Read the case study given below and answer ALL the questions given at the end of the case. ransomware from infecting its industrial network. Unfortunately, this necessary measure could not prevent fuel shortages in several US states from happening as a result. Other indirect effects of ransomware on OT systems could be loss of visibility and theft of operational information. loT and Ransomware: A Recipe for Disruption September 28, 2021 loT and ransomware In other Industries Ransomware as examined in the context of the internet of things (loT) is not a new discussion. When ransomware attacks were gaining momentum and lot adoption started to expand, security experts already began to look at the potential risks of ransomware attacks when they involve the loT. Disruption is also the main goal for ransomware attacks in other industries, which likely also rely to some extent on loT devices and systems. In the Trend Micro midyear roundup, we reported how manufacturing, healthcare, and food and beverage were among the top five industries that saw the most ransomware activity. The healthcare industry saw attacks from the likes of Ryuk and Conti ransomware families, which added pressure to an already strained healthcare system amidst the pandemic. It is difficult to determine if these recent attacks had a direct impact on medical devices, but ransomware has been known to infect medical devices before. Connected medical devices, while incredibly useful today, can also act as entry points for attacks flaws that make them susceptible to malware infection. loT and ransomware are worth reexamining now that a different breed of ransomware families are targeting organizations and loT use has become widespread in the industrial sector. if not properly managed. Medical devices also carry vulnerabilities and loT and ransomware attacks Ransomware attacks hinge on being timely, critical, and irreversible. The involvement of loT in ransomware campaigns can amplify the impact of attacks because of cascading consequences especially in the case of critical infrastructure. In addition, loT devices widen the attack surface through which ransomware can be deployed. These are conditions that can exacerbate disruptions. Aside from the healthcare industry, the food production industry has also adopted loT tools and systems to optimize production. According to an FBI advisory, ransomware attacks are targeting the food and agriculture sector to exfiltrate and encrypt data. They note how the sector is becoming increasingly more reliant on lot processes, expanding the attack surface. Some of these attacks did not only cost the victims, but also affected the supply chain, driving prices up for consumers. Ransomware attacks pose a threat to OT systems Routers and other loT devices as entry points for malware The loT can significantly redefine the attack surface an organization would need to secure. This concern also includes every-day loT devices such as smart appliances and routers. Once set up, some loT devices, specifically routers, are often forgotten in the Ransomware operators like DarkSide have set their sights on critical infrastructures or high-profile targets. These organizations likely rely on operational technology (OT) and industrial control systems (1CS), which raises the urgency and the stakes involved in a ransomware attack. Ransomware attacks have become such a threat to OT assets that the US Cybersecurity and Infrastructure Security Agency (CISA) released a fact sheet to inform organizations about them. background, never to be examined again unless something goes wrong. But these devices can be exploited to allow ransomware to enter a system. Botnet malware, a well-known problem for loT devices, can also be used to distribute other malware In our research on loT botnets, we found that it is still possible for routers to remain infected with a batnet that has been defunct for two years, highlighting how seemingly simple devices can act as a doorway for critical attacks. Attacks that involve OT systems can be dangerous and have cascading effects down the supply chain, pressuring victim organizations to comply with ransom demands. The convergence of IT and OT components can open a path for attackers to cross from IT to OT networks. Ransomware attacks on loT devices It is important to note, however. that ransomware rarely target OT systems directly. The EKANS ransomware is a rare example that is capable of stopping ICS software processes. while most ransomware families today, such as Ryuk. REvil. and Conti. target IT systems. However, intrusions into the IT network can disrupt and impact the OT network even if it has nat been infected directly by ransomware This was the case for Colonial Pipeline, which had to shut down its systenms to prevent the loT ransomware is a ransomware attack targeting loT devices. In such a scenario threat actors control or lock a device (or several devices) to extort payment An example of a ransomware variant that crossed over to a specific loT device is FLocker an Android mobile lock-screen ransomware that shifted to smart TVs. Two separate researches have also tested ransomware attacks on a smart thermostat device and a coffee machine. Such attacks have not progressed much in recent years
Read the case study given below and answer ALL the questions given at the end of the case. ransomware from infecting its industrial network. Unfortunately, this necessary measure could not prevent fuel shortages in several US states from happening as a result. Other indirect effects of ransomware on OT systems could be loss of visibility and theft of operational information. loT and Ransomware: A Recipe for Disruption September 28, 2021 loT and ransomware In other Industries Ransomware as examined in the context of the internet of things (loT) is not a new discussion. When ransomware attacks were gaining momentum and lot adoption started to expand, security experts already began to look at the potential risks of ransomware attacks when they involve the loT. Disruption is also the main goal for ransomware attacks in other industries, which likely also rely to some extent on loT devices and systems. In the Trend Micro midyear roundup, we reported how manufacturing, healthcare, and food and beverage were among the top five industries that saw the most ransomware activity. The healthcare industry saw attacks from the likes of Ryuk and Conti ransomware families, which added pressure to an already strained healthcare system amidst the pandemic. It is difficult to determine if these recent attacks had a direct impact on medical devices, but ransomware has been known to infect medical devices before. Connected medical devices, while incredibly useful today, can also act as entry points for attacks flaws that make them susceptible to malware infection. loT and ransomware are worth reexamining now that a different breed of ransomware families are targeting organizations and loT use has become widespread in the industrial sector. if not properly managed. Medical devices also carry vulnerabilities and loT and ransomware attacks Ransomware attacks hinge on being timely, critical, and irreversible. The involvement of loT in ransomware campaigns can amplify the impact of attacks because of cascading consequences especially in the case of critical infrastructure. In addition, loT devices widen the attack surface through which ransomware can be deployed. These are conditions that can exacerbate disruptions. Aside from the healthcare industry, the food production industry has also adopted loT tools and systems to optimize production. According to an FBI advisory, ransomware attacks are targeting the food and agriculture sector to exfiltrate and encrypt data. They note how the sector is becoming increasingly more reliant on lot processes, expanding the attack surface. Some of these attacks did not only cost the victims, but also affected the supply chain, driving prices up for consumers. Ransomware attacks pose a threat to OT systems Routers and other loT devices as entry points for malware The loT can significantly redefine the attack surface an organization would need to secure. This concern also includes every-day loT devices such as smart appliances and routers. Once set up, some loT devices, specifically routers, are often forgotten in the Ransomware operators like DarkSide have set their sights on critical infrastructures or high-profile targets. These organizations likely rely on operational technology (OT) and industrial control systems (1CS), which raises the urgency and the stakes involved in a ransomware attack. Ransomware attacks have become such a threat to OT assets that the US Cybersecurity and Infrastructure Security Agency (CISA) released a fact sheet to inform organizations about them. background, never to be examined again unless something goes wrong. But these devices can be exploited to allow ransomware to enter a system. Botnet malware, a well-known problem for loT devices, can also be used to distribute other malware In our research on loT botnets, we found that it is still possible for routers to remain infected with a batnet that has been defunct for two years, highlighting how seemingly simple devices can act as a doorway for critical attacks. Attacks that involve OT systems can be dangerous and have cascading effects down the supply chain, pressuring victim organizations to comply with ransom demands. The convergence of IT and OT components can open a path for attackers to cross from IT to OT networks. Ransomware attacks on loT devices It is important to note, however. that ransomware rarely target OT systems directly. The EKANS ransomware is a rare example that is capable of stopping ICS software processes. while most ransomware families today, such as Ryuk. REvil. and Conti. target IT systems. However, intrusions into the IT network can disrupt and impact the OT network even if it has nat been infected directly by ransomware This was the case for Colonial Pipeline, which had to shut down its systenms to prevent the loT ransomware is a ransomware attack targeting loT devices. In such a scenario threat actors control or lock a device (or several devices) to extort payment An example of a ransomware variant that crossed over to a specific loT device is FLocker an Android mobile lock-screen ransomware that shifted to smart TVs. Two separate researches have also tested ransomware attacks on a smart thermostat device and a coffee machine. Such attacks have not progressed much in recent years
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
Related questions
Question
a. From the case study above, briefly describe what is data security. Provide
examples to support you answer.
Answer should be in paragraph, thank you
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY