial internet of things (IIoT) technology, OT is no longer an unreachable island. In fact, OT is a relatively easy target compared to traditional IT environments, which have a 20-year security head start. 

To keep attacks from repeating, your organization must keep an up-to-date inventory of assets on your OT network. Some refer to this as “basic maintenance,” yet it is anything but basic.

To truly stop the return of named attacks we thought were in our rear-view mirror, it is not enough to just keep a spreadsheet or other offline asset list. These static lists are generally outdated the minute you create them. 

In today’s dynamic OT environments, you need an automatically updated, live list with a detailed inventory of what is in your network. 

Without this live and detailed information, your organization can easily miss critical elements in your network you need to patch. The result is that vulnerabilities remain overlooked because your security administrator does not know they are there. 

With enough reconnaissance, hackers can quickly find these holes and take advantage of them by recycling old attacks that still have the capacity to devastate industrial operations. 

3. Automate and alleviate mundane tasks to focus on what matters

In the past, we relied on human intelligence to find security incidents within mountains of data. This is frequently a laborious, time-consuming set of tasks.

In addition, this process is also subject to human error, which adds another barrier to breach resolution. Automatically finding relevant assets will empower you to apply patches to secure vulnerabilities before attackers exploit them and thereby help you eliminate encore attack performances that take down OT networks. 

In LockerGoga | 3 Guiding Principles for OT Security

Deploying a robust patch management program also automates tedious tasks, which eliminates human error. 

With a real-time and detailed asset inventory program, you can prioritize your top threats and take more efficient actions to defend your network.

Learn more

Tenable.ot can help you automate assets discovery, prioritize threats and defend your OT network. Visit https://www.tenable.com/products/tenable-ot 

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training