By Pascal Ackerman, senior consultant of Industrial Cyber Security, Rockwell Automation
Now that servers and clients are back up and running, production systems (such as control, visualization and batch) have resumed their activities, and plants once again are producing goods, it’s time to reflect on recent events.
I remember very well how this all started. Headlines across the Web included, “Ransomware!” and “Manufacturing companies with systems down” and “Production halted!” This was not something you wanted to wake up to on a summer morning.
The culprit was a piece of malware called Nyetya or NotPetya. First believed to be ransomware, NotPetya turned out to be a wiper virus with wormlike methods of propagation. We’ll refer to it as a WiperWorm.
Computer Security Plans
Teams with a plan chose their actions carefully and executed them with purpose. An effective response typically involved following a process similar to that referenced within the Computer Security Incident Handling Guide (National Institute of Standards and Technology Special Publication 800-61).
The first step was to assess the impact’s magnitude and analyze what was causing it so that appropriate steps could be taken to contain the event. However, in many cases, this wasn’t possible.
For some, the NotPetya WiperWorm hit almost every Windows computer connected to the industrial control system network. With prospects of recovering infected systems looking slim, the next logical step was to start going over existing system backups and attempting to recover. If backups didn’t exist, all production systems would need to be rebuilt from scratch, a costly and time-consuming predicament.