{"id":70672,"date":"2022-03-07T15:18:25","date_gmt":"2022-03-07T23:18:25","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/research-labs\/access7-copy\/"},"modified":"2024-04-11T06:04:17","modified_gmt":"2024-04-11T13:04:17","slug":"r4iot","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/r4iot\/","title":{"rendered":"R4IoT"},"content":{"rendered":"<h1>R4IoT: When Ransomware Meets IoT and OT<\/h1>\n<p>Forescout\u2019s Vedere Labs has released a demonstration, report and detailed playbook describing how organizations can protect themselves against R4IoT: a novel, proof-of-concept ransomware that exploits an IoT device to gain access and move laterally in an IT network and impact the OT network. This demonstration is backed by rigorous research into IT, OT and IoT asset vulnerabilities as well as current ransomware trends.<\/p>\n<p>\u00a0<\/p>\n<p>Access the eBook<br \/>\n \u00a0\u00a0\u00a0Watch the Webinar\n<p>\u00a0<\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">How Can Organizations Help Protect Themselves Against R4IoT?<\/h2>\n<p>The R4IoT report is backed by rigorous research into IT, OT and IoT asset vulnerabilities as well as current ransomware trends. Specifically, it shows how ransomware could evolve based on: <\/p>\n<ul>\n<li>The proliferation of IoT devices in organizations <\/li>\n<li>The convergence of IT and OT networks <\/li>\n<\/ul>\n<p>R4IoT exploits the first trend by using exposed vulnerable devices such as an IP camera or a NAS as the initial access point. It exploits the second trend to hold OT devices hostage, thus adding another layer of extortion to an attack campaign.  <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/FS-2023-R4IoT-Report-Blade-v1-588x290-1.png\" class=\"u-size-full\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Detecting Mixed IT\/IoT\/OT threats <\/h2>\n<p>Attacks like the one demonstrated in R4IoT require new, superior security approaches to detect and respond to threats that leverage a combination of device types as part of an attack \u2013 attacks that siloed security tools cannot fully detect.  <\/p>\n<p>See how Forescout Threat Detection &amp; Response can automatically detect and respond to cross-device threats like R4IoT. <\/p>\n<p><a href=\"\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/\" title=\"Access The eBook\" class=\"c-btn c-btn--primary\">Access The eBook<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/05\/FS-2022-R4IoT-LP-Image-1-v01_01-Read-Report20.png\" class=\"u-size-full\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Ransomware Evolution <\/h2>\n<p>Cyber attacks involving OT and IoT are part of an alarming trend: large ransomware gangs, often operating a ransomware-as-a-service (RaaS) model, crippling the operations of several types of organizations, often at the same time. Attacks have moved from purely encrypting data (2019) to exfiltrating data before encryption (2020) to large extortion campaigns with several phases (2021). Sophisticated ransomware families (<a href=\"\/resources\/analysis-of-an-alphv-incident\" target=\"new\" rel=\"noopener\">ALPHV<\/a>, <a href=\"\/resources\/analysis-of-conti-leaks\/\">Conti<\/a>) have been active in 2022, sometimes taking a political position after the Russian invasion of Ukraine. This evolution in attacker methods means that ransomware gangs can nowadays cripple the operations of virtually any organization.  <\/p>\n<p><a href=\"\/resources\/r4iot-next-generation-ransomeware-report\/\" title=\"Read the Report\" class=\"c-btn c-btn--primary\" target=\"_blank\" rel=\"noopener\">Read the Report<\/a><\/p>\n<h3 class=\"c-title-medium u-mt-s\">How R4IoT Works <\/h3>\n<p>R4IoT exploits an IoT device for initial access, targets IT devices to deploy ransomware and crypto ware, and leverages poor OT security practices to cause physical disruption to business operations. By compromising IoT, IT and OT assets, R4IoT goes beyond the usual encryption and data exfiltration to cause physical disruption of business operations.  <\/p>\n<h3 class=\"c-title-medium u-mt-s\">Proof of Concept<\/h3>\n<p>The proof of concept on IT equipment includes deployment of a crypto miner and data exfiltration. The impact on OT is not limited to standard operating systems (e.g., Linux) or device types (e.g., building automation), does not require persistence or firmware modification on the targeted devices and works at scale on a wide variety of devices impacted by TCP\/IP stack vulnerabilities. <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/research-two-columns2.png\" loading=\"lazy\"><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/research-two-columns.png\" loading=\"lazy\"><\/p>\n<p><a href=\"\/resources\/r4iot-next-generation-ransomeware-report\" title=\"Read the Report\" class=\"c-btn c-btn--primary\">Read the Report<\/a><\/p>\n<h2 class=\"c-title\">Risk Mitigation Strategies <\/h2>\n<p>R4IoT is novel in how it combines IoT\/OT exploits with a traditional attack campaign. Still, organizations can mitigate both the likelihood and impact of this type of incident by applying controls aligned with the five <a href=\"https:\/\/www.nist.gov\/cyberframework\/getting-started\" target=\"_blank\" rel=\"noreferrer noopener\">NIST Cybersecurity Framework<\/a> functions. See the technical report for a detailed mitigation playbook by TTP:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/05\/FS-2022-R4IoT-LP-Icons-v01_01-Identify.png\" loading=\"lazy\"><\/p>\n<h4>Identify and Protect<\/h4>\n<p>Leverage the Forescout Vedere Labs <a href=\"https:\/\/dashboard.vederelabs.com\/\">Global Cyber Intelligence Dashboard<\/a> for information about vulnerable IoT and OT assets that are being actively exploited and prioritize their protection<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/05\/FS-2022-R4IoT-LP-Icons-v01_01-Detect.png\" loading=\"lazy\"><\/p>\n<h4>Detect<\/h4>\n<p>Use a threat detection &amp; response solution that can correlate a series of low-confidence IT\/IoT\/OT incidents, convert them into a high-fidelity threat, and orchestrate and automate response. <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/05\/FS-2022-R4IoT-LP-Icons-v01_01-Respond.png\" loading=\"lazy\"><\/p>\n<h4>Respond and Recover<\/h4>\n<p>Be ready with policies, control and incidence response plans<\/p>\n<p><a href=\"\/blog\/r4iot-when-ransomware-meets-the-internet-of-things\/\" title=\"Read The Blog\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-idea icon-position-right has-icon-animation icon-animation-pulse element-visibility has-element-animation element-animation-fade-in\">Read The Blog<br \/>\n<\/a>\n<h2 class=\"c-title\">How Forescout Can Help<\/h2>\n<p>Mitigating ransomware attacks requires complete visibility and enhanced control of all assets in your digital terrain. <a href=\"\/products\/\">Forescout Platform<\/a> helps by:<\/p>\n<ul style=\"text-align: left\">\n<li>Automatically detecting and responding to cross-device threats by converting telemetry and logs into <a href=\"\/products\/threat-detection-and-response-xdr\/\">high-fidelity, SOC-actionable probable threats<\/a><\/li>\n<li>Providing complete visibility based on <a href=\"\/products\/eyesight\/\">discovery, classification and assessment<\/a> of your entire asset landscape without disrupting critical business processes<\/li>\n<li>Maintaining a complete <a href=\"\/products\/eyeinspect\/\">asset and network communications inventory<\/a> based on deep packet inspection, which allows for network monitoring and threat hunting capabilities<\/li>\n<li>Accelerating the design, planning and deployment of <a href=\"\/products\/eyeinspect\/\">dynamic network segmentation<\/a> to reduce your attack surface<\/li>\n<li>Sharing asset context between the Forescout Platform and other IT and security products to <a href=\"\/products\/eyeextend\/\">automate policy enforcement<\/a> across disparate solutions and accelerate system-wide response to mitigate risks<\/li>\n<\/ul>\n<p><a href=\"\/products\" title=\"Learn More\" class=\"c-btn c-btn--primary\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><\/p>\n<h2 class=\"c-title\">Forescout Products<\/h2>\n<p>Get the capabilities you need to build a tailored security solution for your digital terrain  and continuously automate actions to reduce cyber risk.<\/p>\n<h3 class=\"c-card__title\">\neyeSight<br \/>\n<\/h3>\n<p>Assess Your Risk: Finding Vulnerable Devices<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/products\/eyesight\/\" title=\"eyeSight\" class=\"c-read-more c-link-expand u-mt-auto\">eyeSight<\/a><\/p>\n<h3 class=\"c-card__title\">\neyeInspect<br \/>\n<\/h3>\n<p>Identify Attacks: Detecting Ongoing Exploits<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/products\/eyeinspect\/\" title=\"eyeInspect\" class=\"c-read-more c-link-expand u-mt-auto\">eyeInspect<\/a><\/p>\n<h3 class=\"c-card__title\">\neyeSegment<br \/>\n<\/h3>\n<p>Protect Your Organization: Segmenting the Network<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/products\/eyesegment\/\" title=\"eyeSegment\" class=\"c-read-more c-link-expand u-mt-auto\">eyeSegment<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>R4IoT: When Ransomware Meets IoT and OT Forescout\u2019s Vedere Labs has released a demonstration, report and detailed playbook describing how organizations can protect themselves against R4IoT: a novel, proof-of-concept ransomware that exploits an IoT device to gain access and move laterally in an IT network and impact the OT network. This demonstration is backed by [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":70336,"menu_order":95,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[407],"class_list":["post-70672","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>R4IoT - Forescout<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/r4iot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"R4IoT - Forescout\" \/>\n<meta property=\"og:description\" content=\"R4IoT: When Ransomware Meets IoT and OT Forescout\u2019s Vedere Labs has released a demonstration, report and detailed playbook describing how organizations can protect themselves against R4IoT: a novel, proof-of-concept ransomware that exploits an IoT device to gain access and move laterally in an IT network and impact the OT network. This demonstration is backed by [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/r4iot\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-11T13:04:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/FS-2023-R4IoT-Report-Blade-v1-588x290-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/r4iot\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/r4iot\/\",\"name\":\"R4IoT - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/r4iot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/r4iot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/FS-2023-R4IoT-Report-Blade-v1-588x290-1.png\",\"datePublished\":\"2022-03-07T23:18:25+00:00\",\"dateModified\":\"2024-04-11T13:04:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/r4iot\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/r4iot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/r4iot\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/FS-2023-R4IoT-Report-Blade-v1-588x290-1.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/FS-2023-R4IoT-Report-Blade-v1-588x290-1.png\",\"width\":588,\"height\":290},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/r4iot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\",\"item\":\"https:\/\/www.forescout.com\/research-labs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"R4IoT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"R4IoT - Forescout","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/r4iot\/","og_locale":"en_US","og_type":"article","og_title":"R4IoT - Forescout","og_description":"R4IoT: When Ransomware Meets IoT and OT Forescout\u2019s Vedere Labs has released a demonstration, report and detailed playbook describing how organizations can protect themselves against R4IoT: a novel, proof-of-concept ransomware that exploits an IoT device to gain access and move laterally in an IT network and impact the OT network. This demonstration is backed by [&hellip;]","og_url":"https:\/\/www.forescout.com\/research-labs\/r4iot\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-04-11T13:04:17+00:00","og_image":[{"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/FS-2023-R4IoT-Report-Blade-v1-588x290-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/r4iot\/","url":"https:\/\/www.forescout.com\/research-labs\/r4iot\/","name":"R4IoT - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs\/r4iot\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs\/r4iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/FS-2023-R4IoT-Report-Blade-v1-588x290-1.png","datePublished":"2022-03-07T23:18:25+00:00","dateModified":"2024-04-11T13:04:17+00:00","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/r4iot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/r4iot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs\/r4iot\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/FS-2023-R4IoT-Report-Blade-v1-588x290-1.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/FS-2023-R4IoT-Report-Blade-v1-588x290-1.png","width":588,"height":290},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/r4iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs","item":"https:\/\/www.forescout.com\/research-labs\/"},{"@type":"ListItem","position":3,"name":"R4IoT"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=70672"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70672\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=70672"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=70672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}