Top 5 cyber threats on Industrial control systems

M Talha S.
4 min readFeb 11, 2021

Industrial control systems (ICS) are isolated systems which are using proprietary control protocols for hardware and software. Low-cost Ethernet and internet protocol devices are replacing the older proprietary protocols/technologies which cause a lot of security risks. Nowadays ICS are designed as same as IT system using industry-standard computers, operating systems (OS), and network protocols. The new integration provides great IT capabilities but it also creates a greater need to secure systems.

The modern ICS now exhibit increasing connectivity to the corporate (IT) networks to make use of the rich resource in IT networks. The increased interaction between ICS and IT networks has made them an attractive target for a variety of cyber-attacks. IT system security tends to focus on data protection and to follow the objective of the CIA model: Data confidentiality, Integrity, and Availability. However, for Operation technology (OT) system Availability is the main focus to keep things up and running.

The rise of attacks on ICS has been increased in recent years. In ICS, skilled attackers can manipulate sensor readings or control signals until the system crashes, while keeping the attack process hidden. The main challenge is linked to the fact that these systems typically control physical process that related to Power, Water, Gas, Oil, transport and other critical infrastructure. Let discuss the top 5 major cyber threats to the industrial control system. Following are the top 5 cyber threats to the ICS.

1. Human Error

Employees of an organization can cause unintentional human errors. The main reason for this issue can be unawareness of security importance to the employees. Not taking the security of industry seriously can put organizations at great risk. Educating employees with security awareness can help mitigate this threat but still, it is very common in most industries.

2. Weak Security

Weak security cannot stop any cyber threat. Deploying strong security with recommended precaution can ensure to stop malware or attacker from getting into your PC. From physical security, access control to network security all components of security should be strong and highly alert in case any intruder trying to get into the organization's network. Different cybersecurity vendor's tools should also be used to find and fight against zero-day attacks. Proper vulnerability scan, updated patches, and network scan should be done to ensure any security leaks.

3. Targeted attacks

Hackers can target ICS to exploit the OT network and gain full control access of SCADA and DCS and change the code logic in the programming logic controller (PLC). This can be very devastating. The targeted attack can also be a paid attack or government-funded or for the personal reasons of hackers. Mainly focused to stop the process and disrupt the business operations.

4. Insider threats

Insider threats are not much different than targeted attacks. In this attack, a resource within the organization does some malicious action to harm and disturb the organization's business process. The resource can be organization employees, any service providers, or contractors. Stuxnet can be one of the examples to understand insider attack, in which a resource from Iran nuclear plugged the infected USB into the system. Insider attacks also false the air-gap myth.

5. Malwares

Securing the ICS network from any kind of Malware is very important. The increase in connectivity between ICS and corporate IT network also opens the door for malware and viruses to get into SCADA and DCS systems and can harm them. Malware like ransomware can encrypt the confidential data of organizations. Human error can also be the main reason to get malware into an organizational network.

Conclusion

Industrial control system security is different from corporate IT security. Using the same security solution for both IT and ICS will not secure your organization from cyber-attacks. Special precautions should be taken to ensure security for your industrial network. Increase security using different automated and manual tools. Scan network for any vulnerability. Educate employees with security importance. Not allowing 3rd party to get unauthorized access to your system. Proper network traffic monitoring is needed to secure the Industrial control system network.

--

--

M Talha S.

Information security professional with diverse experience in cybersecurity and penetration testing.