Perimeter Protection is No Longer Sufficient.
We explain how we have approached a multi-layered cybersecurity protection to minimize the different risks that threaten systems, from the network perimeter to PLC data
The number of cybersecurity attacks and incidents that have occurred in recent months continues to grow rapidly. Humans tend to normalize an event when it occurs frequently and downplay its importance, especially when it does not affect them. If we look back only 2 months, in April and May 2021:
- Use of Windows BITS to evade Firewalls (link).
- A 22-year-old accused of hacking the water supply network (link).
- Failures in Citrix hypervisor may allow code execution on virtual machines (link).
- The German parliament under attack (link) with spear phishing
- Several APT groups attack Fortinet servers with FortiOS to exploit unpatched vulnerabilities from 2018 (link).
- 533 million leaked Facebook phone numbers (link).
- Applus+ stops a cyberattack that interrupted its activity (link).
- The identity of an official government website is stolen to sell sneakers (link).
- Phishing campaign impersonating the Tax Agency (link) to install malware
- Malware campaign via LinkedIn (link).
- Data of 500 million LinkedIn users leaked (link).
- BleedingTouch – Bluetooth Bug in Linux that allowed remote code execution with kernel privileges (link).
- Malware that spreads via WhatsApp (link).
- Exploiting Windows RPC (link).
- Denial of service in IPv6 in Windows (link).
- The Android Gigaset update server was hacked to install malware on devices (link).
- 0-day for Chrome and Microsoft Edge (link).
- 9 vulnerabilities in TCP/IP affect 100 million IoT devices (link).
- 0-day of the Windows window manager (link).
- The Phone House affected by Ransomware (link link).
- Airstrike Attack – Encryption bypass on Windows domain computers (link).
- Hacks in Microsoft Exchange (link).
- Cyberattack on Avalia manages to extract 7GB of confidential information (link).
- Vincle, another company attacked by Ransomware (Babuk) – link.
- Ransomware attack on the University of Castilla la Mancha (link)
- 0-day vulnerability of Pulse Secure VPN (link).
- Revil threatens Apple to leak designs after compromising Quanta (link).
- Massive attack on QNAP devices (link).
- Bypass of digital signature validation in MSI packages may allow the installation of packages (link).
- Privilege escalation in MySQL in Windows (link).
- Attack on the INE and other ministries (link).
- Mappings of APT groups in North Korea, USA, China and Russia (link, link link link).
- Privilege escalation in Windows RPC (link).
- Babuk (RansomWare) affects the Washington DC police (link).
- Data leak from Real Madrid (link).
- 2 0-day for iOS and iPadOS (link).
- Mobile applications expose AWS key data (link).
- They hack a Tesla car remotely from a drone (link)
- A vulnerable Dell driver puts millions of systems at risk (link link).
- Critical error in VMWare vRealize Business (link).
- A Qualcomm vulnerability has impacted about 40% of mobile phones (link).
- A flaw in Foxit Reader allows malicious code to be executed through PDF (link).
- A Ransomware attack stops the largest fuel pipeline in the US (link).
- Almost all WiFi devices are vulnerable to FragAttacks (link).
- 0-day for Adobe Acrobat (link).
- A cyberattack forces the Irish health system to shut down its computer system (link).
- Toshiba affected by DarkSide (RansomWare) (link).
- Vulnerability in IIS that allows malicious code to be executed in the Windows kernel (link).
- Axa affected by ransomware (link).
- They hack the networks of Russian federal agencies (link).
Oh yeah! And this only in 2 months… to which must be added all those previous vulnerabilities that have not yet been patched…
This represents a hell for anyone who has the objective of keeping systems more or less secure: although the techniques used are few: malware, exploitation of vulnerabilities and social engineering, the attack vectors are many and in some cases very difficult to avoid (do you use wifi? do you use PDF? do you use Android or iOS devices? do you use NAS? do you use the latest patched firmwares of various devices? Do you use Windows? Do you use Linux? Do you use databases? Do you use web interfaces? Do you use virtualization? Do you use drivers? Do you trust your supply chain?…)
The protection of a critical network infrastructure cannot be based solely on access control to it. Obviously, perimeter protection is and will continue to be very important, but additional countermeasures should be considered in case this protection, for one reason or another, fails.
To successfully address the cybersecurity problem, we have no choice but to implement in-depth defense and monitoring strategies that allow us to protect and detect problems at different points in our network. First to limit the impact of this type of incident and second to prevent it from spreading to other areas or areas of our activity.
To begin with, we can look at the international standards and what basic ideas they convey to us. For example, NIST CSF 1.1 contains a series of recommendations and references to other standards to implement a defense in depth:

The technologies available to meet the protection needs of each of these points are many and varied.
From Logitek we explain how we have approached a multi-layered cybersecurity protection to minimize the different risks that threaten systems, from the network perimeter to PLC data:
-
Defense-in-depth strategy in industrial cybersecurity.
-
How Logitek Implements Perimeter Defense.
-
How Logitek Implements Internal Network Defense.
-
How Logitek implements the defense of equipment.
-
How Logitek implements the defense of critical applications.
-
How Logitek Implements Data Defense.
-
In-depth monitoring.





