View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

Basic attacks fluster industrial control systems in US

Vital industry breached by spear phishing, network scanning and SQL injection.

By Jimmy Nicholls

Industrial control systems (ICS) in the US were breached every two out of three days in the last fiscal year, according to a report from the ICS Cyber Emergency Response Team (ICS-CERT).

245 incidents involving control systems were reported to the group between October 2013 and last September, of which a third aimed were aimed at the energy sector and a quarter at critical manufacturing.

Subsequent investigation by ISC-CERT also found that many of the initial points of intrusion could be attributed to basic methods like spear phishing, network scanning or SQL injection, in which hackers insert commands through a vulnerable database.

However almost two-fifths of incidents had an unknown intrusion point, often because of "a lack of detection and monitoring capabilities".

The security group, which is backed by the Department of Homeland Security (DHS), warned that the figures likely underestimate the scale of the cyber threat against industry, because "many more incidents" go unreported.

"ICS-CERT continues to encourage asset owners to report malicious activity impacting their environment even if assistance is not needed or requested," it said in the research.

"As you report, ICS-CERT can provide situational awareness information about similar or related incidents and share data regarding the threat actor’s techniques and tactics."

Content from our partners
Powering AI’s potential: turning promise into reality
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline

In addition to the breach data, the group also reported that it had received 159 reports of vulnerabilities in control system components, the most notable of which was the Heartbleed bug affecting the OpenSSL security layer.

The most common flaws in control systems involved authentication, buffer overflow in which data is overwritten to adjacent data cells, and denial-of-service attacks.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU