Breaking News

Viafin Service experiences deceleration in growth but sees a slight increase in profitability Israel Urges Rafah Residents to Seek Safety in Humanitarian Zones amid Conflict in Gaza Technology can reduce water loss and waste by up to 50% Ca Mau fertilizer is available for export to Australia Deadly floods in Brazil claim 78 lives

The report by Honeywell emphasizes the criticality of enhancing cybersecurity measures in operational technology (OT) environments. This is because of the increasing number and sophistication of cyberattacks that target industrial facilities in recent years, which are often initiated through USB devices.

In particular, the study highlights the presence of malware transmitted via USB storage devices used to transfer files within and between industrial sites. With cyber attackers becoming increasingly adept at infiltrating industrial environments, this expertise enables them to stay hidden within industrial control systems, laying the groundwork for potentially devastating attacks exploiting the systems’ inherent functionalities.

The prevalence of malware aimed at industrial systems is on the rise, with 31% of total malware attacks specifically targeting these systems and sites. This represents a significant increase from 2016 when industrial-targeted malware attacks were recorded at 16%. The report underscores the damaging effects that malware can have on OT environments, such as disrupting visibility, control or causing system downtime.

Honeywell’s research reveals that a substantial majority (82%) of malware possesses the capability to disrupt industrial operations by interfering with visibility or control mechanisms. Furthermore, there is a growing trend of malicious software targeting removable media like USB devices. Malware attacks on USBs account for over half (51%) of total attacks in 2024 – a notable surge from the 9% reported in the previous 2019 report.

Therefore, it is crucial for OT environments to prioritize their cybersecurity measures and take proactive steps to mitigate these threats before they cause significant damage.

Leave a Reply