{"id":70530,"date":"2022-02-25T13:37:15","date_gmt":"2022-02-25T21:37:15","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=70530"},"modified":"2022-02-25T14:03:12","modified_gmt":"2022-02-25T22:03:12","slug":"it-ot-cybersecurity-orchestration","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/","title":{"rendered":"In High-profile OT Cyberattacks, the Culprit May Be the IT Network"},"content":{"rendered":"<p>Almost a year since the Colonial Pipeline ransomware attack on critical infrastructure occurred, the question still looms large: not whether such an incident could happen again, but when?<\/p>\n<p>Now a <a href=\"https:\/\/techhq.com\/2022\/02\/european-oil-refineries-cyberattack\/\" target=\"new\" rel=\"noopener\">string of ransomware attacks<\/a> has affected at least 17 oil port terminals in Western Europe that caused tankers to be re-routed and supply chains disrupted. Hackers targeted the port terminal software used by Oiltanking (Germany), SEA-Invest (Belgium) and Evos (Netherlands), which is used to maximize throughput and minimize loading and unloading delays. It isn\u2019t clear whether the multiple incidents were a coordinated effort to disrupt the European energy sector or whether the hackers were simply able to compromise the same software used by all three companies.<\/p>\n<p>Two things about the recent spate of attacks underscore what is increasingly obvious about perceived operational technology (OT) attacks and how to prevent them:<\/p>\n<h2>Without cross-visibility, OT shutdown is SOP<\/h2>\n<p>First, as with Colonial Pipeline, the hackers did not directly target OT and never actually touched an OT network. With critical infrastructure attacks, the belief is that threat actors will use spear phishing, default passwords or other means to gain access to the IT network before pivoting into the OT network. But rarely do they need to pivot. As soon as the threat presence is detected on the IT network, company cybersecurity policies stipulate that they shut down OT and industrial control systems (ICS) themselves rather than risk harm to people and infrastructure.<\/p>\n<p>In the case of Colonial Pipeline, hackers infiltrated the IT network through an exposed password for a VPN account. After they posted the ransom, company officials swiftly took the 5,500-mile pipeline offline. The oil logistics companies followed suit, reverting to manual operations as soon as the threat was detected in their software.<\/p>\n<p>The Colonial Pipeline shutdown lasted five days, but the impact was lasting. Large, complex infrastructure controlled by OT can\u2019t be taken off- and then back online quickly. Even after Colonial Pipeline paid the ransom (most of which they reportedly recovered), it took several more days to fully restart OT systems and for the supply chain to return to normal, at a cost to the company of tens of millions of dollars.<\/p>\n<div>\n<h2>Security point solutions require orchestration<\/h2>\n<p>Second, we can assume the companies that were hit have mature cyber initiatives in place. <a href=\"\/resources\/case-study-oil-and-gas-company\/\">Energy sector companies<\/a> are typically ahead of the curve in this regard. They have already heeded advice to gain visibility into their OT networks and to carefully segment IT and OT networks to prevent breaches from spreading laterally. So, what went wrong?<\/p>\n<p>Organizations that manage critical infrastructure rely on thousands of IP-connected devices to monitor and control operations that were once manual. To secure them all, companies invest heavily in point solutions from multiple vendors: asset management systems, endpoint security solutions, vulnerability assessment tools, SIEM and ticketing systems, and so on. These tools don\u2019t always work together, and each one may or may not be properly configured and updated. The complexity can be greatly reduced by <a href=\"https:\/\/www.forescout.com\/products\/eyeextend\/\">automating and orchestrating security operations<\/a> across all assets with a single platform.<\/p>\n<p>Organizations rely on Forescout to maximize the value of the standalone tools they\u2019ve already invested in to make them work more effectively. Forescout orchestrates communication and workflows among point solutions by:<\/p>\n<ul>\n<li>Ensuring existing security products are installed, running and up to date<\/li>\n<li>Sharing rich device, user and network context between the Forescout platform and other IT and security products<\/li>\n<li>Automating system-wide policy enforcement across disparate solutions<\/li>\n<li>Accelerating response actions to contain threats and mitigate risks<\/li>\n<\/ul>\n<p>By automating and orchestrating security operations, Forescout offloads the many activities that scarce resources are no longer available to perform manually.<\/p>\n<\/div>\n<h2>Don\u2019t shut down \u2013 automate and orchestrate<\/h2>\n<p>Pictures of stranded motorists and clogged shipping ports make great clickbait, but the real story is, where did the attack actually occur, and how could it have been prevented? After a high-profile attack on critical infrastructure, the impulse is to double down on ICS and OT security. But\u00a0<a href=\"https:\/\/www.forescout.com\/forrester-ics-wave-report\/\">OT assets and networks should not be viewed in isolation<\/a>. In recent malware and ransomware campaigns, attackers exploited\u00a0weak device security posture, such as default credentials, vulnerable services and lack of segmentation to enter through IT systems. Uncertainty as to whether the OT network is vulnerable is sufficient for security teams to halt operations, at great cost. It\u2019s time for a new playbook.<\/p>\n<p>With proper visibility, segmentation and orchestration of point solutions across the entire threat landscape, companies can rebuff cyberattacks anywhere on their networks and carry on operations with confidence.<\/p>\n<div>\n<blockquote>\n<h4>Maximize ROI on your existing security point solutions with orchestration.<\/h4>\n<a href=\"\/webinars\/?webinar_category=eyeextend&webinar=444825\"  title=\"Watch the Webinar\" class=\"c-btn c-btn--primary icon-position-right\" target=\"new\"><span class=\"cta-button-text\">Watch the Webinar<\/span><\/a>\n<\/blockquote>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Almost a year since the Colonial Pipeline ransomware attack on critical infrastructure occurred, the question still looms large: not whether such an incident could happen again, but when? Now a string of ransomware attacks has affected at least 17 oil port terminals in Western Europe that caused tankers to be re-routed and supply chains disrupted. [&hellip;]<\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[653],"class_list":["post-70530","post","type-post","status-publish","format-standard","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>In High-profile OT Cyberattacks, the Culprit May Be the IT Network - Forescout<\/title>\n<meta name=\"description\" content=\"Organizations that manage critical infrastructure can reduce IT\/OT complexity by automating and orchestrating security point solutions across all networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In High-Profile OT Cyberattacks, the Culprit May Be the IT Network\" \/>\n<meta property=\"og:description\" content=\"Organizations that manage critical infrastructure can reduce IT\/OT complexity by automating and orchestrating security point solutions across all networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-25T21:37:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-25T22:03:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/FS-2022-Blog-Oil-Attack-v1-Facebook.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christina Hoefer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/FS-2022-Blog-Oil-Attack-v1-Twitter.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/\"},\"author\":{\"name\":\"Christina Hoefer\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/72d5dee38d4e4e9fcf3d6f1d3ff7ea73\"},\"headline\":\"In High-profile OT Cyberattacks, the Culprit May Be the IT Network\",\"datePublished\":\"2022-02-25T21:37:15+00:00\",\"dateModified\":\"2022-02-25T22:03:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/\"},\"wordCount\":793,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/\",\"name\":\"In High-profile OT Cyberattacks, the Culprit May Be the IT Network - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"datePublished\":\"2022-02-25T21:37:15+00:00\",\"dateModified\":\"2022-02-25T22:03:12+00:00\",\"description\":\"Organizations that manage critical infrastructure can reduce IT\/OT complexity by automating and orchestrating security point solutions across all networks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"In High-profile OT Cyberattacks, the Culprit May Be the IT Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/72d5dee38d4e4e9fcf3d6f1d3ff7ea73\",\"name\":\"Christina Hoefer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/fc6f2169ab4c71d8cccdd793e810300a\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aef1bfd35f68792b253ab828f2e6ce633884254d88467be005a227b863e66913?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aef1bfd35f68792b253ab828f2e6ce633884254d88467be005a227b863e66913?s=96&d=mm&r=g\",\"caption\":\"Christina Hoefer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"In High-profile OT Cyberattacks, the Culprit May Be the IT Network - Forescout","description":"Organizations that manage critical infrastructure can reduce IT\/OT complexity by automating and orchestrating security point solutions across all networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/","og_locale":"en_US","og_type":"article","og_title":"In High-Profile OT Cyberattacks, the Culprit May Be the IT Network","og_description":"Organizations that manage critical infrastructure can reduce IT\/OT complexity by automating and orchestrating security point solutions across all networks.","og_url":"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2022-02-25T21:37:15+00:00","article_modified_time":"2022-02-25T22:03:12+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/FS-2022-Blog-Oil-Attack-v1-Facebook.png","type":"image\/png"}],"author":"Christina Hoefer","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/FS-2022-Blog-Oil-Attack-v1-Twitter.png","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/"},"author":{"name":"Christina Hoefer","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/72d5dee38d4e4e9fcf3d6f1d3ff7ea73"},"headline":"In High-profile OT Cyberattacks, the Culprit May Be the IT Network","datePublished":"2022-02-25T21:37:15+00:00","dateModified":"2022-02-25T22:03:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/"},"wordCount":793,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/","url":"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/","name":"In High-profile OT Cyberattacks, the Culprit May Be the IT Network - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"datePublished":"2022-02-25T21:37:15+00:00","dateModified":"2022-02-25T22:03:12+00:00","description":"Organizations that manage critical infrastructure can reduce IT\/OT complexity by automating and orchestrating security point solutions across all networks.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/it-ot-cybersecurity-orchestration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"In High-profile OT Cyberattacks, the Culprit May Be the IT Network"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/72d5dee38d4e4e9fcf3d6f1d3ff7ea73","name":"Christina Hoefer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/fc6f2169ab4c71d8cccdd793e810300a","url":"https:\/\/secure.gravatar.com\/avatar\/aef1bfd35f68792b253ab828f2e6ce633884254d88467be005a227b863e66913?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aef1bfd35f68792b253ab828f2e6ce633884254d88467be005a227b863e66913?s=96&d=mm&r=g","caption":"Christina Hoefer"}}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/70530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=70530"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/70530\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=70530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=70530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=70530"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=70530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}