In a recent article from Control Engineering
, they discuss the current issues in industrial cybersecurity. "There is a meteoric rise in ransomware attacks in the past year is disturbing news for engineers in manufacturing and production environments. Ransomware, is a kind of malicious software used by criminals to prevent access to a computing system until their demands are met.
- In April 2016, cybercriminals delivered ransomware via phishing to the corporate network of Board of Water & Light (BWL), a Michigan-based public electric and water utility. Administrators shut down the corporate network to isolate the ransomware to prevent it from potentially moving into the operations-technology environment.
- In December 2015, an allegedly Russia-backed group established remote access to supervisory control and data acquisition (SCADA) systems of three electricity distributors in Ukraine after procuring valid network credentials via spearphishing. The threat actors used access to systematically open breakers, causing blackouts for 225,000 customers.
- In June 2015, a cybercriminal advertised the sale of SCADA access credentials on a Dark Web forum dedicated to selling stolen data. The post included a screenshot of a SCADA graphical user interface, IP addresses, and virtual-network computing passwords for a SCADA system managing a hydroelectric generator.
In addition to improving password security and limiting connections, operators should install intrusion-monitoring systems to alert them if attackers are in the process-control networks. The problem is only compounded, when ICS are often older systems not restorable from backup. It also may be difficult to obtain a clean version of system software and configuration settings. Access to the system itself may be difficult, and there may be a shortage of trained personnel for the restoration. Protection at the endpoint, network, cloud, and application layer are relevant to good IoT security"
What can the George T. Hall Company do for your Cybersecurity? GTH is proficient in the new ISA99 security standards that regulate the hardware and software systems and associated internal, human, network and/or machine interfaces across all types of plants, facilities, and systems. The ISA99 Committee is responsible for establishing standards, recommended practices, technical reports, and related information that will define procedures for implementing electronically secure manufacturing and control systems and security practices and assessing electronic security performance. Learn more on our March Solution Spotlight!