ABSTRACT

ICS-CERT - 2010 Year in Review   [open pdf - 445KB]

"The past year has been a busy and unprecedented year for both the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and the control systems community. The most notable event was the emergence of Stuxnet, the first malware created specifically to target industrial control systems (ICS). ICSCERT analysts and researchers across industry dissected and unraveled the malware revealing a sophisticated trail of zero-days, anti-detection, and propagation techniques. Since Stuxnet's discovery, news outlets and bloggers have flooded cyberspace with a barrage of analysis and conjecture behind who created it and who was the intended target. While many theories abound, it is the Department's mission to remain focused on the risk mitigations and collaborate with the 18 Critical Infrastructure/Key Resource (CIKR) sectors to promote preparedness and information sharing. ICS-CERT accomplished this through sector briefings, meetings, conferences, and other engagements to meet with asset owners and operators, vendors, and federal/state/local partners to discuss concerns and mitigations for this and other threats. For many, Stuxnet signaled a paradigm shift with the ICS community, demonstrating that organizations must be operationally prepared with tools, systems, and personnel to detect malicious activity and effectively mitigate the impact to their control systems. […] This report looks back at 2010 and highlights significant activities and events affecting ICS. It also provides lessons learned and links to resources that organizations can use to help better prepare for the 'next Stuxnet.' ICS-CERT looks forward to 2011 as it continues this important mission to advance the state of awareness and preparedness."

Publisher:
Date:
2011-01
Copyright:
Public Domain
Retrieved From:
Computer Emergency Response Team: http://www.us-cert.gov/
Media Type:
application/pdf
URL:
Help with citations