Advertisement

Ransomware incidents in manufacturing grow as transparency, and attack options, increase

Manufacturing, like other sectors such as health care, has endured a rise in opportunistic attacks from criminals.
Manufacturing
A production line for pharmaceuticals. There have been a number of high-profile ransomware incidents in the manufacturing sector in 2020. (Getty Images)

The number of publicly documented ransomware incidents at manufacturing organizations has jumped considerably in 2020 as attackers have found ways to disrupt facilities’ operations by affecting both traditional IT networks and software that supports industrial processes, according to research published Thursday.

Industrial security company Dragos found that ransomware incidents in the manufacturing sector had more than “tripled” this year compared to 2019, though the company did not specify the number of incidents.

Two things help explain the report’s findings: Companies are being more transparent about reporting incidents; and manufacturing, like other sectors such as health care, has endured a rise in opportunistic attacks from criminals who know how bring an organization to its knees.

“Companies that rely on availability of their operations [are] being targeted and held for ransom to be able to restart those processes,” said Selena Larson, a senior cyberthreat analyst at Dragos.

Advertisement

Among the Dragos tally were reported ransomware incidents at Honda in June and Evraz, a steel maker, in March. Both companies were reportedly forced to halt some production operations.

The Honda incident pointed to a troubling trend, Dragos said: Some threat groups are increasingly using ransomware with code that contains the ability to disrupt software that supports industrial processes. EKANS, the ransomware reportedly used on Honda, was also suspected in a May attack on Fresenius Group, a  European health care conglomerate, that hampered some pharmaceutical production.

But it doesn’t take tailored code like that to affect manufacturers’ operations. Attackers could also encrypt IT networks containing logistics data, throwing a wrench in scheduling plans.

“A simple, non-manufacturing-specific attack [including ransomware] can easily spill out of the enterprise network to the factory floor and, in absence of strong air-gapping measures, halt the production,” said Federico Maggi, a senior researcher at cybersecurity company Trend Micro who specializes in manufacturing.

A possible testing ground

Advertisement

State-linked hacking groups rarely confine themselves to targeting just one sector. Five such groups have shown an interest in manufacturing while at the same time targeting electricity, aerospace and other sectors, according to Dragos.

The report makes the case that such advanced persistent threats, as state-linked groups are often known, could test out their capabilities on the manufacturing sector. Some big manufacturing companies have on-site power operations that contain some of the same equipment exploited by suspected Russian hackers who cut power in Ukraine in 2016.

“It’s possible that manufacturing would be an interesting and attractive target for an adversary’s offensive tool development because we often see that it’s less sophisticated in terms of its cybersecurity operations and there’s just not quite as much oversight or regulations,” Larson said.

Sean Lyngaas

Written by Sean Lyngaas

Sean Lyngaas is CyberScoop’s Senior Reporter covering the Department of Homeland Security and Congress. He was previously a freelance journalist in West Africa, where he covered everything from a presidential election in Ghana to military mutinies in Ivory Coast for The New York Times. Lyngaas’ reporting also has appeared in The Washington Post, The Economist and the BBC, among other outlets. His investigation of cybersecurity issues in the nuclear sector, backed by a grant from the Pulitzer Center on Crisis Reporting, won plaudits from industrial security experts. He was previously a reporter with Federal Computer Week and, before that, with Smart Grid Today. Sean earned a B.A. in public policy from Duke University and an M.A. in International Relations from The Fletcher School of Law and Diplomacy at Tufts University.

Latest Podcasts