Kaspersky launched a threat intelligence service for industrial organizations offering access to a continuously updated database containing information on vulnerabilities in industrial control systems (ICS) and Industrial Internet of Things (IIoT) products along with rules and algorithms to detect possible attacks that could exploit them.
As in any computing system, vulnerabilities in industrial components are inevitable. Each year, research organizations continue to discover new vulnerabilities in IIoT components and industrial control systems, potentially affecting hundreds and thousands of ICS or IIoT products.
If undetected, these weaknesses can lead to system failure or give malware access to the product’s management and critical manufacturing data. For users, it is important to be aware of these vulnerabilities, understand how critical they are and what can be done to patch or mitigate them.
In addition to being aware that a vulnerability exists, industrial organizations need to have the ability to detect a vulnerability exploitation attempt to prevent possible attack scenarios, which might occur as a result.
The challenge is intrusion detection systems commonly have attack detection signatures and rules focusing primarily on IT asset protection. This means network attack vectors that could specifically target vulnerable ICS components might still stay undetected.
The Kaspersky ICS Vulnerability Database will include continually updated information about the most critical vulnerabilities contained in widely-used ICS products from a variety of vendors. Each record will contain detailed technical information that will help industrial organizations check whether their assets are vulnerable. Users can then prioritize and plan vulnerable system updates or other actions to mitigate the risks of possible exploitation by a malicious actor. The information will be delivered in both a human and machine-readable format via REST API so customers can integrate it into their existing cybersecurity tools and manually decide on the remediation actions needed.
The second component of the service, the Network Attacks Signatures Database, provides signatures of ICS threats. It can be integrated with third party intrusion detection systems to help customers minimize the risk of cybersecurity incidents in their industrial infrastructure.
“Penetration testing and periodic vulnerability assessments of an industrial enterprise might give a good picture of its current cybersecurity state,” said Georgy Shebuldaev, head of industrial cybersecurity business development at Kaspersky. “Unfortunately, existing publicly available ICS or IIoT vulnerability information sources lack much of the required information, consistency and clarity to be useful for effective continuous vulnerability assessments. This new service aims to help customers enhance their vulnerability management and incident detection with Kaspersky threat expertise and guidance.”