The Threat of IIoT Cyber Attacks

December 17, 2018

By: Will Mapp

In the case of many industrial settings, the IIoT is considered the answer for numerous challenges. The connectivity that’s the result of it assists in efficiency, productivity, and profitability. When it comes to utilities, IIoT helps manage the demand, and for public infrastructure, it can help governments in delivering better services, which include public safety as well.

However, according to SonicWall’s 2018 Cyber Threat Report, the IIoT is increasingly becoming the target of cyber attacks, which is a big problem as the IIoT is often unsecured and ignored.

Only in 2017, worldwide, there were around 9.3 billion malware attacks, and more than 12,000 new vulnerabilities and exposures. The report states that most executives see cyber attacks as the number one operations, financial, and business risk. They are such a big problem that some consider them a more significant threat than natural disasters. Several other reports also state a similar thing.

In recent years, many conditions and trends have made it so that cybersecurity events that target the OT side of IIoT increase dramatically.  

Industrial Control System (ICS) cyber-attacks increase from 2007 to 2017

These attacks have been happening since the late 1990s. However, they had only become mainstream in 2010. That was when the Stuxnet malware targeting SCADA system in Iranian uranium enrichment plant was discovered.

Stuxnet changed everything. Afterward, interest in the security for control systems significantly increased, because, at the time, security features were not part of the standard industrial control system equipment.

Furthermore, several new threats were exposed, and several attacks occurred over the years:

  • In 2013, Havex/Backdoor.Oldrea remote access Trojan that targets ICSs discovered.
  • In 2014, a SCADA-targeting version of BlackEnergy discovered. Its use is against ICS.
  • In 2014, hackers took control of ICS in a German steel mill and caused massive physical damage.
  • In 2016, Russian hackers cause blackouts in Ukraine by hacking the energy grid with the Industroyer/CrashOverride malware.
  • In 2017, the WannaCry worldwide ransomware attacks targeted vulnerabilities in Windows-operating computers. NotPetya attacks followed those. Because of these two major ransomware attacks, the DHS issued more warnings to manufacturers and infrastructure owners about ICS vulnerabilities. In the end, the DHS and FBI issued a joint alert which stated that several attacks began targeting the ICS of the US.
  • In December 2017, the first malware designed to attack ICS revealed – the TRITON/TRISIS malware framework.

If all of these weren’t enough, as 2018 started, cyber events also began to escalate:

  • Many vulnerabilities in the Meltdown and Spectre microprocessors were discovered.
  • USA has identified Russia as the source of many attacks on US infrastructure and manufacturing.
  • A revised version of TRITON/TRISIS started attacking more brands and security hardware and managed to breach several US firms.
  • Further vulnerabilities were detected in several types of industrial hardware and software.

These attacks and other cyber events don’t seem to show any signs of stopping, which is why it’s becoming more and more important to focus on cybersecurity and getting better systems that will help stave off these attacks.

Related Articles



Editor’s Pick: Featured Article

Weidmüller’s u-control 2000: The Automation Controller

Weidmüller’s u-control 2000: The Automation Controller

Weidmüller’s scalable engineering software, u-control 2000, adapts individually to your requirements. And, the u-control is powerful, compact and fully compatible with Weidmüller’s I/O system u-remote. This article looks at what makes u-control the heart of your automation.

Programmable logic controllers (PLCs) are one of the main components of any automated system. A typical control system has inputs, outputs, controllers (i.e., PLCs), and some type of human interaction with the system, a human machine interface (HMI), for example.

Read More



Latest Articles

  • The Drive Towards Energy-Efficient Data Centres

    April 17, 2024 By Shahrukh Ashhar Data centres are the backbone of our digital world. They serve as the foundation for various online activities like streaming, e-commerce, and website/app usage. In today’s tech-driven world, our attention is actively captured by our online activities, all of which heavily depend on data centres. The demand for storage… Read More…

  • ABB’s Expansion Joint System Helps Expand Sustainable Transportation Possibilities

    How two feet is helping connect Canada’s new automated light rail transit network April 17, 2024 Engineering ingenuity for robust infrastructure ABB is proud to have designed and produced the expansion joint system used on the Champlain Bridge section of the REM, Montreal. Canada is considered to have one of the best developed infrastructures in… Read More…