Manufacturing at No. 1 of cyberattacks in 2021

22. March, 2022

The IBM Security Team’s annual report analyses security incidents and internal observations and identifies new developments. The past years show known constants, but also interesting new trends.

Phishing is the most common type of attack

97% of the attacks are the work of organised cybercriminals. As expected, phishing and ransomware are prominent. The direct “social” attack on employees is most widespread, at over 40%. Cybercriminals most frequently misused the well-known names of Microsoft, Google or Apple for this purpose. Combining a phishing email with a phone call, will triple the success of an attack. The actual purpose behind phishing attacks remains in most cases the introduction of ransomware.

Manufacturing industry as the most popular target

While the financial sector was the number 1 in previous years, the focus of attacks has now shifted to the industrial sector. The reason is thought to be, on the one hand, greater sensitivity to failures in manufacturing and supply chains, and on the other hand, an expansion of the target group: cybercriminals are actively looking for new targets and adapting their tools to the different environments. New ransomware code specialised on Linux systems increased by almost 150%. Attacks on traditional OT environments with SCADA/Modbus were up to 20 times more frequent than in the previous year. Although it is considered best practice to disconnect critical systems from the office network and the internet on several levels, some individual components are still directly accessible from the internet.

Botnet in search of IoT devices

IoT systems also remain a popular target for attacks. Cybercriminals try to exploit vulnerabilities and unadapted default settings of unsecured systems in an automated way. The Mozi botnet was specifically designed for this purpose, and its activities have increased almost thirty-fold since 2019. According to the IBM report, around 75% of IoT malware originates from this source. The suspected authors have probably been arrested.

Active attacks on cloud environments

Widely used virtualisation platforms such as VMWare ESX and Docker are increasingly becoming the focus of attack strategies. Cybercriminals actively look for vulnerabilities in standard configurations and interfaces and exploit them directly. Administrators should therefore study the recommendations and security guides carefully, implement them and check them regularly.

Learnings from the study

The authors of the IBM study divide the recommendations for improving cybersecurity at companies into two categories. On the one hand, those responsible are advised to minimise the potential risks in the IT landscape and to further expand and implement fundamental security approaches. These include the concepts of zero trust and the maximum limitation of access rights (principle of least privilege), the automation of security-relevant processes and activities as well as the expansion and improvement of detection and reaction to possible security incidents.

On the other hand, specific measures recommended include the development of a concrete response plan for a ransomware incident, the use of multi-factor authentication for remote access to corporate resources, and prevention of phishing attacks. This includes both technical security measures and user training to raise awareness and detect fake communication attempts.

Industrial Cyber Security & Cybersecurity Awareness

With the optimal combination of market-leading solutions and practical industry experience, IKARUS is your trusted contact for industrial security. As a Platinum Partner of Nozomi Networks, we offer the best international technologies for industrial security and visibility at the advantages of a local partner. For maximum output, we focus on active knowledge transfer and support from our certified system engineers and security specialists – from proof of value to ongoing operation of the solution in your OT.

To actively counteract social engineering and phishing, we offer sustainable awareness campaigns, packages, training and consulting in cooperation with Secutain. Hand in hand, targeted technological security precautions and appropriately trained employees provide the optimal defence strategy for more cyber security and resilience.

Worth reading:
Defense in Depth: Multi-layer approach for lived OT security
Who takes care of security in the OT?
Ransomware attacks: Do‘s and Don’ts

Sources:
https://www.ibm.com/security/data-breach/threat-intelligence/
https://www.ibm.com/downloads/cas/ADLMYLAZ

Account Management
Bedrohung
Indicators of Attack
Gefahren durch vertrauenswürdige Services
Threat Intelligence
SQL Injection
SMTP Smuggling
Cyber-Risiken in der Ferienzeit
passkey
Dynamische Cybersicherheit
NIS2
Harmony Mobile by Check Point
EU Machinery Regulation
Sergejs Harlamovs, Malware-Analyst bei IKARUS

Plugin IdaClu accelerates malware analysis

IdaClu: IKARUS malware analyst Sergejs Harlamovs wins Hex-Rays plugin contest
NIS2
Infostealer

WE ARE LOOKING FORWARD TO HEARING FROM YOU!

IKARUS Security Software GmbH Blechturmgasse 11
1050 Vienna

Phone: +43 (0) 1 58995-0
Sales Hotline:
+43 (0) 1 58995-500

SUPPORT HOTLINE

Support hotline:
+43 (0) 1 58995-400

Support hours:
Mon – Thu: 8am – 5pm
Fri: 8am – 3pm

Remote maintenance software:
AnyDesk Download