Unsecured industrial environments have been the target of malicious attackers, according to results of Trend Micro Inc.’s (Trend Micro) six-month investigation. The cybersecurity solutions company mimicked a honeypot for an industrial factory that attracted fraud and financially motivated exploits.
In its media release, Trend Micro said the “highly sophisticated” Operational Technology (OT) honeypot “was compromised for cryptocurrency mining, targeted by two separate ransomware attacks, and used for consumer fraud.”
“Too often, discussion of cyber threats to industrial control systems (ICS) has been confined to highly sophisticated, nation-state level attacks designed to sabotage key processes,” said Greg Young, vice president of cybersecurity for Trend Micro. “While these do present a risk to Industry 4.0, our research proves that more commonplace threats are more likely. Owners of smaller factories and industrial plants should therefore not assume that criminals will leave them alone.”
Have you read “Trend Micro: Cybercriminals talk IoT attacks in underworld”?
“A lack of basic protections can open the door to relatively straightforward ransomware or cryptojacking attack that could have serious consequences for the bottom line.”
– Greg Young, vice president of cybersecurity for Trend Micro
To better understand the attacks targeting ICS environments, Trend Micro Research created a highly realistic, industrial prototyping company. The honeypot consisted of real ICS hardware and a mix of physical hosts and virtual machines to run the factory, which included several programmable logic controllers (PLCs), human-machine interfaces (HMIs), separate robotic and engineering workstations and a file server.
Trend Micro urges smart factory owners to minimize the number of ports they leave open and to tighten access control policies, among other cybersecurity best practices. In addition, implementing cybersecurity solutions designed for factories, like those offered by Trend Micro, can help further mitigate the risk of attack.