Four OT attack scenarios which require SIGA’s Level 0 detection

Attack Scenario 1: (Un)authorized Access Cyber menaces do not stem solely from the outside. Insiders who are granted access or hackers who obtain legitimate credentials can pose a serious threat to the most critical & vulnerable assets. These attacks will most likely go by undetected by standard detection tools since no malicious code or virus is used. SIGA’s ability to monitor process behavior directly from level 0 offers the ultimate method for the security of critical infrastructure regardless of the attack vector. SIGAGUARD is a tailored detection solution for such attacks, which ensures that the most valuable assets are being protected at all times. Attack Scenario 2: Under the Radar - IT/OT ransomware attacks Ransomware attacks are on the rise, which may leave OT environments at the mercy of hackers. Even during an IT based ransomware attack, without ...
קרא עוד

Living-off-the-land (LOTL) attacks

Following the recent assault of the “Volt Typhoon” group on US infrastructure, it’s time for us to talk about living-off-the-land (LOTL) attack techniques that hackers use and how Level 0 can outsmart them. “Volt Typhoon” is a Chinese state-sponsored malicious actor, preparing the ground for future world crises, through the development of powerful hacking capabilities to cause serious disruptions to opponents, whether in North America or Asia. Microsoft has released a fascinating article (link below) about this group’s attack techniques, from data collection to exfiltration all the way towards achieving valid credentials to gain access into the system and establish their living-off-the-land strategy. Microsoft’s report addresses serios issues in terms of exploitation, where signature-matching solutions fail to protect critical infrastructure from ...
קרא עוד

Level 0 recognized by NIST as a best-practice for OT cybersecurity

The National Institute of Standards and Technology (NIST) released a guide for Operation Technology (OT) Security outlining the main risks associated with failure of OT systems as well as best practices for protection of such critical systems. As NIST acknowledges, organizations’ most critical processes rely on OT, which makes them highly vulnerable to cyberattacks, with harsh consequences - from significant losses due to downtimes, through social unrest due to the lack of essential resources like electricity or water, all the way to severe threat to human lives.  This further demonstrates the alarming aftermath such attacks could bear, forcing organizations worldwide to act upon such threats and implement security methods to prevent these negative forecasts from becoming a reality. In section 5.3.6 NIST discusses the importance of considering the Purdue Model’s lowest ...
קרא עוד

SIGA @ Hannover Messe 2023

Come join SIGA during Hannover Messe 2023 (17-21 April)! Our VP Sales, Amir Kandell and our DACH Sales Manager, Markus Stadelhofer will attend the event and will be happy to meet you all there to discuss the importance of Level 0 monitoring.  
קרא עוד

Ransomware in OT – keep your eyes on the ball!

OT vulnerabilities are here to stay. The security policies we thrive to implement are those which allow us to learn how to live with them and manage them, without putting (too many) limitations on our productions. One of the rising threats in the past few years is OT ransomware attacks. Just last week, CMMC, the Canadian Copper Mountain Mining Corporation,  disclosed  that it shut off their manufacturing operations in the mills due to a ransomware attack. We all remember the Colonial Pipeline attack that also left its mark on the market. That’s why it’s very surprising to learn, that these two ransomware attacks and others similar to them, were not even OT or ICS related, meaning they did not specifically target the control systems or the manufacturing environment at all. In fact, there was no evidence in real time that the attack ever "crossed the line" and impacted the OT ...
קרא עוד

Securing Operational Technology (OT) systems

Frost and Sullivan together with Applied Risk have published an eye-lighting report regarding the methods to be implemented by critical infrastructures in their Operational Technology (OT) environments in order to ensure cyber resilience to prevent the catastrophic consequences a cyber-attack on these essential businesses might have. The report starts with a quick overview on the many challenges OT systems are facing, from individual malicious actors to nation-funded organizations, critical infrastructure organizations worldwide are struggling with a varied-front cyber war, forcing them to constantly fortify their cyber resilience. The discussed report sets-out 6 main essential habits critical organizations should pay attention to: On top of the above main principles for OT cybersecurity, the report states that above-all organizations must set the seal on their ...
קרא עוד

Relentless cyber-attacks around the world

As cyber threats are growing ever-more intense and frequent, it's time for organizations worldwide to learn from the past and implement best practices to ensure they can act upon these cyber-attacks and prevent them. From Ukraine and Saudi Arabia all the way to the United States, no one is fully immune, and attackers are taking advantage of that. Eventually, anything that can be programmed can be hacked, and so operators are left to solve an almost impossible issue- how can they protect something that can be hacked whenever? A cyber-attack is not a question of "if" but a question "when", and even though operators cannot fully prevent these attacks, they can ensure they possess the best tools to deal with such breaches quickly and effectively to minimize the attack's consequences. By capitalizing on Level 0, operators can gain unparalleled visibility into their critical ...
קרא עוד

SIGA @ INTECH 2022

SIGA participated at INTECH 2022, a leading industrial conference, gathering leading national and international organizations to showcase the latest and most advanced solutions' for protecting and improving their production. SIGA's Israel salesperson, Yair Botbol, met with key figures from various local industries to show how SIGA's Level 0 monitoring solution can promote cyber resilience to a whole new level.
קרא עוד

SIGA @ Energie report

ARES's CEO Jürgen Weiss spoke to the Energie Report  magazine and told them about the many solutions they offer, amongst he discussed SIGA's unparalleled offering for promoting OT cybersecurity. Check-out the full online Energie Report  magazine here (Mr. Weiss's interview is on pages 12-14): Webpaper (report.at) Is your organization cyber resilient? No? Contact Us - SIGA (sigasec.com)  
קרא עוד

SIGA’s CRO, Amir Gil speaks at ICS 7th edition

SIGA's CRO, Amir Gil spoke at ICS 7th edition held on the 20th of November. Mr. Gil discussed the importance of monitoring the process level in order to detect cyber-attacks that will otherwise go unnoticed. He demonstrated how Level 0 can make a difference and provide operators with unmatched situational awareness to act upon cyber threats quickly and effectively. SIGA's many installations have proved that what SIGA sees in unseen by other solutions, allowing organizations to capitalize on the information coming directly from their critical assets to gain full visibility and promote their cyber resilience to a whole new level.
קרא עוד

SIGA @ SPS 2022

SIGA participated at the Smart Production Solutions (SPS) conference in Germany along with our great partner, Phoenix Contact. SIGA's DACH sales manager, Markus Stadelhofer along with SIGA's Sales VP, Amir Kandell were delighted to meet key players from many industries and showcase how Level 0 can promote cyber resilience to a whole new level.
קרא עוד

SIGA’s CEO speaking at a major Water industry event

SIGA’s CEO, Amir Samoiloff attended a unique roundtable gathering water experts from across the US to discuss the many challenges faced by the industry. SIGA is honored to collaborate with water companies to ensure they gain visibility directly from Level 0 to protect their provision of this scarce resource.
קרא עוד

PARALLEL REFERENCE MONITORING

HMI’s Can be Fooled! Detect anomalies before they damage your critical assets. SIGA’s Parallel Reference Monitor (PRM) provides multi-level real-time monitoring, revealing otherwise undetectable Level-0 attacks BACKGROUND Current security methods for industrial control systems are beginning to evolve and include network-level security, some use of firewalls, unidirectional diodes and protected gateways. This vulnerability and common operational constraints lead to very limited solutions, at best. Therefore, the SCADA’s controller level, or Level 1 as it is called in the Purdue Model (e.g., PLC, RTU, etc.) can be compromised in various scenarios.   An attacker has taken control of a critical process while a perfectly normal operational status is reflected on the HMI and other levels. The attack is allowed to continue undetected because the control ...
קרא עוד