cyber attacks – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Mon, 07 Jul 2025 08:07:38 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png cyber attacks – Waterfall Security Solutions https://waterfall-security.com 32 32 40 Years Deploying Cyber Targets https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/40-years-deploying-cyber-targets/ Mon, 10 Jun 2024 07:50:42 +0000 https://waterfall-security.com/?p=23923 For forty years now, we have automated physical operations with computers in the name of increased operating efficiencies – deploying ever more targets for cyber attacks.

The post 40 Years Deploying Cyber Targets appeared first on Waterfall Security Solutions.

]]>

40 Years Deploying Cyber Targets

Current indications are that OT cyber risks to industrial operations will become much worse before they get any better. Why? Well, consider mega-trends. For forty years now, we have automated physical operations with computers in the name of increased operating efficiencies – deploying ever more targets for cyber attacks.
Picture of Andrew Ginter

Andrew Ginter

40 years of cyber targets

All computers run software after all, and pretty much all software can be manipulated by cyber attacks, by exploiting defects in the software, by stealing credentials for the software, or by other means. For those same 40 years, we have connected our computers, because data in motion is the lifeblood of modern automation. But – all cyber sabotage attacks are information, and every flow of information can encode cyber attacks. Thus, for forty years we have steadily increased the number opportunities to attack our ever-increasing pool of targets. Neither of these trends will reverse any time soon. The OT cybersecurity problem will get much worse before it gets better.

“…all cyber sabotage attacks are information, and every flow of information can encode cyber attacks.”

Another big problem with OT cyber risk is that while we were automating and increasing the sophistication of our operations, our enemies were automating as well and increasing the sophistication of their attacks and attack tools. A recent report showed that before 2019, it was rare to have more than one or two cyber attacks per year that caused physical consequences in manufacturing or critical industrial infrastructures. Since the turn of the decade however, ransomware attacks with physical consequences have more than doubled every year. It will take only another few doublings for cyber attacks to become a serious, widespread impediment to correct, continuous and efficient industrial operations. Today, no expert believes that we will ever return to a state where we suffer only one or two cyber attacks per year with physical consequences.

A second data point for attack automation – both Microsoft and Sentinel Labs are reporting that the high end of ransomware groups are buying and selling sophisticated attack tools and technologies from and to nation states. The high end of ransomware attacks have become effectively indistinguishable from nation state attacks. In decades past, many of us might have thought “oh, I don’t know – is this facility really important enough to be the target of a nation state to attack?” Today, ransomware attacks everyone with money. Do we have money? Yes? Then we’re likely to be a target of nation-state-style attacks, either from true nation states or from the high end of ransomware.

catch the cyber targetThe same is true in IT networks. In those networks, cybersecurity attacks, monitoring and other defenses are in constant change, as defenders seek to invest optimally and minimally to stay one step ahead of their attackers. This constant change, however, is a poor fit for many industrial environments where engineers must strictly manage change, to control risks to safe and reliable operations. An extreme example – in Germany, it is illegal to apply patches and security updates to automation systems in passenger trains without submitting a safety case for the change to the regulator. Looking even deeper, in the most consequential systems and industries, staying one step ahead of our attackers is a poor fit for our need to assure correct and reliable operations over the entire decades-long expected lifetime of our investments in physical infrastructures.

All this means that today, board members and executives may have a very hard time discharging their obligations to manage exposures to cyber risks. When a CISO reports to the board that they invest steadily in reducing OT cyber risk, how is the board to know if that executive is talking about investments in slow-moving government initiatives, in “constant change” initiatives that may be difficult to apply to the most consequential industrial operations, or in engineering-centric mechanisms that take some, but never all, cyber risk entirely off the table. Board members need to stop asking “have we got this covered?” and start asking more specific questions.

To read further on OT cyber threats, remediations and the tough “how much is enough” question that boards, executives and managers must all answer, click here to request a free copy of the author’s latest book: Engineering-Grade OT Security: A manager’s guide.

About the author
Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post 40 Years Deploying Cyber Targets appeared first on Waterfall Security Solutions.

]]>
OT Security: Are We Protecting the Information? https://waterfall-security.com/ot-insights-center/ot-security-standards/ot-security-are-we-protecting-the-information/ Thu, 07 Mar 2024 14:42:11 +0000 https://waterfall-security.com/?p=20585 Industrial network engineers have always been uneasy with the task of "protecting information". The real priority for OT security is in stopping inbound malicious information from entering the system and threatening machinery and workers.

The post OT Security: Are We Protecting the Information? appeared first on Waterfall Security Solutions.

]]>

OT Security: Are We Protecting the Information?

Industrial network engineers have always been uneasy with the task of "protecting information". The real priority for OT security is in stopping inbound malicious information from entering the system and threatening machinery and workers.
Picture of Andrew Ginter

Andrew Ginter

are we still trying to protect industrial information

Connectivity between OT / industrial automation systems, between OT systems and IT systems, and between all this and Internet-based cloud services continues to increase. On the surface, this trend demands that we encrypt everything, thus protecting the information. And, because no operating system nor cryptosystem is perfect, we must also deploy at least the “detect,” “respond” and “recover” pillars of the US National Institute for Standards and Technology Cybersecurity Framework6 (NIST CSF). Since connectivity leads sooner or later to intrusions, we must use sophisticated intrusion detection techniques, in hopes that when we are compromised, we can detect the attacks, respond to them, and recover normal functionality again before we suffer downtime, equipment damage, casualties, or other unacceptable consequences.

Monitoring Data vs. Control Data

Industrial network engineers, however, have always been uneasy with protecting information. Consider a six-story catalytic cracking tower full of high-pressure, high-temperature hydrocarbon liquids and gasses. Imagine we are standing in front of the cracker watching a technician carrying out routine maintenance. In front of us are two analog gauges reporting temperature and pressure, and a dial controlling the flow of fuel to the cracker’s furnace.

Binoculars girlWe look over our shoulder and notice that, outside the fence, someone is sitting with a telescope pointed at the gauges, taking notes. We tap the technician on the shoulder. “That person over there seems to be writing down our settings,” we say. “They are stealing information.” What does the technician do? They might call corporate security. Depending on policy, they might shrug their shoulders and go back to work. The consequence of stealing that information is a business consequence – it is somebody else’s problem.

Now imagine that the person behind the telescope cuts a hole in the fence, runs up to us, cranks the furnace fuel feed hard to the right, and runs away. What does the technician do? They scream for security. They run to the dial and returns it immediately to the correct position. Over-heating the cracker risks damage to the catalyst and possibly a fire and an explosion.

The point here is that monitoring information that leaves the site is just information – with value comparable to the value of any other information in an IT network. All control information that enters the industrial site, however, is a potential threat. Calling both examples simply “attacks on information” and saying “encrypt everything to protect the information” ignores this fundamental difference.

“…monitoring information that leaves the site is just information – with value comparable to the value of any other information in an IT network. All control information that enters the industrial site, however, is a potential threat.”

Protect The Information?

In many, but not all, industries, the goal for most network engineers is not to “protect the information” but rather to prevent unacceptable physical consequences of cyber attacks. Universal connectivity lets monitoring information leave the plant, yes, but it also lets potentially dangerous control information enter the plant. Encryption provides no protection against a compromised cloud that sends attack information into the plant inside of an encrypted, authenticated connection.

encryptionPutting cryptographic and other protections in place for monitoring information that leaves the site makes sense. The business and societal consequences of an attacker stealing monitoring information are similar to the consequences of an attacker stealing other kinds of business information. Putting information-protecting mechanisms in place for control information is often woefully inadequate, because at many industrial sites, the consequences of compromised controls are completely unacceptable.

Hope Is Not Good Engineering

Engineers are also uneasy with the focus on detect, respond, and recover activities. Hoping that we can detect attacks in progress and respond in time to prevent unacceptable physical consequences is not good engineering. Engineers do not “hope” their bridges will not collapse, nor “hope” that their 300-ton steam turbines will not shake themselves to pieces. Engineers design systems that simply do not fail in the face of a defined set of threats. That said, yes engineers often do monitor or periodically inspect their finished products to ensure that they are holding up as designed, but any engineer caught “crossing their fingers” in a design risks being drummed out of the profession.

To read further on network engineering solutions at IT/OT or OT/Internet criticality boundaries, click here to request a free copy of the author’s latest book: Engineering-Grade OT Security: A manager’s guide.

About the author
Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post OT Security: Are We Protecting the Information? appeared first on Waterfall Security Solutions.

]]>
Rail Operations Center https://waterfall-security.com/ot-insights-center/transportation/rail-operations-center/ Sun, 08 Nov 2020 09:18:00 +0000 https://waterfall-security.com/?p=10455 Enabling safe visibility into vital Operations Control Center networks, including visibility of locomotive locations, track outages, and network security status, while providing protection against external attacks.

The post Rail Operations Center appeared first on Waterfall Security Solutions.

]]>

Rail Operations Center

Protecting Rail Vital Networks From Imminent Cyber Threats
Customer/ Partner:

North American major metropolitan rail network.

Customer Requirement:

Enable safe enterprise and Internet visibility into Operations Control Center vital networks, including visibility into locomotive locations, track outages, and network security status, while providing the greatest security protection from external attacks.

Waterfall’s Unidirectional Solution:

Unidirectional Gateways were deployed at the Operations Control Center providing one-way replication to the external network for OPC-UA servers, SQL Server databases and Syslog files residing in the Train Safety vital network. This architecture provides compliance with IEC 62443, ISO 27001 and other industrial security standards such as the upcoming TS50701.

Rail Networks Are Facing Modern Cyber Threats

Cyber attacks have already impacted rail systems in the USA, UK, Poland, Korea, Japan and countries. The more digitized rail networks become, the more vulnerable critical control centers are to cyber sabotage. Increased network connectivity and digitalization at the Operation Control Center (OCC) enable adoption of modern train protection systems such as positive train control (PTC) systems, cloud analytics, enterprise visibility into operations, and vendor-monitored predictive maintenance systems, while at the same time introducing threats to safe, reliable and cost-effective operations. To maintain the highest level of safety and reliability, OCC network perimeters must be protected by Unidirectional Security Gateways.

The Challenge icon
The challenge

Provide safe external connectivity to the Operation Control Center vital networks to provide maintenance workers with positive control over when track outages are cleared and provide enterprise cyber-security teams with visibility into their most important operations networks, without putting those networks at risk of cyber attacks.

Waterfall solution - icon
Waterfall solution

A Waterfall Unidirectional Security Gateway replicates OCC SQL Server databases containing real-time locomotive locations and track outage data to the Metro’s enterprise network, and beyond that network to the Internet. In addition, OPC-UA server tags are replicated to provide real time operational information from stations. Finally, Syslog data is replicated to provide network alarms in case of internal intrusions.

Results and benefits - icon
Results & benefits

Security: OCC networks are absolutely protected from online attacks originating on enterprise networks and from Internet-based attacks.

Visibility: Unidirectional Gateways provide online access to real-time operations data, with no change to end-user procedures or business application integration configurations.

 Compliance: Waterfall equipment is certified Common Criteria EAL4+ for security, is certified by NISA, ANSSI, NITES and others for critical infrastructures & simplifies compliance with IEC 62443, ISO 27001, TS50701 and otherindustrial security standards.

vertical red line
Theory of Operation
Click to enlarge

Waterfall Unidirectional Security Gateways replace firewalls in OT network environments, providing absolute protection to critical control systems from attacks emanating from external, less-trusted networks.

Waterfall Gateways contain both hardware and software components. The gateway hardware is physically able to transmit information in only one direction – out of the OCC network to enterprise and Internet networks. The gateway software replicates servers and emulates devices. External users and applications use the replica systems normally and bi-directionally. Waterfall products enable deep visibility into operations data and operations networks for enterprise users and systems, as well as for Internet-based websites, applications and cloud service providers. With

Waterfall products deployed, such visibility is safe from attacks originating on these external networks because of the physically unidirectional nature of the products. Waterfall Unidirectional Gateways and related products provide safe access to Operations Control Center data, without providing access to OCC systems. The Operation Control Center hosts vital, safety-critical networks, including energy systems, train safety and signaling networks. While these vital networks might once have been closed networks, modern digitization and efficiency initiatives demand new connectivity and data sharing capabilities. Control Systems standards, such as the IEC62443 or the upcoming European TS50701 recommend Unidirectional gateways for interconnecting critical networks to external networks

vertical red line
Unidirectional Security Gateways Benefits:

arrow red rightEnable safe, real-time reporting of locomotive location, track and
other operational status to business management, track technicians and the public, without putting safe operations at risk

arrow red rightEliminates risk to reliability, worker safety and public safety due to external cyber attacks

arrow red rightEnables safe connectivity with cloud-based security operations and other service providers

arrow red rightEnables compliance with even the strongest railway and industrial cybersecurity regulations, standards and guidance

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Rail Operations Center appeared first on Waterfall Security Solutions.

]]>