Security flaws put wind farms and factory robots at risk of ransomware

A single day of downtime could cost $700,000 researcher claims at Black Hat

Wind farms and factories that use robots are at risk from ransomware attacks, according to new research into the vulnerabilities found within many industrial control systems.

Security researcher Jason Staggs discovered that controllers are not encrypting all of their messages, reports the Financial Times, and often use default passwords or fail to separate networks. Researchers have warned that these major security flaws could force organisations to choose between damaging operational downtime or paying hackers a ransom in order to resume business. 

Advertisement - Article continues below

Staggs told an audience at Black Hat conference in Las Vegas: "What if we wanted to ransomware a wind farm? I'm not talking encrypting data, I'm talking about paralysing wind farm operations in such a way they are no longer able to produce electricity."

Staggs estimated that shutting down a wind farm for a single day would cost the energy provider up to $700,000, and the attacker could cause further damage if the victim does not comply.

David Emm, principal researcher at Kaspersky Labs, commented "It's clear that the world isn't ready for cyber-attacks against critical infrastructure this includes governments, law enforcement agencies, those who run such facilities and those who design and build them.

"Attackers, on the other hand, are clearly ready and able to launch attacks on these facilities. We've seen attacks on power grids, oil refineries, steel plants, financial infrastructure, seaports and hospitals."

Advertisement
Advertisement - Article continues below

The devastating impact of these kinds of ransomware attacks has been illustrated by a number of recent cases, including the widespread Wannacry outbreak that hit the NHS last month. 

Advertisement - Article continues below

In that case, the under-funding of the NHS was partly blamed for the breach, with experts calling for more "trained, registered and accountable" security professionals to be recruited in future. Without them, the attack was dubbed inevitable. 

"It's not sufficient to simply protect endpoints and networks, not least because no two facilities are the same," Emm continued. "Security must be tailored to the specific needs of each organisations and be seen as an ongoing process."

Main image credit: Bigstock

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/security/29204/how-can-you-protect-your-business-from-crypto-ransomware
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019
Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/security/vulnerability/356295/microsoft-patches-high-risk-flaws-that-can-be-exploited-with-a
vulnerability

Microsoft releases urgent patch for high-risk Windows 10 flaws

1 Jul 2020
Visit/security/34616/the-top-password-cracking-techniques-used-by-hackers
Security

The top 12 password-cracking techniques used by hackers

12 Jun 2020