The Cybersecurity and Infrastructure Security Agency (CISA) issued an alert across critical U.S. infrastructure sectors about a recent infection at a natural gas compression facility.
“The Cybersecurity and Infrastructure Security Agency (CISA) responded to a
Attackers initially launched a spear-phishing attack to infiltrate the target network, then pivoted to the OT network. This was possible because the victim failed to implement segmentation between the IT and OT networks. Then the attackers deployed ransomware that encrypted files on both IT and OT networks causing the “loss of availability” of human-machine interfaces (HMIs), data historians, and polling servers.
Once the networks have been infected with the ransomware, internal assets were no longer able to read and aggregate real-time operational data reported from low-level OT devices, causing a partial Loss of View for human operators.
According to the alerts, the infection did not impact any programmable logic controllers (PLCs) on the affected networks because the malware was designed to infect only Windows devices and the organization did not lose control of operations at any point during the attack.
In response to the incident, the target organization decided to implement a deliberate and controlled shutdown of the operations for approximately two days. The incident resulted in a Loss of Productivity and Revenue, after which normal operations resumed.
CISA alert provided planning and operational mitigation measures, as well as technical and architectural mitigations that should be implemented by organizations in critical infrastructure sectors to avoid similar ransomware attacks.
“The victim was able to obtain replacement equipment and load last-known-good configurations to facilitate the recovery process.” continues the report. “All OT assets directly impacted by the attack were limited to a single geographic facility.”
The targeted org was able to get replacement equipment following this ransomware incident and to load last-known-good configurations that made it easier to recover after the attack.
CISA officials confirmed that the threat actor has never obtained the ability to control or manipulate operations during the attack.
Although the attack had a limited direct impact on operations to one control facility, geographically distinct compression facilities also had to halt operations because of pipeline transmission dependencies. The
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.