Cybersecurity30 Aug 2023 4m thecyberwire.com

CISA Director Highlights Threats of Cyberattacks on Infrastructure

Recent cyberattacks have raised significant concerns over infrastructure vulnerabilities, with incidents impacting Polish rail systems and Australian software firm Energy One.
CISA Director Highlights Threats of Cyberattacks on Infrastructure

Key Takeaways

  • 1.> "We are noticing patterns that suggest foreign adversaries are actively observing and preparing to exploit infrastructure weaknesses," In a related incident, trains near Szczecin in Poland faced a significant disruption due to a cyberattack on rail control systems.
  • 2."In response, Energy One took immediate steps to limit the impact of the incident," the company announced.
  • 3."We are noticing patterns that suggest foreign adversaries are actively observing and preparing to exploit infrastructure weaknesses," said CISA Director Jen Easterly.

The cybersecurity landscape continues to evolve, with insights and warnings emerging from various sectors about vulnerabilities that could threaten critical infrastructure. The Director of the Cybersecurity and Infrastructure Security Agency (CISA) recently emphasized the potential staging of attacks by foreign actors, particularly from China, signaling heightened concerns for industrial cybersecurity. "We are noticing patterns that suggest foreign adversaries are actively observing and preparing to exploit infrastructure weaknesses," said CISA Director Jen Easterly.

"We are noticing patterns that suggest foreign adversaries are actively observing and preparing to exploit infrastructure weaknesses,"

In a related incident, trains near Szczecin in Poland faced a significant disruption due to a cyberattack on rail control systems. This breach involved the interception of an emergency radio signal, halting operations for approximately twenty trains late Friday night into early Saturday morning. Prompt investigations by Poland's internal security service, ABW, suggest that Russian hacktivist groups may be involved. Senior security official Stanislaw Zaryn indicated the seriousness of the situation, stating, "For the moment, we are ruling nothing out. We know that for some months there have been attempts to destabilise the Polish state."

Reports indicated that the emergency stop signals were compromised through a legacy radio-frequency system devoid of basic security measures such as authentication or encryption. "Such an exploit is alarmingly accessible; all it takes is the right equipment—readily available and affordable," Zaryn noted. If these preliminary insights are verified, this incident could represent a broader trend of hostile cyber operations on state infrastructure.

"Such an exploit is alarmingly accessible; all it takes is the right equipment—readily available and affordable,"

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

Further complicating the cybersecurity narrative are vulnerabilities in the CODESYS software platform, which are drawing scrutiny from industry experts. This versatile programming tool, widely used in industrial systems, has become a target for attackers aiming to leverage its flaws for malicious activities. "The exploitation of CODESYS vulnerabilities speaks volumes about the necessity for robust cybersecurity frameworks in the sector," stated a cybersecurity analyst.

"The exploitation of CODESYS vulnerabilities speaks volumes about the necessity for robust cybersecurity frameworks in the sector,"

Impact and Legacy

In another alarming development, Energy One, an Australian company specializing in technology solutions for energy firms, confirmed a cyberattack affecting its operations in both Australia and the UK. The incident occurred on August 18, and the company has since taken action to mitigate its impact. "In response, Energy One took immediate steps to limit the impact of the incident," the company announced. They engaged cybersecurity professionals at CyberCX and notified relevant cyber security authorities. “Energy One’s top priorities are the safety and security of its people, its customers, and its systems,” the statement continued.

"In response, Energy One took immediate steps to limit the impact of the incident,"

Impact and Legacy

The energy sector’s vulnerability is further underscored by malware attacks impacting a power generator in Southern Africa, raising alarms about the potential cascading effects on essential services. Both environmental exploitation and increased maritime cyber risks were acknowledged as emerging threats in a recent Five Eyes report, highlighting a pattern of escalating cyber activity against critical infrastructure.

Moreover, incidents like the alleged manipulation of radiation sensor data from the Chernobyl exclusion zone during the Russian Army's occupation are raising serious safety concerns. Research from cybersecurity expert Ruben Santamarta implies that data deviated significantly from actual conditions during this period. The implications of such manipulation pose severe risks to public safety and trust in critical data systems. Santamarta commented, "Evidence confirms that the radiation levels depicted by a very specific set of real-time radiation maps…did not correspond to the actual physical conditions."

Data center server room with multiple monitors displaying code and red LED lighting
Data center server room with multiple monitors displaying code and red LED lighting

Looking Ahead

The current cybersecurity landscape poses various challenges and concerns regarding the stability of essential services worldwide. As CISA and security officials warn about the rising threats from foreign entities, operators across all sectors are urged to assess their defenses against looming vulnerabilities. The ongoing interactions between state and non-state actors in the cyber realm underscore the critical need for vigilance and robust operational security moving forward. The broader implications for critical infrastructures, including power grids and transportation systems, are likely to inform future cybersecurity strategies and policies.