Guidelines for Ransomware Protections on Industrial Control Systems in Phra Nakhon Si Ayutthaya-based Factories A Case Study of CryptoLocker

Main Article Content

Krishna Chimmanee
Phitaya Nakhonthai
Naughtakid Phromchan

Abstract

In the era of Industry 5.0, control systems in industrial plants are connected through computer networks. Consequently, these systems have become primary targets for ransomware attacks. Therefore, this research aimed to identify appropriate measures to protect against ransomware threats for industrial control systems. It was a qualitative study utilizing focus group discussions or targeted academic conferences to find ransomware prevention measures and response practices for ransomware attacks within industrial control systems. The results of the research were: 1) A technological diagram that illustrates the relationship among Information Technology (IT), Operational Technology (OT), and Industrial Control Systems (ICS) convergence based on the five-step framework of the National Institute of Standards and Technology (NIST), under the U.S. Department of Commerce, and 2) A practical model for implementation between IT Zone and OT Zone, with a particular emphasis on databases and authentication, which are current vulnerabilities. This model was applied in large industrial plants as a case study.

Article Details

How to Cite
Chimmanee, K., Nakhonthai, P., & Phromchan, N. (2024). Guidelines for Ransomware Protections on Industrial Control Systems in Phra Nakhon Si Ayutthaya-based Factories: A Case Study of CryptoLocker. Journal of Criminology and Forensic Science, 10(2), 1–17. retrieved from https://so02.tci-thaijo.org/index.php/forensic/article/view/268396
Section
Research Articles

References

Alamri, A. (2023). Dragos Industrial Ransomware Analysis: Q2 2023. Retrieved August 9, 2023. from https://www.dragos.com/blog/dragos-industrial-ransomware-attack-analysis-q2-2023.

AlMedires, M., & AlMaiah, M. (2021). Cybersecurity in industrial control system (ICS). IEEE 2021 International Conference on Information Technology (ICIT), 640-647.

Belev, B. C. (2022). Purdue Model Implementation in the Shipping Control Systems. IEEE In 2022 10th International Scientific Conference on Computer Science (COMSCI), 1-4.

Chimmanee, K., and Chotrungrat, M. (2021). A Guideline for Ransomware Detection and Prevention at the Buddhist Places: A Case Study of Maze Gang. Mahachula Academic Journal, 8(3), 104-118. (In Thai).

Goodwin, S. (2022). The need for a financial sector legal standard to support the NIST Cybersecurity Framework. IEEE SoutheastCon 2022, 89-95.

Kobialka, D. (2023). Stellar Cyber now offers XDR for Operational Technology (OT) Environments. Retrieved August 9, 2023. from https://www.msspalert.com/news/stellar-cyber-now-offers-xdr-for-operational-technology-ot-environments

Microsoft Threat Intelligence. (2020). Ransomware groups continue to target healthcare critical services. Retrieved August 9, 2023. from https://www.microsoft.com/en-us/security/blog/2020/04/28/ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk.

Nakhonthai, P., and Chimmanee, K. (2022). Digital Forensic Analysis of Ransomware Attacks on Industrial Control Systems: A Case Study in Factories, IEEE 2022 6th International Conference on Information Technology (InCIT), 416-421.

Rajesh, P., Alam, M., Tahernezhadi, M., Monika, A., & Chanakya, G. (2022). Analysis of cyber threat detection and emulation using mitre attack framework. IEEE 2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA), 4-12.

Stouffer, K., Pease, M., Tang, C., Zimmerman, T., Pillitteri, V., Lightman, S., Hahn, A., Saravia, S., Sherule, A., and Thompson, M. (2023). NIST SP 800-82r3 Guide to Operational Technology (OT) Security. Retrieved September 10, 2023. from https://csrc.nist.gov/pubs/sp/800/82/r3/final.

Udroiu, A. M., Dumitrache, M., & Sandu, I. (2022, June). Improving the cybersecurity of medical systems by applying the NIST framework. IEEE 2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 1-7.

Wiboonrat, M. (2022). Cybersecurity in Industrial Control Systems: An integration of information technology and operational technology, IEEE IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society, 1-6.

You, Y., Lee, J., Oh, J., & Lee, K. (2018). A review of cyber security controls from an ICS perspective. IEEE 2018 International Conference on Platform Technology and Service (PlatCon), 1-6.