sb-nz logo
Story image

65% of manufacturers run outdated operating systems – Trend Micro

15 Apr 2019

Cybersecurity solutions provider Trend Micro has announced new research that demonstrates the threats facing manufacturing networks still running outdated technology, including risks to intellectual property and production processes.

The report, Securing Smart Factories: Threats to Manufacturing Environments in the Era of Industry 4.0, outlines the security dimension of a new era for manufacturing driven by IoT and connectivity everywhere.

Manufacturers are heavily investing in the convergence of traditional operational technology (OT) with IT networks in 2019, adding new technology to environments that are still vulnerable to more than 10-year-old issues, like Conficker.

“Industry 4.0 offers unparalleled opportunities to increase productivity, enhance process efficiencies, and realise on-demand manufacturing, but it also dramatically alters the threat risk model for these facilities,” says Trend Micro network defense and hybrid cloud security executive vice president Steve Quane.

“As this research outlines, the convergence of IT and OT could unwittingly have a serious impact on production lines, and could lead to the loss of IP and competitive advantage.”  

The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.

Previously isolated operations networks are being connected to the IT network to drive efficiencies, but this exposes insecure proprietary protocols and potentially decades-old OT equipment that is often not patched frequently enough because of its criticality.

There is a harsh disparity between the significant operations performed by these devices and the fact that they operate for years with known vulnerabilities.

According to Gartner, OT networks and assets, and their security implications were undiscovered and unmanaged for many years.

As a result, current OT networks are unsegmented with a mix of production protocols, unidentified assets, legacy systems and devices.

These industrial components have many unsecured communication channels to corporate/ IT networks, and they utilise different vendor architectures and security standards.

In addition to maintaining legacy infrastructure with known weaknesses, new vulnerabilities are being discovered more frequently than ever before in these systems.

Zero-day vulnerabilities purchased in human-machine interfaces (HMIs) of industrial control systems increased by more than 200 percent in 2018 compared to the previous year.

Manufacturers are thus exposed to both targeted and commodity malware, including cryptocurrency mining attacks that could harm key production processes by consuming processing power and causing network latency.

Ransomware is also a major threat to manufacturers if the attack affects production.

To help mitigate the impact of Industry 4.0 threats, Trend Micro recommends manufacturers remember the basics of cybersecurity, such as restricting user access and disabling directory listings, as well as identifying and prioritising key assets to protect.

Story image
Cyber attacks use LinkedIn to target companies and employees
The attacks, which ESET researchers have called Operation In(ter)ception, took place from September to December 2019 and are notable for using LinkedIn-based spearphishing. More
Story image
Illumio launches Zero Trust endpoint protection solution for our digital, remote world
“As organisations were forced to transform overnight to allow for remote work, a host of endpoint security issues that have either been ignored or invisible until now were brought to the forefront."More
Story image
Oracle combines cloud automation with comms security in new solution
The Oracle Communications Security Shield (OCSS) Cloud is built on the company’s cloud infrastructure, and uses AI and real-time enforcement to combat the heightened risk of infrastructure attacks presented to contact centres and enterprises.More
Download image
Think your emails are safe from cybercriminals? Think again
In the coming year, only 60% of organisations believe an attack will come from an email - but the reality is much different.More
Story image
Kiwis and Aussies among most concerned globally about data privacy
New research from Genesys finds the two neighbours value their data privacy more than other regions - but, as always, there are key differences of opinions too.More
Story image
54% rise in gaming-related cyber attacks recorded in April
Social isolation measures, widely implemented throughout the world during March and April, has been linked to both the increase in engagement for gaming and a corresponding boom in game-related cyber attacks.More