Cyber Threatscape: Accenture Security
Cyber Threatscape: Accenture Security
Cyber Threatscape: Accenture Security
CYBER
THREATSCAPE
REPORT
Accenture Security
CONTENTS
EXECUTIVE SUMMARY 3
What’s inside? 6
A FLEXIBLE FUTURE 85
CONTACTS 88
Accenture Cyber Threat Intelligence (Accenture CTI) has been creating relevant,
timely and actionable threat intelligence for more than 20 years. Now, following
the acquisitions of Context1 in March 2020 and Seattle-based Security of Things
company, Deja vu Security2 in June 2019, Accenture Security has gained an
additional 20 years’ intelligence reporting and deep expertise in the techniques,
tools and methods for securing connected devices and Internet of Things (IoT)
networks. The cyber threat intelligence team, referred to in this report as Accenture
CTI, provides IT security and business operations with actionable and relevant
decision support.
Since our last report in 20193, our cyber threat intelligence and incident response
teams have investigated numerous cases of suspected cyber espionage and
financially-motivated targeting. During these investigations, threat intelligence
analysts and incident responders have gained first-hand visibility of the tactics,
techniques and procedures (TTPs) employed by some of the most sophisticated
cyber adversaries.
1 Accenture Acquires Context Information Security, a UK-Based Cybersecurity Consultancy, March 06, 2020. https://newsroom.
accenture.com/news/accenture-acquires-context-information-security-a-uk-based-cybersecurity-consultancy.htm
2 Accenture Acquires Deja vu Security, Seattle-Based ‘Security of Things’ Company, June 17, 2020 https://newsroom.accenture.
com/news/accenture-acquires-deja-vu-security-seattle-based-security-of-things-company.htm
Sophisticated threat actors are employing new TTPs to help achieve their long-
standing objectives of regime survival, economic acceleration, military superiority,
information operations and cyber espionage. As we detail later in this report,
our threat intelligence analysts have seen adversaries develop new implants for
use against Outlook Web Access (OWA) and Exchange environments, and more
sophisticated command and control methods that attempt to disrupt detection
efforts through internal proxy mechanisms.
Criminals will still work to monetize access to data or networks, perhaps more
frequently than before as the economy continues to be vulnerable. As we have
seen this year, supply chain compromise and off-the-shelf tools could feature
heavily, as could ongoing evidence of custom tools designed to evade defenses.
Ransomware has increased in popularity among bad actors, as data theft increases
the pressures on victims. With game-changing ransomware attacks, such as the
Maze threat5, the name-and-shame technique has gained momentum that calls into
question the cost versus disruption debate.
Read on to take a deeper dive into the five frontline trends identified in 2020.
These insights can enhance the work of security teams and put security technology
investments, security processes and the business strategy on a firm footing to help
achieve the desired level of cyber resilience.
5 Abrams, Lawrence. “Allied Universal Breached by Maze Ransomware, Stolen Data Leaked,” Bleeping
Computer, November 21, 2019. https://www.bleepingcomputer.com/news/security/allied-universal-
breached-by-maze-ransomware-stolen-data-leaked/
What's inside?
The 2019 Cyber Threatscape report noted that strong investment
in cybersecurity was not lacking. But despite these investments,
good threat intelligence was a priority to tackle the relentless
pressure from cybercriminals and nation-states and the gaps in
the cyber defense posture of suppliers, partners and acquisitions.
8 Abrams, Lawrence. “Allied Universal Breached by Maze Ransomware, Stolen Data Leaked,”
Bleeping Computer, November 21, 2019. https://www.bleepingcomputer.com/news/security/
allied-universal-breached-by-maze-ransomware-stolen-data-leaked/
In this report, Accenture CTI offers leading practices to help tackle these
frontline trends and introduce adaptive security measures that can secure
mindsets, network access, work environments and collaboration.
Key observations
• Plan to execute months-long business continuity plans (BCP), including
information security monitoring and response, while operating under
quarantine conditions.
COVID-19-related discussions
in cybercrime underground
While many threat actors are eager to take advantage of the global pandemic
for monetary gain, some voices within cybercrime forums have expressed
opposite opinions, refusing to use COVID-19 themes in cyberattacks:
Figure 1.
10 “The DarkHotel (APT-C-06) Attacked Chinese Institutions Abroad via Exploiting SangFor VPN Vulnerability,” Qihoo 360, April 8, 2020
https://web.archive.org/web/20200406120301/http://blogs.360.cn/post/APT_Darkhotel_attacks_during_coronavirus_pandemic.html
12 Del Rosso, Kristin. “Nation-state Mobile Malware Targets Syrians with COVID-19 Lures”. April 15, 2020. Lookout Blog,”
https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures
• Accenture CTI analysts found a significant increase in the sale of the popular
Android banking Trojan “Cerberus” on criminal underground forums.
• Another actor seemed to have offered the sale of two false COVID-19-themed
landing pages for the actor’s Androidmalware injection service, as part of his
own Trojan or for others to deploy via other malware families.
• Ensure the computers and devices WFH employees use are updated
with the most current system and application versions.
VPN vulnerabilities
With increased use of VPNs, Accenture CTI recommends organizations review
their VPN security postures. Employee remote access to company networks
has caused an increase in VPN traffic. To deal with the increase in monetary
bandwidth costs, the VPN configuration that most organizations use most
often is a “split-tunnel” configuration. In this configuration, a VPN client
only connects a user to an organization for the resources it needs from that
organization and will connect the user directly to the Internet for everything
else, accessible only through an Internet connection. This setup saves a lot
of bandwidth for organizations. Split-tunnel VPN configurations can also lead
to decreased monitoring from an organization’s information security (infosec)
team, as infosec teams are only able to see organization-bound traffic,
with no visibility into direct Internet traffic from remote hosts. Accenture
CTI recommends reviewing VPN configurations to make sure there are no
unwitting DNS leaks of internal hostnames.
Espionage: The virus panic serves as merely the latest tool in ongoing
attempts to spy on, discredit and weaken adversary governments.
In addition to the financially motivated COVID-19-themed phishing
activity described in this report, since February 2020, Accenture CTI
has observed COVID-19 lure documents dropping cyberespionage
malware linked to several groups whose activity aligns with the strategic
priorities of various nation-states. Threat actors who breached healthcare
related entities during this time may have been seeking intelligence
on pandemic-related topics, such as disease spread or vaccine and
pharmaceutical research, as countries competed for scarce equipment
and medicines16. Alternatively, threat actors may have viewed the
overstretched healthcare agencies as easy prey in this distracted time.
14 Huntley, Shane, “Findings on COVID-19 and online security threats,” April 22, 2020, Google Threat Analysis
Group, https://www.blog.google/technology/safety-security/threat-analysis-group/findings-covid-19-and-
online-security-threats/; Vavra, Shannon, “Cybercriminals, nation-states increasingly tailoring coronavirus
spearphishing campaigns,” March 12, 2020, Cyberscoop, https://www.cyberscoop.com/coronavirus-phishing-
scams-iran-china
15 Popper, Nathaniel, “’Pure hell’ for victims as stimulus programs draw a flood of scammers,” April 22, 2020, New
York Times, https://www.nytimes.com/2020/04/22/technology/stimulus-checks-hackers-coronavirus.html;
Intelgraph reporting.
16 Satter, Raphael, “UPDATE 1-Foreign state hackers target U.S. coronavirus treatment research-FBI official,”
Reuters, April 16, 2020. https://www.reuters.com/article/health-coronavirus-cyber/update-1-foreign-state-
hackers-target-u-s-coronavirus-treatment-research-fbi-official-idUSL1N2C41ZG
17 Cimpanu, Catalin, “Spying concerns raised over Iran's official COVID-19 detection app,” ZDNet, March 9, 2020.
https://www.zdnet.com/article/spying-concerns-raised-over-irans-official-covid-19-detection-app/
18 Abrams, Lawrence, “Ransomware Gangs to Stop Attacking Health Orgs During Pandemic,” Bleeping Computer, March
18, 2020. https://www.bleepingcomputer.com/news/security/ransomware-gangs-to-stop-attacking-health-orgs-during-
pandemic/ ; Goodwin, Bill, “Cyber gangsters hit UK medical firm poised for work on coronavirus with Maze ransomware
attack,” Computer Weekly, March 22, 2020., https://www.computerweekly.com/news/252480425/Cyber-gangsters-hit-
UK-medical-research-lorganisation-poised-for-work-on-Coronavirus
20 Slowik, Joe, “Spyware Stealer Locker Wiper: LockerGoga Revisited,” Dragos, April 2020. https://dragos.com/resource/
spyware-stealer-locker-wiper-lockergoga-revisited/
21 “White Supremacist Groups Are Recruiting With Help From Coronavirus – and a Popular Messaging App,” Time Magazine,
April 8, 2020. https://time.com/5817665/coronavirus-conspiracy-theories-white-supremacist-groups/
22 Valentino-Devries, Jennifer et al, “A scramble for virus apps that do no harm,” New York Times, April 29, 2020.https://
www.nytimes.com/2020/04/29/business/coronavirus-cellphone-apps-contact-tracing.html
23 Arjun Kharpal, “Use of surveillance to fight coronavirus raises concerns about government power after pandemic ends”
CNBC, March 26, 2020. https://www.cnbc.com/2020/03/27/coronavirus-surveillance-used-by-governments-to-fight-
pandemic-privacy-concerns.html
24 Will de Freitas, “Coronavirus: drones used to enforce lockdown pose a real threat to our civil liberties”. The Conversation,
May 26, 2020. https://theconversation.com/coronavirus-drones-used-to-enforce-lockdown-pose-a-real-threat-to-our-
civil-liberties-138058
25 Harwell, Drew, “Managers turn to surveillance software, always-on webcams to ensure employees are (really) working
from home, Washington Post, April 30, 2020. https://www.washingtonpost.com/technology/2020/04/30/work-from-
home-surveillance/
26 Osborne, Charlie, Students, university clash over forced installation of remote exam monitoring software on home PCs,
ZDNet, April 20, 2020., https://www.zdnet.com/article/students-university-clash-over-plans-to-install-remote-exam-
monitoring-software-on-home-pcs
• Security risk is present not only from the contact-tracing applications themselves,
but also from how/where the data is being collected and stored. A centralized
approach is contrary to Apple and Google’s decentralized approach, where a large
portion of data is stored on the user’s device29. The latter approach immediately
reduces the likelihood that threat actors could compromise large data sets
containing sensitive information. In addition, data storage locales and access
privileges are being cited as points of concern for the public.
• Most contact-tracing apps rely on Bluetooth Low Energy technology that is rife
with vulnerabilities. These vulnerabilities enable threat actors to compromise
phones that are not patched with the latest software updates continuously.
30 “US charges Chinese Covid-19 research 'cyber-spies” BBC Online, July 21, 2020.https://www.bbc.co.uk/
news/world-us-canada-53493028
31 Zurier, Steve, “Could Return of Ghost Squad Hackers Signal Rise in COVID-19-Related Hacktivism?,”
DarkReading. April 16, 2020, https://www.darkreading.com/attacks-breaches/could-return-of-ghost-
squad-hackers-signal-rise-in-covid-19-related-hactivism/d/d-id/1337588
32 “Fed shares insight on how to combat synthetic identity fraud”, WeLiveSecurity July 6, 2020,. https://www.welivesecurity.
com/2020/07/06/fed-shares-insight-how-combat-synthetic-identity-fraud/
33 Shead, Sam, “Britain’s NHS shuns Apple and Google as it rolls out coronavirus contact-tracing app,” CNBC, May 5, 2020. https://
www.cnbc.com/2020/05/05/britains-nhs-shuns-apple-and-google-as-it-rolls-out-coronavirus-contact-tracing-app.html
34 “Whittaker, Zack, “Security Lapse at India’s Jio exposed coronavirus symptom checker results,” TechCrunch. May 2, 2020, https://
techcrunch.com/2020/05/02/jio-coronavirus-security-lapse/
Some privacy advocates have raised concerns over who owns the data centers, where
the physical data centers are located, and which third parties may gain access to
sensitive information stored there41. Data privacy advocates in one Eastern European
country have alleged that their government’s tracing app sends user data, including
35 Smits, Paul, “Privacy Expert On Corona App Stigmatization Is Looming,” Innovation Origins, April 10. 2020.
https://innovationorigins.com/privacy-expert-on-corona-app-stigmatization-is-looming/
36 PEPP-PT, “Pan-European Privacy-Preserving Proximity Tracing,” viewed May 12, 2020, https://www.pepp-pt.org/
37 Farrell, Edward, “A Brief Analysis Of The CovidSafe App” April 27, 2020, Medium, https://medium.com/@mercury_ISS/a-brief-
analysis-of-the-covidsafe-app-cc88512e5975
38 Palmer, Danny, “Security Experts Warn Don’t Let Contact Tracing App Lead To Surveillance,” ZDnet, May 7, 2020, https://www.zdnet.
com/article/security-experts-warn-dont-let-contact-tracing-app-lead-to-surveillance/
40 Doffman, Zak, “Coronavirus Spy Apps: Israel Joins Iran And China Tracking Citizens’ Smartphones To Fight COVID-19,” Forbes,
March 14, 2020, https://www.forbes.com/sites/zakdoffman/2020/03/14/coronavirus-spy-apps-israel-joins-iran-and-china-tracking-
citizens-smartphones-to-fight-covid-19/#43b59be8781b
41 Clarke, Laurie, “Uncertainty Over Who Could Access NHSX Contact Tracing App Data As Pilot Goes Live,” NS Tech, May 4, 2020.
https://tech.newstatesman.com/coronavirus/uncertainty-over-who-could-access-nhsx-contact-tracing-app-data-as-pilot-goes-live
As engineers develop contract-tracing apps rapidly, they might not observe data
security best practices, as illustrated by the Dutch government when it shortlisted
a developer to build a contact-tracing app. The developer posted the code online
to be scrutinized and developers identified that the source files exposed user data.
A spokesperson alleged that the data was “accidentally put online due to the haste
in which the team wanted to make the source code available for analysis43”.
43 Osborne, Charlie, “Proposed government coronavirus tracking app falls at the first hurdle due to data breach,”
ZDNet, April 20, 2020. https://www.zdnet.com/article/proposed-government-coronavirus-app-falls-at-the-first-
hurdle-due-to-data-breach/
45 “Singapore to begin nationwide distribution of COVID-19 contact tracing wearables,” ZDNet, September 9,
2020. https://www.zdnet.com/article/singapore-to-begin-nationwide-distribution-of-covid-19-contact-tracing-
wearables/#ftag=RSSbaffb68
46 “Why are Indian users so vulnerable to cyberattacks?” Factor Daily, November 17, 2016. https://factordaily.com/
why-is-india-vulnerable-to-cyberattacks-bug-bounty-programs-cybersecurity/
47 Gernot, Fritz, “Contact tracing apps in Austria: a Red Cross initiative,” Freshfields Bruckhaus Deringer, April 29,
2020. https://digital.freshfields.com/post/102g62d/contact-tracing-apps-in-austria-a-red-cross-initiative
49 Yu, Eileen, “Contact tracing apps unsafe if Bluetooth vulnerabilities not fixed,” ZDNet , April 25, 2020, https://
www.zdnet.com/article/contact-tracing-apps-unsafe-if-bluetooth-vulnerabilities-not-fixed/
50 Ibid.
3. Relying on open sourced code to build tracing apps and boosting public trust
in the process. An example of such approach is the “HaMagen” App used by
the Israeli Government to warn its citizens if they come into close proximity to
a COVID-19 positive case51. While this approach may avoid most surprise code
deficiencies, users might still be subjected to hacking attempts via unpatched
Bluetooth Low Energy vulnerabilities if they are near malicious actors or are
exposed to other vulnerabilities that are discovered in the future.
Accenture CTI analysts have made a comparative analysis based on seven official
apps released by different governments and organizations to assess their associated
security risks. We found that:
• Two of the analyzed tracing applications have implicit consensual user agreements
where it is stated that the information is shared with third-party organizations.
• The majority of the apps enable the tracking of the GPS location once installed;
in Accenture CTI’s analysts’ opinion, this functionality goes beyond what is needed
for contact tracing.
• In one case, a government enforces the use of a special phone SIM for any person
arriving from area of the world considered to be at high coronavirus risk.
• The majority of the apps have additional capabilities that can profile users
according to gender and age.
• In another case, the app was using a fake or rogue certificate to sign an official
government app.
51 Sommer, Allison, “Israel Unveils Open Source App to Warn Users of Coronavirus Cases,” Haaretz , March 23, 2020. https://
www.haaretz.com/israel-news/israel-unveils-app-that-uses-tracking-to-tell-users-if-they-were-near-virus-cases-1.8702055
52 D
offman, Zak, “Coronavirus Spy Apps: Israel Joins Iran And China Tracking Citizens’ Smartphones To Fight COVID-19,” Forbes,
March 14, 2020, https://www.forbes.com/sites/zakdoffman/2020/03/14/coronavirus-spy-apps-israel-joins-iran-and-china-
tracking-citizens-smartphones-to-fight-covid-19/#43b59be8781b
Track and trace programs are being developed extremely quickly. Some
clients may neglect normal security protocols in the name of speed. In
some cases this risk is unacceptable. Leading practices for implementing
COVID-19 track and trace include:
• Audit history
Automation: Third-party app security audit tools can alert companies to any
drift in security as new updates are made and security issues are missed.
Summary
Cybercriminals can take advantage of contact-tracing apps in several
ways, including gaining access to PII via data breaches, falsifying infection
statuses of users if their designated hash values are not updated frequently,
and gaining access to victims’ devices and personal data via Bluetooth Low
Energy vulnerabilities. One such incident of a data breach has already been
registered in a European country, highlighting the prominence of such a
threat vector53.
53 Ozborne, Charlie, “Proposed government coronavirus tracking app falls at the first hurdle due to data breach,” ZDNet,
April 20, 2020, https://www.zdnet.com/article/proposed-government-coronavirus-app-falls-at-the-first-hurdle-due-
to-data-breach/
54 Kwan, Campbell, “India orders mandatory use of COVID-19 contact tracing app for all workers,” ZDNet, May 4, 2020.
https://www.zdnet.com/article/india-orders-mandatory-use-of-covid-19-contact-tracing-app-for-all-workers/
Key observations
• New, sophisticated adversaries are exploiting platforms such as Microsoft Exchange
(Exchange), Outlook Web Access (OWA) and Outlook on the Web to enable
adversaries to conduct malicious activities.
• Attacks against these platforms range from relatively simple and even
crude—but nonetheless effective—through to extremely sophisticated.
Command and Control conduit and Data egress: Hosts supporting Exchange and
associated services frequently relay large volumes of data to external locations—
representing a prime opportunity for malicious actors to hide their traffic within
this background noise. Adversaries including BELUGASTURGEON (aka Turla or
Whitebear) have reportedly even co-opted functionality within Exchange to
manipulate legitimate traffic traversing Exchange55 as a means of relaying
commands or exfiltration of sensitive data.
Credential theft: As hosts such as CAS servers typically operate Web login
portals for services including OWA, adversaries with access to these devices
may be able to deploy capabilities to steal user login credentials. Notably, an
advanced persistent threat actor reportedly deployed Web shells to harvest
credentials from OWA users as they logged in56.
55 Faou, Matthieu, “TURLA LIGHTNEURON: One email away from remote code execution,” ESET, May, 2019 https://www.
welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf
56 A
sher-Dotan, Lital, “FAQs: Answering Your Questions About Cybereason Lab’s Discovery—a Microsoft OWA Backdoor,”
Cybereason, October 16, 2015. https://www.cybereason.com/blog/microsoft-owa-backdoor-questions-answered
57 Faou, Matthieu, “Tracking Turla: New backdoor delivered via Armenian watering holes,” welivesecurity,
March 12, 2020 https://www.welivesecurity.com/2020/03/12/tracking-turla-new-backdoor-armenian-
watering-holes/
58 Faou, Matthieu, “TURLA LIGHTNEURON: One email away from remote code execution,” ESET, May, 2019
https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf
The command and control (C2) channel and data exfiltration is implanted via
e-mail attachments. The attachments are both legitimately structured PDF
and JPG formats and use filenames and naming structures predefined in
the configuration. Inside these files, the tool hides commands and data for
exfiltration in an AES-256-encrypted container, with an XOR routine for data
validation. Users can accomplish C2 and exfiltration using either specially
crafted e-mails or modified legitimate ones.
China Chopper Web shell. When used legitimately, these filters permit IIS server
administrators to implement additional functionality to IIS, beyond that enabled
natively; they take the form of Windows DLL files deployed to those servers,
which perform certain actions. Much of this functionality is highly valuable
to malicious actors. In particular, the ability to handle authentication requests,
serve arbitrary files or perform processing in response to certain requests can
be useful in gaining unauthorized access to a victim system. Malware tools
typically contain interactive remote command functionality as well as the
means to steal credentials.
Figure 2.
In 2019, Accenture CTI analysts discovered several malicious files in the wild that
they assess with moderate confidence to be associated with BLACKSTURGEON's
ongoing targeting of government and public sector organizations. One of the files
appears to be a version of BLACKSTURGEON’s customized version of the “RULER”
tool designed to abuse Microsoft Exchange services60. This file exploits the CVE-
2017-11774 Outlook vulnerability, a security feature bypass vulnerability that affects
Microsoft Outlook and enables attackers to execute arbitrary commands61. These
malware samples thought to be from BLACKSTURGEON, and executable files
United States Cyber Command provided to the public in July 2019 via online
malware scanner service VirusTotal62, appear also to have been used in Shamoon2
activity, which targeted Saudi Arabian government entities around January 201763.
61 IDefense Security Intelligence Services. “BLACKSTURGEON Actors Exploit CVE-2017-11774 Using RULER Hack
Tool.” July 8, 2019. IntelGraph reporting.
63 IDefense Security Intelligence Services. “Shamoon2: Second Round of Wiper Activity.” February 8, 2017.
IntelGraph reporting.
This threat actor was also observed using the “netsh” technique to establish
“proxy” or “bouncer” hosts, which it designed to route traffic originating from
one host on a particular port to another host on a different port. The threat
actors used this technique on bastion hosts between segregated or separated
networks so they could access the hosts remotely from staging locations
elsewhere in the network (typically from other physical locations).
64 RDP is a communications protocol designed by Microsoft for remote management and access to virtual desktops
A notable aspect of the newer BlueBird sample is that its command and
control is configured as an internally routable IP address rather than an
externally-routable IP address or domain. The threat actors have used this
approach before, within victim environments where the actors had configured
compromised systems to act as proxies and automatically relay C2 traffic
to attacker-operated infrastructure. This approach can frustrate network
defenders, as binary analysis will not directly expose the attacker’s operational
infrastructure. In this instance, the actors accomplished command and
control over TCP port 53 using a custom binary protocol.
Summary
The innovations in techniques will naturally challenge network
defenders. State-aligned operators could continue—in most cases—to
need to emphasize stealth and persistence to meet their intelligence-
gathering goals. Such capabilities and detection evasion approaches
underline the importance of identifying and tracking priority
adversaries and then threat hunting against the specific behaviors
employed by the priority adversaries.
A growing number of politically and financially motivated adversaries are adopting these
approaches, suggesting they are yielding results now and could be even more frequently
employed as we look toward 2021.
Key observations
• Sophisticated state-sponsored and criminal actors continue to frequently use
penetration testing tools for complex intrusions.
• Researchers most frequently observe the tools Cobalt Strike, PowerShell Empire,
Metasploit and Mimikatz.
• Cyberthreat actors routinely chain together off-the-shelf tools with living-off-the-land
techniques, complicating detection and attribution.
• Off-the-shelf tools offer the benefits of deniability, continued effectiveness and ease
of use, so their proliferation could continue.
65 Heinemeyer, Max, “Catching APT41 exploiting a zero-day vulnerability,” Darktrace, April 2, 2020,
https://www.darktrace.com/en/blog/catching-apt-41-exploiting-a-zero-day-vulnerability/
66 Microsoft Threat Protection Intelligence Team, “Ransomware groups continue to target healthcare, critical services;
hers’s how to reduce risk,” April 28, 2020. https://www.microsoft.com/security/blog/2020/04/28/ransomware-
groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk/
67 JW, “Trickbot to Ryuk in Two Hours,” Wilbur Security, March 25, 2020, https://www.wilbursecurity.com/2020/03/
trickbot-to-ryuk-in-two-hours/
A durable trend
It is highly likely that both state-sponsored and organized criminal groups
will continue to use off-the-shelf and penetration testing tools for the
foreseeable future. Their advantages in scalability of operations, ease of
use and deniability, alongside their continued operational effectiveness,
simply make them useful and cost-efficient, and there is a strong possibility
they could proliferate. Threat actors are likely to use these tools in mass-
access campaigns, exploiting emerging vulnerabilities where researchers
have already published proof-of-concept code. This same threat group has
led the way in automating this activity, but Accenture CTI expects other
experienced state-sponsored groups, cybercriminals and emerging state-
sponsored actors to follow suit. Sophisticated actors may use penetration
testing tools heavily in intrusion staging phases before moving to alternative
techniques, where required, to achieve their objectives. They are likely
to practice a combination of living-off-the-land and bespoke capability.
Network defenders should consider off-the-shelf tools an option that
sophisticated adversaries may use where beneficial, as opposed to a
critical capability on which they rely. For example, Accenture CTI incident
responders have directly observed the state-sponsored threat group they
call SOURFACE achieve credential dumping with both native Windows
utilities and off-the-shelf tooling variants, using procdump to dump the
local security authority subsystem service (LSASS) in a recent intrusion and
having utilized Mimikatz previously. Emerging state programs and organized
criminal groups are likely to use a broader range of functionality afforded
by these tools. While many have shown an ability to use native functions to
similar effect, such as RDP, WMI and PsExec, tools like Cobalt Strike remain
an effective, user-friendly option.
Since late 2019, the Accenture CTI team has observed SNAKEMACKEREL
(aka APT28, Fancy Bear, Sofacy), believed to be conducted by threat actors
located in Russia, enact significant changes in their TTPs and operational
tempo. The group still makes extensive use of captive portals—Web pages
that welcome new, often guest network users before permitting network
access—for credential phishing against high-priority targets, primarily
within the aerospace, defense, aviation, government, academia and
financial industries. However, SNAKEMACKEREL actors have increased their
targeting of United States government agencies, education institutions and
energy sector entities in 202068.
68 Andy Greenberg, “Russia's GRU Hackers Hit US Government and Energy Targets” Wired, July 24, 2020.
https://www.wired.com/story/russia-fancy-bear-us-hacking-campaign-government-energy/
69 MSRC Team, “Corporate IoT—a path to intrusion,” Microsoft Security Response Center, August 5, 2019,
https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/
Figure 3.
Figure 4.
Post-compromise persistence
SNAKEMACKEREL actors have modified existing remote connectivity
binaries and components to provide persistent access in recent
compromises of Linux and Unix-like operating systems. As well
as replacing legitimate Sshd binaries on compromised hosts with
malicious versions, SNAKEMACKEREL operators have also replicated
a well-documented but uncommon technique70 to enable covert
access. This technique involves modifying components of the
Pluggable Authentication Module (PAM) framework, commonly used
for handling both local and remote user authentication, to perform
malicious functions or provide non-standard capability.
70 Mitsurugi, “Creating a backdoor in PAM in 5 line of code,” Le journal d’un reverser, June 16, 2016.
http://0x90909090.blogspot.com/2016/06/creating-backdoor-in-pam-in-5-line-of.html
71 Alsbih, Amir, “Secret Passage—Techniques for building a hidden backdoor,” Linux Magazine, 2007.
https://nnc3.com/mags/LM10/Magazine/Archive/2007/77/022-028_backdoors/article.html
72 Zaryn, Stanislaw, “#Poland has been hit by a complex disinformation operation corresponding
to the modus operandi of #Russia,” Twitter posting, April 23, 2020, https://twitter.com/StZaryn/
status/1253362903643799555
73 Constantin, Lucian, “Chinese hacker group APT41 uses recent exploits to target companies worldwide” CSO Online, March 25, 2020
https://www.csoonline.com/article/3534003/chinese-hacker-group-apt41-uses-recent-exploits-to-target-companies-worldwide.html
74 Heinemeyer, Max, “Catching APT41 exploiting a zero-day vulnerability,” Darktrace, April 2, 2020 https://www.darktrace.com/en/blog/
catching-apt-41-exploiting-a-zero-day-vulnerability/
75 Brian Krebs, “Experts: Breach at IT Outsourcing Giant Wipro”Krebs On Security, April 15, 2019
https://krebsonsecurity.com/2019/04/experts-breach-at-it-outsourcing-giant-wipro/
76 Taylor, Alan, “World War I: The Pacific Islands,” The Atlantic, September 25, 2011
https://www.theatlantic.com/photo/2011/09/world-war-ii-the-pacific-islands/100155/
Global moves over the last few years toward supply chain complexity and
demand-driven material requirements planning has created new vectors of
approach for cyberthreat actors, including new direct supplier and distribution
relationships, new communications channels, and new data management
tools such as cloud operations.77 These now exist on top of longstanding
state-sponsored cyberthreat efforts to gain access to key business operations
and leadership targets through critical and closely-placed vectors, such
as law firms, consultants, and social media. Recent United States efforts
to domesticate supply chains for critical services like information and
communications technology (ICT) and bulk electric power supplies cite the
vulnerability of national critical infrastructure supply chains as a key factor
in current challenges to secure these industry sectors78,79. Also, China has
recently finalized rules for the cybersecurity review of critical information
technology infrastructure acknowledging vertical and horizontal supply
chain challenges to information and data security80,81. As COVID-19 related
disruptions further push businesses toward remote work arrangements and
a greater degree of automation, supply chain relationships may continue to
become more complex. The National Institute of Standards and Technology
(NIST) Cyber Supply Chain Risk Management guidelines and focused security
planning may help businesses concerned about cyberthreat targeting via
supply chain weaknesses82.
78 White House, “Executive Order on Securing the Information and Communications Technology and Services Supply
Chain,” May 15, 2019 https://www.whitehouse.gov/presidential-actions/executive-order-securing-information-
communications-technology-services-supply-chain/
79 W
hite House, “Executive Order on Securing the United States Bulk-Power System,” May 1, 2020
https://www.whitehouse.gov/presidential-actions/executive-order-securing-united-states-bulk-power-system/
80 IDefense Security Intelligence Services, “China’s ‘Cybersecurity Review Measures’ Emphasize Supply Chain Risks
and Foreign Control,” July 20, 2019. IntelGraph reporting.
81 Dudley, Lauren, et al, “China’s Cybersecurity Reviews Eye ‘Supply Chain Security’ in ‘Critical’ Industries
[Translation],” April 27, 2020 https://www.newamerica.org/cybersecurity-initiative/digichina/blog/chinas-
cybersecurity-reviews-eye-supply-chain-security-critical-industries-translation/
82 National Institute of Standards and Technology, “Cyber Supply Chain Risk Management,” updated March 20, 2020.
https://csrc.nist.gov/Projects/cyber-supply-chain-risk-management/Best-Practices
Summary
Senior decision makers should be kept abreast of the rapid and constant
evolution in adversary tradecraft to support network defenders with the
resources and business and technical mitigations required to adapt and
stay ahead. Continuous and bespoke threat intelligence tailored for the
specific organizational profile should be a priority—from strategic to tactical
and technical—as is an intelligence-led security approach that focuses on
the most important mitigations for identified adversaries. Organizations
should ensure they understand the commonly used tools and techniques,
especially those involving malicious use of native systems and penetration
test tools, and validate they can be detected in their environment. Doing so
could significantly reduce the risk posed by both nation-states and highly
disruptive criminals.
04 RANSOMWARE FEEDS
NEW PROFITABLE, SCALABLE
BUSINESS MODELS
Overview
Ransomware threat actors are seeing fresh success in 2020, having established a new
profitable and scalable business model. Alongside finding new ways to infect businesses
with ransomware, they are stealing company data, thereby turning ransomware attacks
into data breaches. This often-sensitive data is used to extort the victim, sometimes
through public channels, such as the news media, turning what was a potentially
expensive ransomware recovery process into a longer-term problem, involving notification
requirements and brand reputation damage. Threat actor groups such as Maze, Sodinokibi,
and DoppelPaymer are the trailblazers who have experienced success using this model,
resulting in a spate of copycat actors which we predict will last well into 2020 and beyond.
Key observations
• The creation of ransomware threat actors’ “name and shame” websites is
providing a way for them to centralize and publicize their operations, adding
pressure on victims to pay ransoms. The Maze Team was one of the first to
go this route at the end of 2019, leading many others to copy the method.
• Although law enforcement and the cybersecurity industry have always advised
against paying ransoms, a combination of these new threat actor tactics, some
insurance companies starting to advise paying the ransom (and claiming back
the costs according to their policy), and disruption caused by a global pandemic,
has resulted in many affected organizations going against this advice, leading to
healthy profits for threat actors.
• Accenture CTI analysts predict that in 2020 and going forward into 2021, these
tactics can escalate. Threat actor profits is likely to increase as a result of targets’
weakened security and remote working, enabling threat actors innovate and
invest in even more advanced ransomware.
On December 7, 2019, the City of Pensacola fell victim to Maze Team, who
this time demanded US$1 million in ransom money84. Using the same media
outlet, the Maze Team set out their demands, using Allied as an example of
what would happen if they were not met. These two incidents in themselves
were not new behaviors—actors behind ransomware strains such as Snatch and
Robinhood had already attempted to combine ransomware with data theft and
extortion. However, by the end of 2019, Maze took a step which would enable
their operation to become scalable—they launched a website on the clear Web
on which they would “name-and-shame” their non-compliant victims, calling
it “Maze News.” Starting life with just a handful of victims, each contained
company name, company website, date of infection, varying amounts of
identifying company or staff information, a list of “locked” IP addresses, and
at least one file containing stolen victim data available for anyone to download
as proof of the theft.
83 Abrams, Lawrence. “Allied Universal Breached by Maze Ransomware, Stolen Data Leaked,” , Bleeping Computer, November 21,
2019. https://www.bleepingcomputer.com/news/security/allied-universal-breached-by-maze-ransomware-stolen-data-leaked/
84 Abrams, Lawrence. “Maze Ransomware Behind Pensacola Cyberattack, $1M Ransom Demand,” Bleeping Computer, December 11,
2019. https://www.bleepingcomputer.com/news/security/maze-ransomware-behind-pensacola-cyberattack-1m-ransom-demand/
By launching this site, Maze Team no longer had to approach media outlets to
put pressure on new victims to pay—the media could come to them. In just a
few weeks, the site contained 27 active victims; and in a couple of months, it
listed 40. If a victim pays the ransom, they are removed from the list. The site
was briefly shut down in December 2019 by the hosting provider in Ireland,
but Maze quickly relaunched it in Singapore. The website has evolved over
time, as have the extortion tactics employed by the Maze Team. They added
a “new victims” section so that, as numbers have grown, visitors can easily
see who the latest victims are, and an “archived” section, where they upload
all of the stolen victim data of companies who refused to cooperate, proving
they follow through with their threats. They periodically publish press releases
to their home page, which they use to set out terms and conditions, or tell
individual tales about non-compliant victims to add more pressure on them
and others to pay (Figure 5).
Figure 5.
1. In case of unsuccessful negotiations with our clients or in case of the agreement breach, Maze Team will use all the gathered data for it’s benefit. All
the gathered data can be sold, published, used for phishing or for reputation ruining of the company, it’s owners and it’s business partners. All the
responsibility is on the company that allowed sensitive data to be leaked and being careless about it even after a leak.
2. Maze Team will never publish, share with third parties or use in any other way the data from the client in case of positive agreement with the client.
5. Maze Team keeps the communication with the major Securities and Financial Regulators and will acknowledge them on all data leaks and breaches
if the agreement is not reached.
6. Maze Team is not trying to hide it’s activity and provides the major mass media with press releases of the successful attacks if no agreement was
reached.
7. Maze Team keeps the will share the gathered financial information with major Finincial Regulators
Analysis by Accenture CTI of the site over time shows the victims have been
predominantly US-based, but the Maze Team does not appear to favor
one industry over another—they have advertised breaches of everything
from truck repair shops, to schools, to medical research facilities, to global
construction firms, most of which received varying degrees of social or
news media coverage. The apparent success of this approach has caused
led to a string of copycats.
“We also download huge amount of your private data, including finance
information, clients’ personal info, network diagrams, passwords and so on.
Don’t forget about GDPR.”
This warning about GDPR reminds victims that ransomware infections are now
becoming data breaches, meaning not only do victims face the prospect of a
lengthy and expensive recovery process if they do not pay the ransom, but also
there are potential legal ramifications if the breach is not reported in a timely
manner to the relevant authorities.
86 Rivero Lopez, Marc. “Tales From the Trenches; a LockBit Ransomware Story,” McAfee Labs, April 30, 2020,
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/tales-from-the-trenches-a-lockbit-ransomware-story/
that, there is no guarantee the data stolen will be destroyed once a ransom is
paid, despite promises made by the threat actors. It is a high possibility that the
data will be kept for future operations or sold on for additional profit.
However, the success of these new ransomware tactics has forced organizations
to recalibrate their calculus in determining whether or not to pay. There have
been many incidents of victims paying ransoms, rather than potentially facing
an expensive clean-up process, the penalties associated with a data breach,
and the negative press and reputational damage associated with the incident
becoming public knowledge. Even so, compromises are often leaked to media,
despite best efforts to pay the ransom quickly and quietly. These lines have been
blurred further by the fact that many cyber-insurance providers are encouraging
victims to pay ransoms88 (Figure 6).
Figure 6.
87 IDefense Security Intelligence Services, “Extortion Entrepeneurs: How Cybercriminals are Bullying Business,”
April 7, 2020. IntelGraph Reporting
88 Palmer, Danny, “Ransomware: Cyber-insurance payouts are adding to the problem, warn security experts”,
ZDNet, September 17, 2019. https://www.zdnet.com/article/ransomware-cyber-insurance-payouts-are-
adding-to-the-problem-warn-security-experts/
89 Upatham, Patrick & Treinen, Jim, “Amid COVID-19, Global Orgs See a 148% Spike in Ransomware Attacks; Finance
Industry Heavily Targeted”, Carbon Black, April 15, 2020. https://www.carbonblack.com/2020/04/15/amid-covid-
19-global-orgs-see-a-148-spike-in-ransomware-attacks-finance-industry-heavily-targeted/
90 Microsoft Threat Protection Intelligence Team, “Ransomware groups continue to target healthcare, critical
services; here’s how to reduce risk”, Microsoft Corp, April 28, 2020. https://www.microsoft.com/security/
blog/2020/04/28/ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk/
91 Winder, Davey, “Hackers Promise 'No More Healthcare Cyber Attacks' During COVID-19 Crisis”, Forbes, March
19, 2020, https://www.forbes.com/sites/daveywinder/2020/03/19/coronavirus-pandemic-self-preservation-not-
altruism-behind-no-more-healthcare-cyber-attacks-during-covid-19-crisis-promise/
The most common ransomware attack vector continues to be poorly secured Remote
Desktop Protocol (RDP) access points which has been intensified by the fact that
there has been a marked increase in exposed RDP endpoints due to the surge in the
need for remote working93. What is more, ransomware threat actors are now targeting
vulnerabilities in Virtual Private Networks (VPNs) and other remote working tools and
software—in particular Sodinokibi has infected victims by exploiting unpatched Pulse
Secure VPN servers94.
The mobile world has remained relatively overlooked by ransomware until recently –
however a malware family called “Black Rose Lucy”, which was originally a ‘Malware-as-
a-Service’ (MaaS) botnet in 2018, has developed ransomware capabilities, encrypting
files on an infected device and displaying a ransom note purporting to be from the
FBI, demanding a fine be paid97. There was no evidence of data theft by this malware,
however it is proof that threat actors are making strides in targeting mobiles, and its
evolution means data theft and extortion is not far away.
93 Aprozper, Asaf, “127% Increase in Exposed RDPs Due to Surge in Remote Work”, Reposify, March 30, 2020.
https://blog.reposify.com/127-increase-in-exposed-rdps-due-to-surge-in-remote-work
94 N
ational Cyber Awareness System, “Alert (AA20-010A) Continued Exploitation of Pulse Secure VPN
Vulnerability”, US CERT, April 15, 2020. https://www.us-cert.gov/ncas/alerts/aa20-010a
95 Umawing, Jovi, “Threat spotlight: the curious case of Ryuk ransomware”, December 12, 2019, Malwarebytes Labs.
https://blog.malwarebytes.com/threat-spotlight/2019/12/threat-spotlight-the-curious-case-of-ryuk-ransomware/
96 Muncaster, Phil, “US Defense Contractor Hit by Ryuk Ransomware”, Infosecurity Magazine, January 31, 2020,.
https://www.infosecurity-magazine.com/news/us-defense-contractor-hit-by-ryuk/
97 Mana, Ohad, “Lucy’s Back: Ransomware Goes Mobile”, Checkpoint, April 28, 2020. https://research.checkpoint.
com/2020/lucys-back-ransomware-goes-mobile
Mitigation
Accenture CTI recommends the following actions, detailed versions
of which can be found in last year’s Accenture Security 2019 Cyber
Threatscape Report98:
Summary
Accenture CTI analysts expect the remainder of 2020 and early 2021
to be a troubling time for organizations in their attempts to defend
against ransomware and data theft. In last year’s Accenture Security
2019 Cyber Threatscape Report, we covered the topic of hybrid
motives of ransomware attacks as businesses were under attack from
both financially-driven ransomware strains, such as LockerGoga,
GandCrab and Troldesh, simultaneously with hacktivist and politically-
driven operations. In 2020, the focus is very much on financial gain,
with threat actors adding data theft and new extortion tactics to
their repertoire, while taking advantage of global fear and economic
uncertainty caused by the COVID-19 pandemic. Since the pandemic
and its impact show no sign of abating, Accenture CTI analysts expect
threat actors employing these tactics to continue to evolve and
proliferate for the remainder of 2020 and beyond.
05 CONNECTEDNESS HAS
CONSEQUENCES
Overview
In a period of unprecedented uncertainty within the Operational Technology
(OT) space, the security of some of our most critical systems is being called
into question. As more of these technologies are connected and workflows
are streamlined, it can be difficult to judge the added risk that this can pose.
Entire classes of vulnerabilities that may not have been relevant 10 to 20 years
ago are showing up in unexpected places, and attackers are now finding novel
ways to exploit them in this new (albeit quite old) landscape. Much of this has
also been encountered with the Internet-of-Things, and useful lessons can still
be learned from this space.
For the enterprise, this trend continues into much of the supporting
infrastructure and its devices. There are various devices scattered throughout
the enterprise network—the office printer, the surveillance cameras, the
wireless router; each one of these has an associated risk and, often, are not
subject to much scrutiny as they tend to be hidden away from the public eye.
Over the years, a form of technical debt has accrued, specifically in the
realm of insufficient security testing. Developers are often more focused on
making new technologies work before making them secure and enterprises
are still facing challenges that have resulted from this decision. New threats,
due to increased connectedness, continue to unfold and industries are
steadily improving. However =, there is still a long way to go, and there are
stark differences in overall security posture for devices produced by smaller
vendors versus the major players.
Key observations
• Web-based technologies are increasingly being used for the management of
devices, and the modern Web is an incredibly complex space. It is difficult to
properly secure these interfaces, and attackers are constantly finding new ways
to exploit them.
• We are entering an age where more and more critical systems are being exposed
to the Internet. Increased connectivity may add usability, but it also creates
additional attack surface that must be taken into consideration.
• The industry has started to respond to new Operational Technology (OT) threats
through public bug bounty programs and detection frameworks. While this is a
positive step in creating discussion around these challenges within the industry,
there is still a way to go in terms of implementing effective security controls in
the OT space.
• Security testing can be an expensive undertaking, and the market has not
provided a clear authority to speak to the overall security posture of a device.
As such, it is often difficult to fully gauge the risk posed by each device within
an organization. In general, we see dramatic differences in device security
testing when comparing minor and major manufacturers.
There are several teams within Accenture that engage with our clients at each stage
of the development lifecycle.
• Deja vu Security brings deep knowledge around threat modeling and device/
hardware development, as well as Web security.
• Accenture CTI continuously monitors for new and evolving threats in the wild,
providing businesses and governments with actionable security intelligence that
enables them to make smarter decisions.
• FusionX is the Accenture Incident Response and Attack Simulation arm and helps
our clients prepare for sophisticated, real-world attacks.
Virtualization of operational
technologies is increasing
Industrial technologies often develop at a slower pace than their consumer and IT
counterparts. Virtualization has been commonly used in the IT space for several
years and has only relatively recently moved toward seeing mainstream usage in
the OT space. Virtualization in the OT space enables quick deployment of systems,
optimizing resource usage, and for redundancy and faster recovery from disaster99.
99 Gupta Vibhoosh, “Industrial virtualization heads to the plant floor”, December 4, 2019, Control Engineering,
https://www.controleng.com/articles/industrial-virtualization-heads-to-the-plant-floor/
100 Johansson, Erik, “Virtualisation in Control Systems Possibilities and Challenges”, October 27, 2009, ABB Group,
https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1493741896.pdf
101 P
iggin, Richard, “Are industrial control systems ready for the cloud?”, December 2014, International Journal of
Critical Infrastructure Protection Volume 9, https://www.researchgate.net/publication/269820923_Are_industrial_
control_systems_ready_for_the_cloud
Internet-connected devices
are increasing
The increasing trend of devices being connected to the Internet has also
been observed in the OT and ICS space. One key example is the growth
of smart metering in ICS systems. On the Critical National Infrastructure
(CNI) side, a large area of discussion is the growing demand for Smart-Grid
technology103. In November 2019, Tarlogic reported a several vulnerabilities
in PRIME, one of the most well-used smart metering standards104.
102 Willhoit, Kyle, “SCADA in the cloud: A Security Conundrum?”, Trend Micro, 2013.
https://www.trendmicro.ie/media/misc/scada-in-the-cloud-a-security-conundrum-en.pdf
103 IDefense Security Intelligence Services. “Critical Infrastructure Protection: Security Challenges of
the Smart Grid”, September 14, 2009, IntelGraph reporting.
104 “ Smart Meters – Threats and Attacks to PRIME Meters”, Tarlogic, November 4, 2019.
https://www.tarlogic.com/en/blog/smart-meters-threats-and-attacks-to-prime-meters/
105 E
gan, David, “The emergence of ZigBee in building automation and industrial control”, Computing
and Control Engineering, May 2005. https://www.researchgate.net/publication/3363976_The_
emergence_of_ZigBee_in_building_automation_and_industrial_control
106 S
aban, Hassan Maya et al. “Application of Wireless Technology for Control: A WirelessHART
Perspective”, Procedia Computer Science Volume 105, December 2016, https://www.sciencedirect.
com/science/article/pii/S1877050917302405
108 N
. Aakvaag, M. Mathiesen, and G. Thonet, “Timing and Power Issues in Wireless Sensor Networks - an
Industrial Test Case”, June 2005.
109 L
ennvall, T, Svensson, S, ”A Comparison of WirelessHART and ZigBee for Industrial Applications”, ABB
Corporate Research, 2008.
110 Kovacs, E, ”ICS Security Firm Warns of Flaws in WirelessHART Devices”, Security Week, February 02, 2016.
112 Bolshev, Alexander, Yushkevich, Ivan, “SCADA and Mobile Security in the IoT Era”, IOActive,
January 11, 2018. https://ioactive.com/scada-and-mobile-security-in-iot-era/
Web continues to be a dominant technology in the IoT space as well, with many
devices using some form of Web console to manage the device. The modern Web is
an incredibly complex ecosystem and it can be a considerable challenge to develop
Web-based software securely. Embedded device and Web development are drastically
different fields, and the skills necessary to succeed in the former are not necessarily
reflected in the latter. For smaller-budget projects, such as many in the consumer
space, this can often result in dramatically insecure devices.
Cloud-based management solutions are often convenient, but also come with
increased risk. Cloud platforms are often co-tenant, that is multiple users operating
on shared hardware/infrastructure, and, while rare, an attacker could potentially
infiltrate these systems to dramatic effect.
Big players continue to dominate the marketplace, often claiming a bulk of devices in
specific niche areas such as voice assistants. They continue to raise the bar for security
and security testing, while often contributing to the broader ecosystem as well.
In the enterprise and consumer device ecosystems, threat actors continue to find
novel ways to break into these assets. For instance, Accenture CTI has seen request
forgery attacks evolve throughout the Web ecosystem in recent history, and this is
trickling into Web-based services on devices. Also, our analysts often see vulnerabilities
that are constrained by factors “external” to the device, such as a firewall or network
segmentation. While this does make remote exploitation harder, in some cases it is
simply a matter of first compromising an asset within the trusted network.
With the large monetary incentive for attackers, it’s expected we will see continued
innovation for the foreseeable future while the industry tries to catch up.
113 Meola, Andrew, ”How 5G & IoT technologies are driving the connected smart vehicle industry”, Business
Insider, March 10, 2020. https://www.businessinsider.com/iot-connected-smart-cars?r=US&IR=T
Vulnerability trends
Accenture CTI performed an analysis of the vulnerability advisories listed by the
United States Industrial Control Systems Cyber Emergency Response Team (ICS-
CERT)114. These advisories are intended to provide information about current
security issues, vulnerabilities, and exploits affecting ICS technologies.
Analysis showed that the number of vulnerabilities discovered in 2018 and 2019
was consistent at 218 and 214 respectively. At the start of August there have
already been more than 160 vulnerabilities discovered in 2020, meaning two-thirds
of the way through the year we have already have almost three-quarters of the
vulnerabilities discovered in the whole of 2018 or 2019. Furthermore, the number of
vulnerabilities with a Common Vulnerabilities and Exposures (CVE) score in the high
or critical range is also on track to exceed the number discovered in previous years.
There are many factors that may cause an increase in the number of vulnerabilities
discovered in ICS systems. The introduction of new technologies, as discussed
above, increases the attack surface of these systems, potentially introducing
vulnerabilities. Old technologies that were previously difficult for an attacker
to access are seeing increased Internet and cloud connectivity, exposing
vulnerabilities that were always present, but yet to be discovered. A major influence
on the number of vulnerabilities discovered is the increasing maturity of the
industry, with bug bounty programs and defensive frameworks being developed,
ICS technologies are drawing much more attention from security researchers—
again, meaning preexisting vulnerabilities are now being identified at a higher rate.
Accenture CTI also analyzed the most common types of vulnerabilities discovered
in ICS technologies, based on the Common Weakness Enumeration system for
classifying common software weaknesses and vulnerabilities. Figure 7 shows the
five most common types of vulnerabilities discovered in ICS technologies by year.
The analysis shows that memory-based attacks such as buffer overflows continue
to feature in the top five most common vulnerabilities, although the numbers do
not look likely to exceed previous years.
114 ”ICS-CERT Landing, U.S. Industrial Control Systems Cyber Emergency Response, https://www.us-cert.gov/ics
The number of vulnerabilities involving improper input validation continues to grow, and
from 2019 onwards, the number of technologies vulnerable to Cross-Site Scripting (XSS)
attacks has risen into the top five most common vulnerability types. XSS vulnerabilities
affect vulnerable Web applications, enabling attackers to inject code into the Web pages
which is executed on the end users with the privileges of the Web server. The rise in
popularity of these vulnerabilities and other input-validation style attacks is particularly
concerning in the context of ICS devices being increasingly connected to the Internet
(Figure 7). It is possible this increase in connectivity is contributing to the increase in
discovery of these classes of vulnerabilities as old technologies are exposed to both
researchers and attackers.
Figure 7.
50
40
30
20
10
0
Stack-based Buffer Overflow
Improper Authentication
Cross-Site Scripting
Hard-Coded Credentials
Cross-Site Scripting
Even when vulnerabilities are found, fixed, and released, many devices
do not include an automatic update mechanism. This requires users to
actively and regularly update their devices, which has proven to be an
unrealistic expectation.
Many of the core issues facing these technologies have been solved,
or at least partially so, and now the challenge is applying this
knowledge wherever applicable.
• Insecure protocols such as HTTP and FTP still see widespread use,
as do weak or default credentials on management interfaces. While
sometimes not perfect, encrypted protocols such as HTTP should
still be used wherever possible, and users should be required to
configure credentials upon first use of the device, or with randomly
generated values.
Snake has been observed in use against both IT and OT systems, in March
2020 it was linked to an attack on Fresenius Medical Care, Europe’s largest
hospital provider, based out of Germany119.
115 Seals, Tara, “SAS 2019: Triton ICS Malware Hits A Second Victim”, Threatpost, April 10, 2019.
116 Walter, Jim, “New Snake Ransomware Adds Itself to the Increasing Collection of Golang Crimeware”,
SentinelOne, January 23, 2020.
117 IDefense Security Intelligence Services. “Technical Analysis of Snake Ransomware.” January 30, 2020,
Intelgraph reporting.
118 IDefense Security Intelligence Services. “Technical Analysis of MegaCortex.” May 9, 2019, Intelgraph reporting.
119 Krebs, Brian, “Europe’s Largest Private Hospital Operator Fresenius Hit by Ransomware”, Krebs on Security,
May 6, 2020.
In May 2020, the number of Snake infections increased again hitting multiple
corporate networks across all verticals, including multiple healthcare
corporations, a French architectural firm, and an unnamed prepaid debit
card company.
120 IDefense Security Intelligence Services. “Ransomware Shutters Evraz Steelworks' North American
Facilities”, March 13, 2020, IntelGraph reporting.
121 N
CAS CISA, “Ransomware Impacting Pipeline Operations”, February 18, 2020.
122 “How a ransomware attack cost one firm £45m” BBC News, June 25, 2019. https://www.bbc.co.uk/news/
business-48661152
123 “Hackers demand $5 million from Mexico's Pemex in cyberattack”, Reuters, November 13, 2019.
https://uk.reuters.com/article/us-mexico-pemex/hackers-demand-5-million-from-mexicos-pemex-in-
cyberattack-idUKKBN1XN03A
Aside from ransomware attacks, threat actors have been observed targeting
ICS systems in a number of ways. In January and March 2020 the FBI released
a series of reports relating to activity involving the Kwampirs malware family
being used to target the Healthcare, Manufacturing, IT, Logistics, and Agriculture
industries127; the timing of this activity was particularly concerning due to its
coincidence with the COVID-19 pandemic. Kwampirs is a remote access Trojan
(RAT), designed to collect system information, receive command-and-control
(C2) input and self-propagate via networked shares. Accenture CTI has mapped
the use of this malware to the ORANGEWORM threat group.
124 “Hackers who hit grid taunt Elexon with dark web files” The Telegraph, June 7, 2020.
https://www.telegraph.co.uk/business/2020/06/07/hackers-hit-grid-taunt-elexon-dark-web-files/
125 ENTSO-E, “ENTSO-E has recently found evidence of a successful cyber intrusion into its office network”,
March 9, 2020.
126 Ikeda, Scot, “Ransomware Attack on Portuguese Energy Company EDP Shows Increasing Trend Toward
Public Leaking of Sensitive Information”, CPO Magazine, April 29, 2020.
127 I Defense Security Intelligence Services. “Orangeworm’s Kwampirs Dropper Malware Stays the Course”,
April 18, 2020, IntelGraph reporting
128 “New Orangeworm attack group targets the healthcare sector in the U.S., Europe, and
Asia”, Symantec, April 23, 2018.
130 I Defense Security Intelligence Services. “SPIRLIN Actors Target Middle East Oil and Gas
Providers via DanBot Malware”, August 9, 2019, IntelGraph reporting.
131 IDefense Security Intelligence Services. “SPIRLIN”, August 9, 2019, IntelGraph reporting.
Whether the payloads in these attacks on ICS facilities are tailored to OT and
ICS systems or more generic, it is common that actors first attempt to gain a
foothold in the enterprise network before seeking methods of pivoting onto
the OT and ICS systems they are targeting.
Since Mirai had its source code shared in 2016, there have been many
variants with different levels of code overlap. Some of the larger Mirai
variants include Fbot, Dark Nexus and Satori.133 While these families are run
by different threat actors with varying motivations, their initial access onto
an IoT device is often via a brute force default or easy-to-guess credentials
or exploiting known vulnerabilities. Once present on a device,
it is incorporated into the botnet and used to scan for further targets.
132 “Hackers who hit grid taunt Elexon with dark web files” The Telegraph, June 7, 2020.
https://www.telegraph.co.uk/business/2020/06/07/hackers-hit-grid-taunt-elexon-dark-web-files/
133 E
NTSO-E, “ENTSO-E has recently found evidence of a successful cyber intrusion into its office network”,
March 9, 2020.
134 Ikeda, Scot, “Ransomware Attack on Portuguese Energy Company EDP Shows Increasing Trend Toward
Public Leaking of Sensitive Information”, CPO Magazine, April 29, 2020.
Aside from these Mirai variants, some other recent developments in IoT
malware, include the Silex IoT malware that simply wipes the firmware of
IoT devices, making them unusable; and the Echobot botnet that recently
incorporated a vulnerability for an ICS component, the Mitsubishi smartRTU
into its arsenal of known exploits, making it one of the first IoT botnets to
specifically target IIoT systems135.
Increasing maturity
Between January 21 to 23, 2020, the inaugural ICS Pwn2Own event took place
in Miami136. This was the first time Trend Micro's Pwn2Own competition, now in
its twelfth year, included ICS technologies. The Pwn2Own competition attracts
some highly talented security researchers. It began with finding bugs in Web
browsers, and has since expanded to include virtualization software and enterprise
applications. The inclusion of ICS software in the competition is significant, as it
has taken many discussions with the vendors to allow these products to be tested.
The inclusion of ICS software in competitions, such as this one, and in bug bounty
programs, enables the testing of products that had previously been off limits to
many researchers. It is expected to have a positive effect in generating discussion
around the security of these technologies and giving the security community more
access to increase the maturity of these technologies from a security perspective.
135 I keda, Scot, “Ransomware Attack on Portuguese Energy Company EDP Shows Increasing Trend Toward
Public Leaking of Sensitive Information”, CPO Magazine, April 29, 2020.
136 I keda, Scot, “Ransomware Attack on Portuguese Energy Company EDP Shows Increasing Trend Toward
Public Leaking of Sensitive Information”, CPO Magazine, April 29, 2020.
Mitigation
On the OT side, the dependence of critical industrial systems on legacy
technologies and need to avoid downtime often causes reluctance to test
and patch these devices. However, there are steps that organizations can
take to help improve their security in this space.
137 ”ATT&CK® for Industrial Control Systems”, MITRE, March 4 2020. https://collaborate.mitre.org/
attackics/index.php/Main_Page
With respect to IoT, the ubiquity of devices and their proliferation through
dozens of industries means there is no one-size-fits-all solution to securing
them. Depending on the context, however, there are several steps138
individuals and organizations can take to improve their security posture
in this domain:
138 ” Security Tip (ST18-001) Securing Network Infrastructure Devices”, CISA, November 14, 2019,
https://www.us-cert.gov/ncas/tips/ST18-001
139 ”Average lifespan of consumer electronics and tech devices in 2015”, Statista Research Department, May 30, 2016.
https://www.statista.com/statistics/688455/consumer-electronics-tech-device-average-lifespan/
140 ” D-Link Agrees to Make Security Enhancements to Settle FTC Litigation”, Federal Trade Commission July 2, 2019.
https://www.ftc.gov/news-events/press-releases/2019/07/d-link-agrees-make-security-enhancements-settle-ftc-litigation
141 ”ASUS Settles FTC Charges That Insecure Home Routers and “Cloud” Services Put Consumers’ Privacy At Risk”, Federal
Trade Commission, February 23, 2016. https://www.ftc.gov/news-events/press-releases/2016/02/asus-settles-ftc-charges-
insecure-home-routers-cloud-services-put
Summary
The increased connectivity within our daily lives comes with
significant advantages. As we try to extend modern technologies
into our critical infrastructure, novel threats and unanticipated
consequences continue to emerge. Walls and boundaries are being
broken down in the name of progress and ease-of-use, often opening
potential new avenues of attack.
Be transparent
Give users access to what they need when they need it. Make these
changes transparent to them—without asking them to “jump through
hoops” to do their job effectively.
Contributors
Patton Adams, Omar Al-Shahery, Joseph Chmiel, Amy Cunliffe, Molly Day, Oliver Fay, Charlie Gardner, Gian Luca Giuliani,
Samuel Goddard, Larry Karl, Paul Mansfield, Hannaire Mekaouar, Mei Nelson, Nellie Ohr, and Kathryn Orme.
Visit us at www.accenture.com