NewsSecurity

Majority Of Industrial Organizations Open To Cyber-Attacks: Report

0

An external attacker can penetrate the corporate network at 91% of industrial organizations, according to Positive Technologiesnew research that examines information security risks present in industrial companies, the second-most targeted sector by cybercriminals in 2020.

Positive Technologies penetration testers gained access to the industrial control system (ICS) networks at 75% of these companies. Attack vectors for accessing critical systems can be simple, and the potential damage severe. Once criminals have obtained access to ICS components, they can shutdown entire productions, cause equipment to fail, trigger chemical spills and even industrial accidents that could cause series harm to industrial employees or even death.

The report notes that, once inside the internal network, attackers can steal user credentials and obtain full control over the infrastructure in 100% of cases, and at 69% of companies, they can steal sensitive data, including information about partners and company employees, email correspondence, and internal documentation.

But most importantly, at 75% of industrial companies Positive Technologies specialists managed to gain access to the technological segment of the network, which allowed them to then access actual industrial control systems in 56% of cases.

This shows that by gaining access to the ICS network, attackers can also access industrial process automation systems, which could lead to serious consequences: From disruption of work to human casualties.

Industrial companies attract criminals because of their size, the importance of business processes, and their impact on the world and people’s lives. According to the report, the main threats for industrial companies are espionage and financial losses. The main objective of information security specialists today is to assess the feasibility of various security risks in companies and identify possible consequences of cyberattacks, then build an efficient security system based on this knowledge. The problem is that management will never agree to any action taken within the infrastructure that could negatively affect technological processes; and rightly so.