{"id":16612,"date":"2020-05-12T08:00:00","date_gmt":"2020-05-12T07:00:00","guid":{"rendered":"https:\/\/www.engineernewsnetwork.com\/blog\/?p=16612"},"modified":"2020-05-11T15:28:29","modified_gmt":"2020-05-11T14:28:29","slug":"identifying-critical-industry-4-0-attack-methods","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/","title":{"rendered":"Identifying critical Industry 4.0 attack methods"},"content":{"rendered":"\n<p>Smart manufacturing is fast becoming mainstream, offering new levels of efficiency and the potential to add billions to the global economy through productivity gains.\u00a0<\/p>\n\n\n\n<p>Typically, when traditional attacks such as those involving malware hit a smart manufacturing system, they are visible as unexpected or blacklisted patterns in the network or host.&nbsp;<\/p>\n\n\n\n<p>But what would happen if an attacker was able to \u2018blend in\u2019 as legitimate network traffic or expected host activity?<\/p>\n\n\n\n<p>Cybersecurity solutions experts Trend Micro has released research describing how advanced hackers could leverage unconventional, new attack vectors to sabotage smart manufacturing environments.<\/p>\n\n\n\n<p>For this report, Trend Micro Research worked with Politecnico di Milano in its Industry 4.0 lab, which houses real manufacturing equipment from industry leaders, to demonstrate how malicious threat actors can exploit existing features and security flaws in Industrial IoT (IIoT) environments for espionage of financial gain.<\/p>\n\n\n\n<p>\u201cPast manufacturing cyber attacks have used traditional malware that can be stopped by regular network and endpoint protection. However, advanced attackers are likely to develop Operational Technology (OT) specific attacks designed to fly under the radar,\u201d said Bill Malik, vice president of infrastructure strategies for Trend Micro. \u201cAs our research shows, there are multiple vectors now exposed to such threats, which could result in major financial and reputational damage for Industry 4.0 businesses. The answer is IIoT-specific security designed to root out sophisticated, targeted threats.\u201d<\/p>\n\n\n\n<p>\u201cPolitecnico di Milano is fully committed to supporting Industry 4.0 in addressing crucial aspects related to security and reliability of automated and advanced controls, especially as they gain relevance in all production sectors and increasingly impact business,\u201d said Giacomo Tavola, Contract Professor in Design and Management of Production Systems and Stefano Zanero, Associate professor in Advanced Cybersecurity Topics for Politecnico di Milano.<\/p>\n\n\n\n<p>Critical smart manufacturing equipment relies primarily on proprietary systems, however these machines have the computing power of traditional IT systems. They are capable of much more than the purpose for which they are deployed, and attackers are able to exploit this power.&nbsp;<\/p>\n\n\n\n<p>The computers primarily use proprietary languages to communicate, but just like with IT threats, the languages can be used to input malicious code, traverse through the network, or steal confidential information without being detected.<\/p>\n\n\n\n<p>Though smart manufacturing systems are designed and deployed to be isolated, this seclusion is eroding as IT and OT converge.&nbsp;<\/p>\n\n\n\n<p>Due to the intended separation, there is a significant amount of trust built into the systems and therefore very few integrity checks to keep malicious activity out.<\/p>\n\n\n\n<p>The systems and machines that could be taken advantage of include the manufacturing execution system (MES), human machine interfaces (HMIs), and customisable IIoT devices. These are potential weak links in the security chain and could be exploited in such a way to damage produced goods, cause malfunctions, or alter workflows to manufacture defective products.<\/p>\n\n\n\n<p>The report offers a detailed set of defence and mitigation measures, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Deep packet inspection that supports OT protocols to identify anomalous payloads at the network level<\/li><li>Integrity checks run regularly on endpoints to identify any altered software components<\/li><li>Code-signing on IIoT devices to include dependencies such as third-party libraries<\/li><li>Risk analysis to extend beyond physical safety to automation software<\/li><li>Full chain of trust for data and software in smart manufacturing environments<\/li><li>Detection tools to recognize vulnerable\/malicious logic for complex manufacturing machines<\/li><li>Sandboxing and privilege separation for software on industrial machines<\/li><\/ul>\n\n\n\n<p>To find out more and read the full report, click <strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/threat-intelligence-center\/internet-of-things\/threats-and-consequences-a-security-analysis-of-smart-manufacturing-systems\" target=\"_blank\" rel=\"noreferrer noopener\">HERE<\/a><\/strong>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smart manufacturing is fast becoming mainstream, offering new levels of efficiency and the potential to add billions to the global economy through productivity gains.\u00a0 Typically, when traditional attacks such as those involving malware hit a smart manufacturing system, they are visible as unexpected or blacklisted patterns in the network or host.&nbsp; But what would happen &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[199],"tags":[8240,3738,8239],"class_list":["post-16612","post","type-post","status-publish","format-standard","","category-news-views-and-opinion","tag-sabotage","tag-smart-manufacturing","tag-trend-micro"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identifying critical Industry 4.0 attack methods - Engineer News Network<\/title>\n<meta name=\"description\" content=\"Trend Micro has launched its latest research, which provides forward-looking analysis of smart manufacturing systems to show how advanced hackers could leverage unconventional, new attack routes to sabotage smart manufacturing systems\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identifying critical Industry 4.0 attack methods - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"Trend Micro has launched its latest research, which provides forward-looking analysis of smart manufacturing systems to show how advanced hackers could leverage unconventional, new attack routes to sabotage smart manufacturing systems\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-12T07:00:00+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/identifying-critical-industry-4-0-attack-methods\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/identifying-critical-industry-4-0-attack-methods\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"Identifying critical Industry 4.0 attack methods\",\"datePublished\":\"2020-05-12T07:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/identifying-critical-industry-4-0-attack-methods\\\/\"},\"wordCount\":573,\"keywords\":[\"sabotage\",\"smart manufacturing\",\"Trend Micro\"],\"articleSection\":[\"News, Views and Opinion\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/identifying-critical-industry-4-0-attack-methods\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/identifying-critical-industry-4-0-attack-methods\\\/\",\"name\":\"Identifying critical Industry 4.0 attack methods - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"datePublished\":\"2020-05-12T07:00:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"description\":\"Trend Micro has launched its latest research, which provides forward-looking analysis of smart manufacturing systems to show how advanced hackers could leverage unconventional, new attack routes to sabotage smart manufacturing systems\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/identifying-critical-industry-4-0-attack-methods\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/identifying-critical-industry-4-0-attack-methods\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/identifying-critical-industry-4-0-attack-methods\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identifying critical Industry 4.0 attack methods\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identifying critical Industry 4.0 attack methods - Engineer News Network","description":"Trend Micro has launched its latest research, which provides forward-looking analysis of smart manufacturing systems to show how advanced hackers could leverage unconventional, new attack routes to sabotage smart manufacturing systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/","og_locale":"en_GB","og_type":"article","og_title":"Identifying critical Industry 4.0 attack methods - Engineer News Network","og_description":"Trend Micro has launched its latest research, which provides forward-looking analysis of smart manufacturing systems to show how advanced hackers could leverage unconventional, new attack routes to sabotage smart manufacturing systems","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/","og_site_name":"Engineer News Network","article_published_time":"2020-05-12T07:00:00+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"Identifying critical Industry 4.0 attack methods","datePublished":"2020-05-12T07:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/"},"wordCount":573,"keywords":["sabotage","smart manufacturing","Trend Micro"],"articleSection":["News, Views and Opinion"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/","name":"Identifying critical Industry 4.0 attack methods - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"datePublished":"2020-05-12T07:00:00+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"description":"Trend Micro has launched its latest research, which provides forward-looking analysis of smart manufacturing systems to show how advanced hackers could leverage unconventional, new attack routes to sabotage smart manufacturing systems","breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/identifying-critical-industry-4-0-attack-methods\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Identifying critical Industry 4.0 attack methods"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/16612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=16612"}],"version-history":[{"count":1,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/16612\/revisions"}],"predecessor-version":[{"id":16613,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/16612\/revisions\/16613"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=16612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=16612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=16612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}