Detection of OT security risks

in
multiple food production lines
The food manufacturing company with over 20,000 employees in more than two dozen countries sought visibility and clarity on existing cybersecurity risks in its production lines.

Global 24/7 Cybersecurity For Renewable Energy Resources

at
BayWa r.e. Data Services GmbH
The BayWa r.e. AG designs, builds and operates wind farms and photovoltaic (PV) parks worldwide. 99 % of technical operations management, servicing and maintenance are carried out via remote access.

Network Intrusion Detection with Rhebo support

at
Stadtwerke Bochum Netz
Stadtwerke Bochum Holding has been a reliable supply partner for all Bochum residents since 1855. Today, Stadtwerke Bochum provides around 3,600 GWh of electricity and around 2,900 GWh of gas every year. It also provides water, district heating, telecommunications products, and solutions for the expansion of e-mobility. As a modern, customer-oriented company, Stadtwerke Bochum actively addresses the requirements and challenges of the times.

Verification of Network Segmentation at German Water Company

at
Waterworks Leipzig
The German water company Leipziger Wasserwerke (LWW) is a subsidiary of the Leipziger Gruppe. With 5 water plants, the company supplies 545,000 people in the Leipzig region with fresh and high-quality drinking water. It also treats 95,000 m³ of waste water per day in 25 sewage treatment plants.

Sabotage Investigation in Logistics Companies

at
Digital Forensics GmbH
Digital Forensics GmbH is a german company specializing in forensic analysis of large-volume network traffic in industry and insurance. The company evaluates cases of damage and analyses cyber attacks. Knowledge of industry-specific protocols such as Profinet, OPC, S7 or IEC61850 as well as their evaluation form a focal point of the work.

Secure Energy Supply For Over 1 Million People

at
Thüringer Energienetze GmbH & Co. KG
TEN Thüringer Energienetze is the largest distribution network operator in the German federal state of Thuringia. Its networks reliably supply more than 1.1 million people, the domestic economy and downstream distributors with energy. TEN provides all infrastructure services for the supply of electricity and natural gas, the connection of decentralized energy resources and, as part of its services, network operation for third parties.

Real-Time Security and Continuous Improvement Of Energy Supply

at
e-netz Südhessen AG
Anchored in Darmstadt, e-netz Südhessen AG, as a subsidiary of ENTEGA AG, takes care of the secure energy supply and the functioning infrastructure for around one million people in the region - from private households to municipal facilities, operators of solar systems and wind farms to industrial companies, scientific and research institutions.

Defense-in-Depth in the OT networks

at
MEGA, der Monheimer Elektrizitäts- und Gasversorgung GmbH
As a municipal energy supplier and innovative service provider, MEGA is as much a part of Monheim as the Rhine. Personally and locally, we create a warm, bright home for the people of Monheim with a fast digital window to the world. For over 100 years, we have been helping to make Monheim am Rhein a livable and attractive city - for families and companies.

Ensuring ICS Cybersecurity of Energy Providers

at
EWR Netz GmbH
In addition to its core business as a public network operator for electricity, gas and water, EWR Netz GmbH offers many different services with its qualified employees and extensive technical equipment. Regional network operators such as EWR Netz GmbH play an important role in the energy transition, as renewable energies and decentralized generation plants are feeding more and more electricity into the networks.

Intrusion Detection & Mitigation

at
sonnen GmbH
Since 2018, Sonnen GmbH has been the first and so far only provider in Germany to connect private home storage systems to form a virtual power plant. Sonnen GmbH is building an energy system that provides clean electricity at exactly the right time and where it is needed. A system that enables cost benefits for everyone while relieving the strain on the power grid. In addition, the sonnenVPP plays an important role in the energy transition. By stabilizing the energy grids on three continents, the company is ensuring that more and more renewable energies can be connected to the grid, thus accelerating the transition to clean energy.

Details

Initial situation and challenge

Modern food production is fully automated. From the field and the stables to processing and packaging, software-controlled processes work hand in hand. Despite this sophisticated digitalization and industrial automation, the analyzed company lacked visibility into its process control technology, the OT. In the wake of stricter cybersecurity regulations on the one hand and increasing cyberattacks on the IT and OT of large corporations on the other, the food producer decided to thoroughly examine the OT networks at four of its locations.

Solution

Risk analysis and vulnerability assessment

Rhebo Industrial Security Assessment

  • detect and analyze assets and communication structures,
  • identify vulnerabilities, stability and security gaps,
  • define mitigation measures for system hardening.

Implementation and findings

At four of the food producer's locations, Rhebo sensors were integrated into the OT networks. These passively and non-intrusively recorded all OT communication without interruption for several weeks. Next, as part of a Rhebo Industrial Security Assessment, Rhebo experts analyzed the communication logs using deep packet inspection, automated anomaly detection and forensic analysis, among other things.  

What emerged was that each OT network had between 200 and 550 devices from around two dozen manufacturers in operation. The assessment made it possible to visualize all devices, their firmware versions, connections to other systems and communication patterns for the first time. It was already apparent that several systems were using outdated software, operating systems or firmware for which vulnerabilities had been known for some time or which had long since reached their end-of-life.

Selection of identified security risks:

  • plaintext password protocols
  • systems without log-in and authentication measures
  • insecure authentication methods
  • connections to the internet

Selection of stability risks:

  • unreachable systems
  • network instabilities
  • Checksum errors

Results

Full OT visibility and understanding gained

through asset discovery and visualization of connections and systems properties.

Existing vulnerabilities mitigated

which could pose security risk for physical processes.

Stability risks for production lines reduced

through identification of malfunctioning connections, communication and devices.

Also interesting