Skip to main content

Cyberattacks on industrial control systems: Understanding and mitigating cyber risks for manufacturing businesses

21 August 2023

Many manufacturers use industrial control systems (ICS) as crucial digital tools. Known as automation systems, these tools are used to enhance production output.

These systems ensure consistent manufacturing, resulting in improved product quality. They can help reduce costs by:

  • reducing energy consumption; 
  • limiting manufacturing carbon footprints; 
  • and minimizing labour needs.1

Yet these systems pose a big cyberattack risk. Due to their automated nature, they lack the need for constant human intervention. While this makes the system highly efficient, it opens the door for potential harm.

Skilled hackers can breach ICS systems. This poses threats to human safety and causes significant disruption to society. In the event of a hacker issuing a command, the physical processes they control can be compromised. This can lead to disruption and even physical injuries.

Companies that are dependent on these systems face threats of both data theft and financial setbacks.

The best way to protect your business against these risks is to understand what you’re up against.

Do cyberattacks on ICS really happen?

Simply put, yes. As advanced algorithms and device communication enhance these systems, the increased network interconnectivity means greater cybersecurity risks.

Over the last decade, instances of cyberattacks targeting ICS systems have surged.2 This has been accompanied by a notable rise in ransomware attacks.3

In 2022, more than 40% of operational technology (OT) computers were targeted in malicious cyber activity. This is according to data findings from Kaspersky.4

Examples of cyberattacks

Hackers can have a horrific impact when manipulating ICS systems. The following unfortunate businesses experienced serious disruption because of cyberattacks:

  • Predatory Sparrow, a hacking group, took recognition for an attack that resulted in a severe fire at an Iranian steel manufacturer. The incident caused equipment damage and forced factory workers to evacuate. A compromised machine even released molten steel and fire.5
  • The US government and security firms divulged information about a malware strain known as Pipedrea. This strain is also referred to as Incontroller. This malware targets ICS systems. It possesses the capability to manipulate and disrupt these vital systems.6

Potential areas of risk

A recent Censuswide survey revealed important findings. Many respondents from the manufacturing and engineering sector stated that they assessed their cybersecurity controls in 2022. This indicates a growing focus on cybersecurity within these industries.

Interestingly, nearly a third of businesses in this sector (31%) expressed intentions to review their cybersecurity controls in the coming year to address concerns. This suggests a heightened awareness of the risks associated with neglecting cybersecurity reviews. Especially compared to other businesses.7

Potential cyber risks for the manufacturing industry include the following:

1. Exploiting vulnerable technology

  • Using insecure passwords.
  • Employing weak firewalls. This can allow cybercriminals to infiltrate ICS networks and breach corporate systems. This includes financial, procurement, and maintenance systems.
  • Integrating outdated or standalone control systems into the wider network. Exposing them due to a lack of security protocols.
  • Linking the ICS system and the Internet of Things (IoT) devices to the broader internet. This can reveal potential vulnerabilities.

2. Social engineering

  • Users can be deceived into downloading infected files onto a computer linked to the ICS system. This can be either via a link or a malicious email attachment. As a result this can spread to other systems.

3. Communication

  • Connecting IoT devices to networks without proper authentication.
  • Using non-encrypted communication.

4. System updates

  • Implementing irregular software updates and patch management. This requires a balance between cybersecurity and operational needs.

How to avert a manufacturing cyberattack 

  • Evaluate security measures and consider upgrading to more robust system versions.
  • Regularly refresh and enforce strong passwords.
  • Install multi-factor authentication (MFA) for network access. Additionally minimise the number of privileged accounts.
  • Delineate the connectivity of ICS networks with non-ICS networks and domains. Such as corporate systems and the internet.
  • Prioritise cybersecurity assessments during ICS system implementation. Ensuring thorough testing of security controls and incorporating network monitoring.
  • Examine cyber risk profiles of critical suppliers and identify key customers. Establishing contingency plans to mitigate reputation damage after a cyberattack.
  • Equip your personnel with cybersecurity training and put together annual incident response strategies.

 

Sources

1. conquer-your-risk.com/cyberattacks-ics-scada 
2. infosecurity-magazine.com/why-industrial-attacks-increasing 
3. techtarget.com/Dragos-Ransomware-topped-ICS-and-OT-threats 
4. kaspersky.com/2023_industrial-sector-attacks-on-the-rise-an-annual-overview-by-kaspersky 
5. bbc.co.uk/news/technology-62072480 
6. securityweek.com/2022-ics-attacks-fewer-than-expected-on-us-energy-sector-but-ransomware-surged 
7. charts.censuswide.com/CW11408MP/CW11408MP_VIbox.html

 

Other Sources

securityledger.com/cyberattacks-on-industrial-control-systems-jumped-in-2022

Not sure what to do next?

Many of our clients didn’t know where to start either. We work with our insurer partners to arrange a cyber insurance policy that is truly right for you. Simply call us or get in touch and we’ll call you.

Get in touch

Got a burning question?

Let us know what you'd like to learn more about, your question may help others too! An adviser will be in touch to answer your question shortly.