№12|2024
AUTOMATED AND INFORMATION MANAGEMENT SYSTEMS
UDC 004.056:628.1
DOI 10.35776/VST.2024.12.07
Analysis of the technologies of cyber-attacks on the infrastructure of automated process control systems of water utilities with web-oriented malware
Summary
The results of analyzing the modern technologies of cyber-attacks on the infrastructure of automated process control systems of water utilities with web-oriented malware are presented. The technology of malware action using a fundamentally new approach to exploiting vulnerabilities in the web infrastructure of modern programmable logic controllers is considered in detail. Main scenarios of cyber-attacks on the infrastructure of automated process control systems of water utilities are considered. Practical recommendations are proposed focused on reducing the risks of cyber-attacks, increasing resistance to malicious actions and ensuring information security.
Key words
vulnerability , malware , target cyber-attack , automated process control systems of water utilities , programmable logic controller
For citation: Kinebas A. K., Kiselev A. N., Platonov A. A. Analysis of the technologies of cyber-attacks on the infrastructure of automated process control systems of water utilities with web-oriented malware. Vodosnabzhenie i Sanitarnaia Tekhnika, 2024, no. 12, pp. 43–52. DOI: 10.35776/VST.2024.12.07. (In Russian).
The further text is accessible on a paid subscription.
For authorisation enter the login/password.
Or subscribe
REFERENCES
- Stouffer K., Lightman S., Pillitteri V., Abrams M., Hahn A. NIST special publication 800-82, revision 2: Guide to industrial control systems (ICS) security. National Institute of Standards and Technology, 2018.
- Garcia L., Zonouz S. A. Hey, my malware knows physics! attacking PLCs with physical model aware rootkit. Network and Distributed System Security (NDSS) Symp., 2017, pp. 1–15.
- Govil N., Agrawal A., Tippenhauer N. O. On ladder logic bombs in industrial control systems. Computer Security, 2017, pp. 110–126.
- Costin A., Zarras A., Francillon A. Automated dynamic firmware analysis at scale: a case study on embedded web interfaces. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016, pp. 437–448.
- Sasaki T., Fujita A., Ganan C. H., van Eeten M., Yoshioka K., Matsumoto T. Exposed infrastructures: Discovery, attacks and remediation of insecure ics remote management devices. IEEE Symposium on Security and Privacy (SP), 2022, pp. 2379–2396.
- Qasim S. A., Smith J. M., Ahmed I. Control logic forensics framework using built-in decompiler of engineering software in industrial control systems, Forensic Science International: Digital Investigation, 2020, v. 33, p. 301013.
- Salehi M., Bayat-Sarmadi S. PLCDefender: Improving remote attestation techniques for PLCs using physical model, IEEE Internet of Things Journal, 2021, v. 8, no. 9, pp. 7372–7379.
- McLaughlin S. E., Zonouz S. A., Pohly D. J., McDaniel P. D. A trusted safety verifier for process controller code. Network and Distributed System Security, 2014, v. 14.