Panel Builder System Integrator

 

KymeraSeptember 24, 2018

With an IIoT network that covers the entire enterprise and has dozens of machines connected to a centralized system, you can see why it’s so tempting for cybercriminals to attempt access on your network. On the other hand, it also shows where your weaknesses are and what you can do to protect it.

During recent years, healthcare, financial service, and retail industries were more “interesting” to cyber attackers than the manufacturing industry. As business disruption and intellectual property theft emerge, more and more manufacturers are becoming victims of cybercrime.

What is Behind the Attacks?

The 2018 Verizon Data Breach Investigations Report shows us that state-sponsored attackers caused more than half of the data breaches in manufacturing, and leading motive was cyberespionage. Due to the fast convergence of OT and IT networks in these manufacturing companies, they exhibit a higher rate of cyberattack activity.

The massive loads of data were collected from January to June 2018, from millions of workloads and devices from the data center, customer cloud, and enterprise environments. They show three findings that are of most interest to cyber attackers. They are the way data is stolen from manufacturing networks, the volume of internal movement between systems, and the frequency of external remote access.

Data Exfiltration

With multiple sensors that aggregate data at the IIoT network’s gateway and send it to a cloud database, an IIoT network architecture doesn’t typically indicate a cyber attack. This data exfiltration behavior is sometimes related to other threat behaviors that can point to an assault in progress. Organizations must ensure that systems are sending data to the approved and intended external systems instead to the attackers who want to steal critical assets.

Internal Movement between Systems

There are many gateways (connected to each other for a better peer-to-peer communication) in a manufacturing network that communicate with smart machines and devices. To map out a manufacturing network and find critical assets to steal, cyber attackers use the same self-discovery used by those peer-to-peer devices. Cyber attackers can thus move laterally across the entire system until they find a way to complete their mission. That type of cyber attacker behavior is known as internal reconnaissance and lateral movement. If a higher-than-normal rate of lateral movement or malicious internal reconnaissance behavior is detected, it’s an indicator of possible attacks on the network.

External Remote Access

When an internal host device connects to an external server, it is known as external remote access. One of the most common command-and-control behaviors in manufacturing is the use of external access tools. This process is also a gateway for attackers to infiltrate a network by hijacking an external remote access connection.

What Can You Do About It?

Manufacturers used to rely on exclusive and customized protocols that made it harder for attackers to mount an attack. However, after the conversion from proprietary to standard protocols, it has made it easier for them to steal, spread, and spy. Today’s factories have Internet-enabled production lines that support remote management and data telemetry. It connects their IIoT machines to networks that rely on communication with enterprise applications and computing devices.

Systems critical for supply-chain processes and thin production lines need to have the best security access controls that can isolate a manufacturing system (however, most manufacturers don’t invest in them for economic reasons.) Real-time monitoring and network visibility are vital for identifying the earliest signs of cyber attacks in any infrastructure of this kind. Also, security analysis should be performed frequently.

Cybersecurity is today’s number one problem for organizations that rely on IoT. To enhance existing cybersecurity teams, we need to use artificial intelligence solutions to detect and respond to cyber threats faster and help stay ahead of cybercriminals.

For more information https://kymerasystems.com/

 

 

Changing Scene

  • Prev
Rockwell Automation announced that it has signed an agreement to acquire privately held Avnet Data ...
January is traditionally a month for new hope and new energy to meet life and business goals. But ...
Moxa Inc. recently introduced its Industrial Network Defense Solution, which is specially designed ...
FANUC has introduced the new CRX-10iA and CRX-10iA/L (long arm version) collaborative robots that ...
Beckhoff Automation has introduced new TwinCAT Cloud Engineering software for IoT and Industrie 4.0 ...
Brave is pleased to announce that they have been officially recognized as an ABB Authorized ...
CW Mechanical Limited (CW) is a Sudbury-based mechanical services company providing valve repair ...
B&R, a unit of ABB’s Robotics and Discrete Automation business, announced the integration of ...

One of Canada’s largest wastewater treatment plants at Annacis Island provides secondary treatment to approximately 175 billion litres of wastewater every year for over 1 million residents in 14 municipalities. After almost 20 years in operation, the variable frequency drives supporting the critical pumping systems for the primary treatment and secondary treatment facilities had to be replaced to ensure that the plant’s high operational availability and reliability will not be compromised in serving the plant, the surrounding municipalities and the environment. Metro Vancouver Regional District chose to deploy Rittal’s enclosure and power distribution solutions with E-plan software to efficiently support vital infrastructure improvements by reducing equipment replacement times and thereby minimizing risk to plant operations.

Working Together for Cybersecurity – Digging Deeper with Mike Hutchings, Vice President, Rockwell Automation Canada

CybersecurityBy Owen Hurst

The rise of connectivity and connected devices has been a major focus and the driving factor behind advancing automation and control products and solutions. And while connectivity is a shining star in terms of creating efficiencies and growth, we are all aware of the darker side of connecting devices, namely the threat posed by nefarious individuals.

 

 

 

 

Read More

When is a Cobot Right for You?

CobotBy Blake Marchand

Robots – or more specifically cobots, may or may not be coming foryour job. But they may very well make it easier.

Robotic systems are most commonly utilized in self contained fencedRobotic systems are most commonly utilized in self contained fencedoff configurations with significant safety measures to keep workerssafe, although in recent years cobots have begun increasing marketshare.

Automated robotic systems generally take up significant floor space,are designed for a specific application or product, and requirecomplex programming to integrate into production.

Read More

Product News

  • Prev
With Sinamics Startdrive commissioning software, Siemens supports machine builders in the ...
Not every production line has a clean 1:1 ratio of products to barcodes. In fact, many finished ...
POSITAL has extended its TILTIX family of inclinometers (tilt sensors) to include explosion-proof ...
 AutomationDirect ProSense digital panel meters in 1/32 and 1/8 DIN sizes are AC or DC powered ...
Parker Hannifin has launched its robust Universal Push-to-Connect (UPTC) connector system. Designed ...
Pepperl+Fuchs now introduces a new version of its tried-and-tested OIT high temperature ...
The B&R drive technology portfolio now offers a Blackout mode that ensures safe machine control ...
Professionals searching for a reliable voltage detection solution have two new Greenlee options — ...
Kerrwil Publications Great Place to Work. Certified December 2019 - December 2020

538 Elizabeth Street, Midland,Ontario, Canada L4R2A3 +1 705 527 7666
©2020 All rights reserved

Use of this Site constitutes acceptance of our Privacy Policy (effective 1.1.2016)
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Kerrwil