FireEye released the report: to date there is still 3 3% of industrial control system vulnerabilities have not been fixed-bug warning-the black bar safety net

ID MYHACK58:62201677898
Type myhack58
Reporter 佚名
Modified 2016-08-10T00:00:00


! Recently, the United States well-known network security company FireEye(fireeye released a survey report. The report stated: in the past 1 5 years, the worldwide total found by 1, 5 0 0 more than one industrial control system(ICS)vulnerabilities; and now, there are still some vulnerabilities do not get fixed. In recent years, governments around the world have been the maintenance of the national industrial system network security on the primacy, because the industrial system network security is the entire national network security cornerstone has a very important strategic position. At the same time, recent European Union through the NIS Network Information Service regulations, as well as in Poland, held NATO summit in Warsaw NATO summit, have once again highlighted the maintenance of industrial systems the importance of network security, to further improve the security level, to prevent the industrial system was hacked. FireEye recently released a report titled Overload: the Critical Lessons From 1 5 Years of ICS Vulnerabilities of summarizing the past 1 5 years, the ICS vulnerability lessons learned from the investigation report. From the 2 0 0 0 year to date, a FireEye company 1 2 3 home industrial equipment manufacturer produces industrial equipment for the tracking surveys, which found Total 1 5 5 2 able to influence the industrial equipment of the normal use of security vulnerabilities. And 2 0 1 0 years, is a global security experts exposed an ICS security vulnerability number most of the year. This is one of the most striking is undoubtedly the network attack weapons—Stuxnet Stuxnet virus was the virus known as the Stuxnet worm, or a super virus factories. FireEye the company noted in the report that: 2 0 1 0 years, the worldwide total found by 1, 4, 9 ICS vulnerabilities; 2 0 1 1 years, this volume presents explosive growth, an increase of 3 0 0 per cent. In 2 0 1 2-2 0 1 4 years, an increase has slowed, with an average annual of 5%. And 2 0 1 5 years were related to security experts called the“ICS history of disastrous year.” In this year, the only two industrial equipment manufacturers exposure shows 9 2 a ICS vulnerabilities. This situation also caused a global network of security experts and scholars of great concern. ! Mentioned in the report:“since 2 0 1 0 year discovered Stuxnet Stuxnet virus after the ICS system network security problem is caused by the relevant security experts of the attention.” In 2 0 0 0 2 to 2 0 1 0 year 1 2 Month 1 0 year period, a FireEye company a total of found 1 4 9 ICS vulnerabilities. From 2 0 to 1 1 to 2 0 to 1 6 years, 4 months, ICS vulnerability the number of further growth, reaching 1 5 5 2. We predicted that this growth trend will continue.” Then, ICS network security of the future? From FireEye company's security experts said that in the next few years, ICS number of vulnerabilities growth trend will not change. They expect that the vulnerability number will be an annual average of 5%of the amplitude continues to grow, and during this period, there will be the occasional outbreak or fading. Review 2 0 1 3 year 2 month to 2 0 1 6 years 4 months occurring during the 8 0 1 ICS vulnerabilities, we not difficult found, in by the vulnerability of the device, a 5 0% the device uses ICS Purdue industrial equipment design model. This industrial control system can allow the operator to supervise, control equipment work process. Once a hacker for such uses 2-level control system of the device initiates the attack, the consequences could be disastrous. The reason is that, in the embodiment during the attack, hackers can control the device operation process, feel free to change the initial setup of the device parameters, and thus might produce some not expected consequences. “In this 8 0 1 a vulnerability and do further research thereafter, FireEye the company's security personnel found: this one most, 5 8% of devices are using ICS Purdue 2-Level Control architecture model. This model's main function is to establish the device and the industrial control center computer interface.” We infer that this is because compared to the level 1 Model software, the 2-level model of the software more convenient to monitor, at the same time, researchers are also more familiar with the 2-level model of the software. However, this 2-level model of the software is also a double-edged sword, the attacker can easily get access permissions, and then be able to control the operation of the device process. This one has how many zero-day vulnerabilities Zero-Day Vulnerabilities? According to FireEye the company of the investigation report shows that in the 1 5 5 2 vulnerability 3 3% of the vulnerabilities belong to the zero-day vulnerabilities. Unfortunately, only in 2 0 1 6-year time of the year, the global exposure 4 0 0 a zero-day vulnerability, and which of the 1 0 0 more than vulnerability has still not been fixed. “The vulnerabilities related to the repair, which for many network security company, is undoubtedly a huge challenge. Hacking technology is becoming more Mature, thus increasing the repair of technical difficulty.” In we this 1 5 5 2 ICS vulnerability study found that a 5 1 6 a vulnerability, accounted for 3 3% of The has still not been fixed. Due to the lack of manufacturers of remedies and failed to timely introduction of software security patches, so that most of the ICS devices the software is still in danger, this also gives the hackers left a lot of attack aircraft.”