Home / / USB drives still common attack vector for industrial systems

USB drives still common attack vector for industrial systems

Honeywell report says infected USB drives detected at half of industrial sites monitored by its technology

USB drives still common attack vector for industrial systems
Infected USB drives remain a threat to industrial systems.

USB media devices continue to be used as a means of infection for cyberattacks against industrial systems, according to Honeywell.

Data derived from Honeywell technology used to scan and control USB devices at 50 customer locations showed that nearly half (44%) detected and blocked at least one file with a security issue. It also revealed that 26% of the detected threats were capable of significant disruption by causing operators to lose visibility or control of their operations.

The threats targeted a wide variety of industrial sites, including refineries, chemical plants and pulp-and-paper manufacturers around the world, and the threats themselves ranged in severity. About 1 in 6 targeted industrial control systems or Internet of Things (IoT) devices.

"The data showed much more serious threats than we expected, and taken together, the results indicate that a number of these threats were targeted and intentional," said Eric Knapp, director of strategic innovation, Honeywell Industrial Cyber Security. "This research confirms what we have suspected for years - USB threats are real for industrial operators. What is surprising is the scope and severity of the threats, many of which can lead to serious and dangerous situations at sites that handle industrial processes."

The research marks the first commercial report to focus exclusively on USB security in industrial control environments. It examined data collected from Honeywell's Secure Media Exchange (SMX) technology, which is specifically designed to scan and control removable media, including USB drives. Among the threats detected were high-profile, well-known issues such as TRITON and Mirai, as well as variants of Stuxnet, an attack type previously leveraged by nation-states to disrupt industrial operations. In comparative tests, up to 11% of the threats discovered were not reliably detected by more traditional anti-malware technology.

"Customers already know these threats exist, but many believe they aren't the targets of these high-profile attacks," Knapp said. "This data shows otherwise, and underscores the need for advanced systems to detect these threats."

The research, which is presented in the Honeywell Industrial USB Threat Report, recommends that operators combine people training, process changes, and technical solutions to reduce the risk of USB threats across industrial facilities.

Follow us to get the most comprehensive IT solutions delivered fresh from our social media accounts on Facebook, Twitter, Youtube, and listen to our Weekly Podcast. Click here to sign up for our weekly newsletter on curated technology news in the Middle East and Worldwide.

REGISTER NOW | Webinar Event | Security you can bank on – Safeguarding the Middle East’s financial sector

Presented in partnership with security and network specialist Cybereason, the second in the three part webinar series will bring together a panel of experts to discuss how banks and financial institutions are evolving their service offering while simultaneously staying one step ahead of the cyber criminals who seek to bring their operations crashing to the ground.

CHANNEL AWARD 2018