Header image

NCSC and Global Agencies Issue Warning on Pro-Russian OT Attacks

Global cybersecurity agencies warn on pro-Russian attackers targeting multiple OT environments and devices.

National cybersecurity agencies are warning of an increase in attacks on operational technology (OT) devices by pro-Russia hacktivist groups.

These groups are often ideologically, rather than financially motivated, and focus on DDoS attacks, website defacements and/or the spread of misinformation, an NCSC statement said.

The groups ”have stated a desire to achieve a more disruptive and destructive impact against western critical national infrastructure (CNI), including in the UK” the NCSC said, and the groups have the capability to deliberately cause a destructive, rather than disruptive, impact in the short term.

Global Support

This has led the call for external assistance from other agencies, with the Federal Bureau of Investigation (FBI), National Security Agency (NSA), Environmental Protection Agency (EPA), Department of Energy (DOE), United States Department of Agriculture (USDA), Food and Drug Administration (FDA), Multi-State Information Sharing and Analysis Center (MS-ISAC) and Canadian Centre for Cyber Security (CCCS) also observing these threat actors compromising small-scale industrial control systems.

EPA issued a warning in March about attacks on water and wastewater systems throughout the United States, which have the potential to disrupt the critical lifeline of clean and safe drinking water, as well as impose significant costs on affected communities.

In that instance, EPA requested support to ensure water systems “comprehensively assess their current cybersecurity practices to identify any significant vulnerabilities, deploy practices and controls to reduce cybersecurity risks where needed, and exercise plans to prepare for, respond to, and recover from a cyber incident.”

Issuing Warnings

Now, the global agencies are issuing warnings that whilst most of the activity remains technically unsophisticated, US agencies have responded to some incidents where victims have seen limited physical disruptions from unauthorised users.
In particular, the NCSC said the pro-Russia hacktivists had been observed over the past few months targeting vulnerable, small-scale industrial control systems in North America and Europe.

According to a joint advisory, the attackers have been observed gaining remote access via the exploitation of publicly exposed internet-facing connections and outdated VNC software, as well as using an HMIs’ factory default passwords and weak passwords - which often do not include multi-factor authentication.


Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

08
Aug
Webinar

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image