Main menu

Pages

Industrial Cybersecurity: A Primer

featured image

Malware is software code designed to be malicious. Malware gives cybercriminals the chance to manipulate or steal personal information, and it’s even more dangerous for businesses, infrastructure, and public and private organizations. For example, threats designed to target industrial control systems have increased year over year, from 30% to 32%. At the same time, according to our 2022 USB Threat Report, malware has become more effective at disrupting industrial control systems, up from 79% to 81%.

In operational technology environments, malware can be introduced through just a few vectors: the network, access by authorized users; and the hardware and software supply chain. And as malware continues to evolve, it becomes harder to strictly classify.

All the following are distinct types of malware, though any type could embody traits from all four:

  • Ransomware: Ransomware attacks render systems, data and devices unusable or threaten to release sensitive information until victims pay the attackers. Even when the ransom is paid, there is no guarantee that attackers will hold up their end of the bargain. Further, the victim can no longer trust in the integrity of their devices and files.

  • Spyware: Spyware is malware that collects sensitive information from a device and covertly sends it to a third party.

  • Worms: A worm is standalone malware that self-replicates after it breaches a system, spreading to and infecting other computers.

Remote Access Trojan (RAT): A Trojan is any malware designed to trick a user into using it, typically by masquerading as legitimate software. “Remote access” refers to the goal of this type of Trojan, which is to provide the attacker with discreet access to command, control and monitor a device from a remote location.

payload

The payload is the actual content or message of a digital communication. When it comes to malware, this content is malicious software. Newer and more sophisticated malware is typically modular, allowing specific payloads to be used to execute specific tasks in a larger campaign of cyberattacks.

attack vector

The attack vector is the path by which attackers infect systems with malware. One prevalent attack vector is USB devices, which account for 52% of threats to industrial control systems, according to the 2022 USB Threat Report.

Backdoor

A backdoor is a result of a successful malware attack, providing unauthorized access to files, systems or networks. Backdoors in infected networks typically provide access remotely, through Remote Access Trojans or Remote Access Toolkits.

Global Analysis Research and Defense (GARD)

Global Analysis Research and Defense is a threat-detection service that provides advanced threat detection and response capabilities to supported Honeywell cybersecurity products.

Mean Time to Remediation (MTTR)

The Mean Time to Remediation is the amount of time an organization needs to react to and recover from a cyberthreat or incident. This can extend beyond computer system recovery into full functionality in OT.

Secure Media Exchange (SMX)

Secure Media Exchange is Honeywell’s USB security threat platform, which monitors USB devices’ usage in industrial facilities to lower the risk of USB-borne threats.

As cybersecurity threats against operational technology and information technology rise, it becomes increasingly critical for businesses and organizations of all sizes to protect, address and remediate them as quickly as possible.

Learn more about how Honeywell Forge can help you protect your organization from cyber threats. For more on USB-derived cyber attacks, listen to our podcast. In this recent episode, our operational technology cybersecurity expert goes in-depth on how to fortify cyberdefenses for your enterprise.

.

Commentaires