Kaspersky: About 40% of computers are subjected to an electronic attack

May

15

2017

proportion of computers attacked was more than 24% in December 2016
Google + LinkedIn Facebook Twitter
The UAE Automation Conference and Exhibition 2017 will take place in Abu Dhabi from 16 to 17 May 2017. Kaspersky Lab will discuss the importance of providing security protection for ICS systems .

According to the findings of the Kaspersky Lab report, “The Threat Scenario of Industrial Automation Systems in the Second Half of 2016,” it was found that on average, two to five computers related to the technical infrastructure of industrial enterprises faced cyber attacks in half Second of 2016.

The percentage of computers attacked increased from more than 17% in July 2016 to more than 24% in December 2016. The three most important sources of infection were the Internet, removable storage devices, malicious e-mail attachments and texts Embedded in e-mail messages.

Threat sources
As technology becomes increasingly integrated with industrial enterprise networks, more cybercriminals draw their attention to industrial enterprises as potential targets. By exploiting the security holes in the networks and programs used by these organizations, attackers can steal information about the production process or even stop manufacturing processes, resulting in a self-technical disaster within those networks.

To find out the extent of these threats, the Kaspersky Lab Industrial Systems Emergency Response Team conducted research on the electronic landscape of ICS .

Kaspersky Lab experts found that in the second half of 2016 malware downloads and online phishing attacks were banned in more than 22% of computers, which means that at least one computer out of every five computers could be exposed One-time risk of injury or theft of personal online login data.

Desktop computers for engineers and operators who deal directly with ICS do not have direct access to the Internet due to restrictions on the technology network in which they are located. However, other users have simultaneous access to the Internet and industrial control systems ( ICS) .

According to Kaspersky Lab research, these computers – which are supposed to be used by system administrators, networks, developers, industrial automation engineers, and third party contractors who connect to technology networks directly or remotely – can connect freely to the Internet because they are not connected to only one industrial network With inherent limitations.

The Internet is not the only source that threatens the electronic security of industrial control systems ( ICS) , as researchers at Kaspersky Lab have identified another threat posed by the risk of infected removable storage devices. During the research period, 10.9% of computers using ICS programs or connected to computers using these programs showed traces of malware when they were connected to a removable storage device.

The attachments of malicious e-mail and text contained in e-mail messages were blocked on 8.1% of the computers, and those attachments and texts are the third of the threats and potential threats. In most cases, attackers used e-mail messages for phishing to attract user attention and disguise malicious files sent. Malicious software is most often published in the form of documents using Office and PDF files . Attackers used different techniques to ensure that individuals downloaded and used malware on their computers.

According to Kaspersky Lab research, malware, which poses a major threat to companies around the world, also poses a threat to industrial enterprises. This includes spyware and intrusion programs from “backdoor” or backdoors and keystrokes keystrokes, keyloggers, malware, ransomware and ransomware programs and programs to scan files for wipers. These programs can completely paralyze the enterprise’s control over ICS or can be used for targeted attacks. These attacks can be caused by internal operating characteristics that allow attackers much remote control.

“Our analysis shows that a firm belief in the isolation of technology networks from the Internet is no longer feasible , ” said Yevgeny Goncharov, head of Kaspersky Lab’s vital infrastructure defense division. “The rise in cyber threats to critical infrastructure facilities suggests that ICS must be properly secured to protect against malicious programs inside and outside organizations. It is also important to recognize that, according to our observations, attacks always begin with individuals because they are the weakest link in any protection.”

Other findings from the Kaspersky Lab report, “Threat Scenes for Industrial Automation Systems in the Second Half of 2016,” included that every fourth attack Kaspersky Lab discovered in 2016 targeted industrial targets. About 20,000 different malware samples have been detected in industrial automation systems belonging to more than 2,000 different malware families.

Kaspersky Lab revealed 75 vulnerabilities in 2016, of which 58 were identified as one of the most critical security vulnerabilities. The first three countries with industrial computers that were exposed to cyber attacks were: Vietnam more than 66%, Algeria more than 65%, Morocco 60%.

To protect the environment of industrial control systems from potential cyber attacks, Kaspersky Lab security experts recommend a security assessment to identify and fill security gaps and request external intelligence: access to intelligence from well-known suppliers helps organizations predict future attacks on infrastructure Industrial Company. And training of institutional staff

Experts also recommend protection within and outside the environment: an appropriate security strategy must be available to develop substantial resources to detect and respond to an attack and to repel an attack before reaching critical targets. The application of a default rejection scenario for SCADA systems, regular safety checks of control units, and monitoring through specialized networks to increase the overall security of the company will reduce the chances of success of an attack, even if it fails to correct and remove some weak contract nodes By nature.

Google + LinkedIn Facebook Twitter

Viewing:-121

Tags: , , ,

In: Technology & Gadgets Asked By: [17368 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »