Security Researchers say Half Of Industrial Control System Networks Have Faced Cyber Attacks

But in many cases they are not deliberately targeted and only fall victim because of poor security.

           By  | 

Industrial control systems in manufacturing, energy, chemical and other environments are coming under an increasing number of cyberattacks, as hacking groups of all kinds attempt to breach these networks.By targeting industrial systems attackers can potentially do vast amounts of damage, ranging from using backdoors to make off with sensitive data, causing the network to shut down due to a ransomware attack, or even leading to dangerous situations and industrial systems break down, causing physical damage.

$199 ENROLLS YOU INTO OUR SELF PACED COURSE – LFS264 – OPNFV FUNDAMENTALS!

Many control systems still run on old or bespoke operating systems making them vulnerable to interference, and cyber attackers ranging from criminal gangs to state-backed hacking groups know this and are looking to take advantage.

According to new figures from Kaspersky Lab’s Threat Landscape for Industrial Automation Systems report, almost one in two industrial systems display evidence of attackers attempting malicious activity – in most cases, detected by security software

The figures – based on anonymised data submitted to the Kaspersky Security Network by the security company’s customers – reveal that the main attack vector for these systems is unsurprisingly via the internet with hackers on the look out for unsecured ports and systems to can gain access to. This accounted for a quarter of identified threats.

In some cases, these internet-based attacks won’t even be targeting industrial networks specifically, but the way in which their set-up leaves them open to the internet means self-propagating campaigns can easily find them.

Removable media is identified as the second most prolific threat to industrial networks. In some cases, the systems aren’t connected to the internet, but be it intentionally or not, corrupted USB drives can lead to systems becoming infected with malware.

 

Researchers identify email as the third most common attack vector targeting these systems. These phishing attacks remain the number one attack method used by hacking groups that are specifically targeting the networks of organisations for the purpose of espionage.

Malicious payloads drop trojans, backdoors and keyloggers which allow attackers to gain access to the network, with sophisticated hacking operations like SharpshooterGreyEnergyand MuddyWater among those causing headaches for industrial operations.

$299 REGISTERS YOU FOR OUR NEWEST SELF PACED COURSE! LFD201 – INTRODUCTION TO OPEN SOURCE DEVELOPMENT, GIT, AND LINUX!

It’s also possible that phishing emails get spammed out to users who run these systems by botnet campaigns which aren’t targeted – but, nonetheless, they still do damage and organisations need to be aware of the risks they face if their systems aren’t secure.

“Despite the common myth, the main source of threat to industrial computers is not a targeted attack, but mass-distributed malware that gets into industrial systems by accident, over the internet, through removable media such as USB sticks, or emails,” said Kirill Kruglov, security researcher at Kaspersky Lab ICS CERT.

“However, the fact that the attacks are successful because of a casual attitude to cybersecurity hygiene among employees means that they can potentially be prevented by staff training and awareness – this is much easier than trying to stop determined threat actors,” he adds.

To help prevent successful attacks against industrial networks, researchers recommend regularly updating operating systems and software on the industrial network and applying security fixes and patches where available.

LKID

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.