https://www.computerweekly.com/news/366623645/US-tells-CNI-orgs-to-stop-connecting-OT-kit-to-the-web
A growing number of ongoing cyber incidents affecting US operators of critical national infrastructure has prompted a cross-agency warning from the US authorities, with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation, the Environmental Protection Agency, and the Department of Energy all weighing in.
In a jointly penned advisory, the organisations said they were “aware of cyber incidents” affecting the operational technology (OT) and industrial control systems (ICS) of CNI operators.
“The authoring organisations urge critical infrastructure entities to review and act now to improve their cyber security posture against cyber threat activities specifically and intentionally targeting internet connected OT and ICS,” said the advisory’s authors.
OT systems are incredibly easy targets for state-backed and financially motivated threat actors alike when connected to the internet, because they often lack up-to-date authentication and authorisation methods and can be found quickly by running searches for open ports on public IP ranges.
“Cyber threat actors use simple, repeatable and scalable toolsets available to anyone with an internet browser,” said CISA. “Critical infrastructure entities should identify their public-facing assets and remove unintentional exposure.”
Sean Tufts, managing partner for critical infrastructure and operational technology at Optiv, a security consultancy, said: “The industry has been working diligently on auditing N/S [North/South] traffic on the firewalls. We’ve seen great improvement in finding these connections and cutting them.
“What is currently left are mission-critical applications like SAP,” he added. “This is especially true in manufacturing, where workflow management has digitally transformed faster than security could keep up. Ensuring these connections are correctly configured and architected is a task measured in years, not days.”
The full advisory – which can be downloaded here – contains additional guidelines on security OT and ICS estates. These include:
Nic Adams, co-founder and CEO at 0rcus, a threat intelligence specialist, said: “Critical infrastructure systems are being targeted not because the attackers are sophisticated, but because the systems are defenceless.
“The threat is pure operational negligence,” he said. “If your control layer can be accessed without physical proximity, isolated network design and verified authentication, it is functionally compromised. Breaches now announce themselves with subtle logic changes, unauthorised sessions or misconfigurations missed during commissioning.
“Look past malware,” said Adams. “Treat every control asset as a live-fire target. If you haven’t tested under adversarial pressure, it won’t even come close to holding.”
He warned that CNI organisations that aren’t prepared to make the recommended changes risked “becoming the next headliner and laughing stock”.
08 May 2025