Industrial Control Systems (ICS) Under Attack

Industrial Control Systems (ICS) Under Attack

Did you read Booz Allen Hamilton’s newest Industrial Cybersecurity Threat Briefing [PDF] yet? If you are an IT security leader, you should. It’s the most thorough and comprehensive report on the state of ICS cybersecurity I’ve seen. 

It made me realize how real these threats are, and how ill-prepared we are to deal with them.

Remember the “Stuxnet” attack that sent the centrifuges in Iran’s Uranium enrichment plant into a self-destructive spin? In that attack, a USB stick was used to cross the security “air gap” of an unconnected computer, and drop malicious software on the (Windows-based) Siemens control units.

Now, attackers targeting critical infrastructure don’t even need to drop a USB stick in the parking lot. They can simply rely on employees opening a phishing email, or visiting a compromised website. That’s all it takes for a motivated outsider to wreak havoc, steal data or lock down critical ICS processes with ransomware.

On the rise: web-borne attacks against ICS sytems in utilities, transportation and manufacturing

Fear-mongering? I would have thought so too.  But then I read this new threat briefing, which draws on publicly available sources and Department of Homeland Security data. Its focus: incidents involving organizations that use and maintain ICS infrastructure.

Based on the findings in this report, I think it's fair to say that utilities and other ICS operators should learn a thing or two from leading financial institutions, federal agencies, law enforcement and other security-sensitive organizations.

What I mean? Read my blog post on the state of ICS and manufacturing cybersecurity here, on the Authentic8 blog.

###

About the author: Scott Petry is Co-Founder and CEO of Authentic8. Prior to Authentic8, Scott was the founder of Postini.

To view or add a comment, sign in

More articles by Scott Petry

  • So Much Leaking.

    In the wake of the devastating WannaCry and NotPetya ransomware campaigns, it was hard to imagine that things could get…

    3 Comments
  • Why the Architecture of the Web Puts Today's World at Risk

    The Internet is based on protocols that assume content is secure. We need a new, more realistic model.

    16 Comments
  • ISPs & Privacy: Why it Matters, and How to Cover Your A$$

    Both the US Senate and the House of Representatives have cleared the way to remove privacy rules for internet service…

  • What They Really Do With Your Medical Data (Book Review)

    Happy Data Privacy Day. A new book provides an in-depth look at the commercial trade in patient medical data.

    1 Comment
  • Face Your Worst Cyber Security Fears

    Survey results: What cyber security issues scare people most? "There is a time to take counsel of your fears," General…

  • Malware Targeting Energy Utilities Avoids AV Products

    …and so should we. At least that’s my take after looking into various reports about a particularly aggressive malware…

    2 Comments
  • Personal Email at Work - the "Hillary Factor"

    Hillary Clinton’s personal email workarounds during her term as Secretary of State have received much scrutiny in…

  • Smart Nation. Dumb Move.

    Singapore is awesome. Since starting Authentic8, I haven’t been back, but I was lucky enough to visit regularly in…

    3 Comments
  • Credential Management: Did We Learn Anything?

    Online credential management as we know it is not secure and doesn’t work. How else would we explain that weak, default…

  • Stop Blaming the Victims of Ransomware Attacks

    Security experts warn that “many people still don’t know what ransomware is.” Would it do consumers any good if they…

    2 Comments

Explore content categories