Featured Product
This Week in Quality Digest Live
Management Features
Jim Benson
Don’t just set and forget KPIs or other metrics. Understand the true narrative of the work you do.
John Baldoni
John Baldoni interviews Garry Ridge about clarity and hope amid crisis
Vincent Dominé
Workplace teams need an embedded knack for learning and adapting
Nate Burke
Best practice is all about optimizing content for logical human behavior and user experience
Henrich Greve
The more diverse your goals, the greater the temptation to muddy the waters on your performance

More Features

Management News
Includes global overview and new additive manufacturing section
Tech aggravation can lead to issues with employee engagement, customer experience, and business results
Harnessing the forces that drive your organizations success
Free education source for global medical device community
New standard for safe generator use created by the industry’s own PGMA with the assistance of industry experts
Provides synchronization, compliance, traceability, and transparency within processes
Galileo’s Telescope describes how to measure success at the top of the organization, translate down to every level of supervision
Too often process enhancements occur in silos where there is little positive impact on the big picture
Latest installment of North American Manufacturing Covid-19 Survey Series shows 38% of surveyed companies are hiring

More News

Denrie Caila Perez

Management

How Smart Manufacturing Is Vulnerable to Attacks

A report from Trend Micro demonstrates how proprietary systems can be exploited

Published: Thursday, June 25, 2020 - 12:03

A new report from Trend Micro Research illustrates how advanced hackers are using unconventional attack vectors against smart manufacturing environments. Smart manufacturing technology generally operates through proprietary systems, which use their own proprietary language. However, these systems also still run on the computing power of traditional IT systems. While typically designed to function independently from other systems, it’s this particular loophole that leaves these systems vulnerable to IT threats.

“Past manufacturing cyberattacks have used traditional malware that can be stopped by regular network and endpoint protection,” says Bill Malik of Trend Micro. “However, advanced attackers are likely to develop operational technology-specific attacks designed to fly under the radar. As our research shows, there are multiple vectors now exposed to such threats, which could result in major financial and reputational damage for Industry 4.0 businesses. The answer is IIoT-specific security designed to root out sophisticated, targeted threats.”

Working in partnership with Politecnico di Milano, Trend Micro used real-time equipment from its Industry 4.0 Lab to demonstrate how malicious threats can potentially exploit these systems in an industrial IoT (IIoT) environment. According to the report, the system languages can be easily “abused to input malicious code, traverse through the network, or steal confidential information without being detected.” Due to its isolated nature, integrity checks are limited—subsequently making the system unprotected against certain risks and malicious activity.

Manufacturing execution systems, human machine interfaces, and customizable IIoT devices were identified as the most vulnerable to these kinds of attacks.

To combat these threats, the report recommends a number of defense and mitigation measures, such as:
• Deep packet inspection that supports operational technology protocols to identify anomalous payloads at the network level
• Integrity checks run regularly on endpoints to identify any altered software components
• Code signing on IIoT devices to include dependencies such as third-party libraries
• Risk analysis that extends beyond physical safety to automation software
• Full chain of trust for data and software in smart manufacturing environments
• Detection tools to recognize vulnerable/malicious logic for complex manufacturing machines
• Sandboxing and privilege separation for software used on industrial machines

Trend Micro stresses that failing to address these potential weak links could result in damaged goods or malfunctions, as well as disrupt workflows, resulting in the manufacture of defective products.

First published on the engineering.com blog.

Discuss

About The Author

Denrie Caila Perez’s picture

Denrie Caila Perez

As an accomplished contributing writer for engineering.com, Denrie Caila Perez covers news and stories on additive manufacturing, aerospace, IoT, artificial intelligence, and environmental breakthroughs.