Trend Micro has published an in-depth research highlighting new threats to 4G/5G campus networks, many of which capitalize on the difficulty organizations have in patching critical OT environments.
The report details multiple attack scenarios and possible mitigations, using a testing environment designed to mimic a smart factory campus network.
“Manufacturers are at the cutting edge of IIoT deployment, gearing up with 5G to tap the power of connectivity everywhere to drive greater speed, safety and efficiency. But with new technology comes new threats added to legacy challenges,” said Yohei Ishihara, Security Evangelist for Trend Micro. “As the report warns, many are stuck in a bind—unable to afford the downtime necessary to patch critical system vulnerabilities that may otherwise be exploited. Fortunately, our extensive research also highlights multiple mitigations and best practices to protect the smart factories of today and tomorrow.”
Once the attacker gets in the core network from any of these entry points, they will attempt lateral movement in a bid to intercept and change network packets. By attacking industrial control systems in smart manufacturing environments like the test site, attackers could steal sensitive data, sabotage production, or hold organizations to ransom.
From the 11 attack scenarios demonstrated, one of the most potentially damaging involves targeting Microsoft Remote Desktop Protocol (RDP) servers, which are commonly used by IT and field engineers.
The upgrade to 5G doesn’t automatically protect RDP traffic, so attackers could use this access to download malware and ransomware, or directly hijack industrial control systems. RDP v 10.0 is the most secure version and may offer some protection against these attacks, but again it may be difficult for organizations to upgrade.
Among the recommendations made in the report to protect 4G/5G campus networks are:
- VPN or IPSec to protect remote communication channels, including remote sites and base stations
- Application-layer encryption (HTTPS, MQTTS, LDAPS, encrypted VNC, RDP v10, and secure industrial protocols like S7COMM-Plus)
- EDR, XDR or MDR to monitor attacks and lateral movement inside the campus and the containerized core network
- Proper network segregation with VLAN or SDN
- Prompt patching, where possible, of servers, routers and base stations
- Anomaly detection products, like Trend Micro Mobile Network Security, which are campus network-aware and provide a robust way to cut off unlisted device/SIM card pairs