-

Anti-Malware Inspection

The list of security incidents in industry is growing longer all the time: Stuxnet, Industroyer, TRITON, or WannaCry are examples of malware/ransomware which attacked SCADA systems, safety controllers etc.

While anti-virus/anti-malware software is common and widespread on IT systems, OT components are often still unprotected. Often, the corresponding tools for OT components are not available or are more complicated or, depending on the component, cannot be installed at all.

Dieses Thema enthält die folgenden Abschnitte:

Components to be protected

All system components for which anti-malware software is available should be protected with a modern (next generation) malware prevention tool. These system components include:

Configuration/operation rules for anti-malware tools

Alternative measures if no anti-malware tools can be installed

Especially on controllers or smart field devices, anti-malware tools may not be available. Even on computer systems, application-related scenarios are possible in which only limited malware protection is possible (for example due to performance problems or lack of possibility for regular updates). The following measures should then be taken as an alternative:

Next generation anti-malware software

Next generation anti-malware tools offer improved endpoint protection compared to traditional antivirus programs. They not only detect known file-based malware using a signature database and heuristic methods, but also protect against unknown malware (zero-day attacks, file-less non-malware attacks). They are also able to detect malicious behavior and respond to TTPs (Tactics, Techniques, and Procedures) from unknown attackers.

Thanks to new technologies, next generation malware protection programs are able to respond to previously unknown threats. For this purpose, comprehensive data is collected on attacks that have taken place. This data provides information on how the threat originated, other potential points of attack in your plant, how to potentially recover affected areas, and how to close the vulnerability. Furthermore next generation anti-malware tools may support machine learning and cloud-based, configurable behavior detection. Ideally, these tools will be able to share information gained in this way with other entities in your company or community.

Especially in networked systems (zones and conduits), it can be crucial that the malware protection program is able to immediately stop network activities for the affected zones or processes, isolate (quarantine) and clean affected systems in the event of an attack.