Internet Explorer 11 is not supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Cyberattacks on Manufacturing Industry Increase During COVID

With many companies working remotely and relying more heavily on computer networks to run operations, cyberdisruptions and attacks have increased. Manufacturing has been particularly hard hit.

(TNS) — In the first six months of the year, as most of the world shut down because of COVID-19 and workers everywhere shifted to working remotely, online criminals and state-backed hackers got busy breaking into computer networks, especially those of manufacturing, technology and telecom companies.

Indeed, hackers worked at a greater pace than they did all of last year, according to cybersecurity research firm CrowdStrike. 

Companies in as many as 27 different industries fell victim to the hackers, nearly double the number of industries that were targeted in all of 2019, CrowdStrike said in a report made public Tuesday. 

While technology, telecom and financial companies are routinely targeted, “the manufacturing industry has experienced a dramatic increase in interactive intrusion activity compared to past years,” CrowdStrike said. Manufacturing companies saw an 11 percent increase in attacks and intrusions on their networks compared with all of 2019, the company said. 

The attacks on manufacturing companies observed by CrowdStrike affected the business systems or front-office networks rather than computers involved in factory control systems, Jennifer Ayers, vice president at CrowdStrike, wrote in an email to CQ Roll Call

The report is based on CrowdStrike’s analysis of attacks on its clients’ networks around the globe. 

Both online criminals and state-sponsored hackers may have chosen to target industries already left vulnerable because of large-scale disruption in their global supply chain of materials, CrowdStrike said. Businesses experiencing trouble getting materials and supplies led attackers to believe that the companies may be “more inclined to pay a ransom to prevent further disruption,” CrowdStrike said. 

Criminal groups “are focused on monetary gain through ransom and extortion by theft of data, whereas state-sponsored attackers are focused on a different agenda which can range from espionage to [intellectual property] theft as examples,” Ayers said.

For nation-state hackers, “international trade tensions, increased competition for essential goods, and efforts by some firms to decrease their reliance on offshore suppliers could all have contributed to increased foreign interest in the operations of firms in these sectors,” CrowdStrike said in the report. 

But in some cases the difference in tactics used by the two kinds of attackers is blurred, with criminal groups willing to play the long game in search of greater profits, the report said. 

Working From Home

The increase in attacks was also likely driven by the sudden shift to remote working, and the “accelerated set up of new infrastructure by many companies,” which may have led to more security gaps and vulnerabilities being exploited, the report said.

Some companies made sure to take the security of their corporate networks into account as they made the transition to remote work, “while some have had to invest heavily or change their security strategy to survive,” Ayers said. 

“If you had to move the majority of your business to an online presence rapidly but did not employ basic security, that is a ripe target for a criminal actor who could deploy ransomware and request several million dollars to recover,” Ayers said.

“That can decimate a business not just operationally but financially as well,” Ayers added. “This year, at this time, it is not an ‘if’ there will be an attack, it is a ‘when’ and that statement applies to all companies regardless of size.”

Although some industries saw a spike in attacks directed at them, others such as airlines, hospitality and retail businesses saw a drop in hackers targeting them, mostly because the industries were the hardest hit by the COVID-19 pandemic and likely offered little potential for extracting ransoms, CrowdStrike said. 

For state-backed hackers, companies in agriculture, health care, media, tech and telecom appeared to be the most attractive, with more than one hostile country targeting these sectors, CrowdStrike found.

Agricultural Companies Targeted

North Korea and China are both targeting agriculture companies, the report said. 

In one case, a North Korean government-backed group code-named Labyrinth Chollima targeted an unnamed agricultural company by sending one of its employees an unsolicited job offer, which the victim then opened. The Microsoft Word document attached to the email contained a malicious code that allowed the hacker to copy files on the CrowdStrike client’s network. The attack was stopped after CrowdStrike identified the attack and took steps to prevent any data loss, the report said. 

The attack could be a case of economic espionage targeting a sector that North Korean leader Kim Jong-un has identified as key to the country’s economic development, CrowdStrike said. 

Six separate Chinese hacking groups are targeting telecom companies, a popular target for state-backed hackers, CrowdStrike said. 

The United States has been waging a campaign against Chinese telecom giant Huawei, alleging that the company’s attempts to establish a global leadership in 5G mobile phone technologies is a way for Beijing to gain access to sensitive data from all over the world. Huawei denies these allegations, but under pressure from Washington, many U.S. allies have declined to allow Huawei access to their networks. 

An Iran-based hacking group code-named Tracer Kitten used a custom-designed backdoor to break into a telecom company that had operations in Europe, the Middle East, and Africa, CrowdStrike said. 

The telecom “industry still remains firmly within the crosshairs for targeted attacks, the motivations of which are likely associated with espionage and data theft objectives,” CrowdStrike said. 

In another case involving an attack on a health care company in Asia, CrowdStrike found that Chinese hackers had penetrated the company’s network using a remote-access tool that masqueraded as a genuine Microsoft Windows process available on GitHub, an online platform that hosts open-source software code used by programmers. 

Companies across the globe need to step up investment and attention on defending their computer networks, constantly watching for attacks, CrowdStrike said. 

“In my opinion, defense can be less expensive” than trying to recover from an attack, Ayers said. 

©2020 CQ-Roll Call, Inc., All Rights Reserved. Distributed by Tribune Content Agency, LLC.

Special Projects
Sponsored Stories
In recent years, local governments have been forced to adapt to a wildly changing world, especially as it pertains to sending bills and collecting payments.
Workplace safety is in the spotlight as government leaders adapt to a prolonged pandemic.
While government employees, students and the general public had to wait in line for hours in the beginning of the pandemic, at-home test kits make it easy to diagnose for the novel coronavirus in less than 30 minutes.
Governments around the nation are working to design the best vaccine policies that keep both their employees and their residents safe. Although the latest data shows a variety of polarizing perspectives, there are clear emerging best practices that leading governments are following to put trust first: creating policies that are flexible and provide a range of options, and being in tune with the needs and sentiments of their employees so that they are able to be dynamic and accommodate the rapidly changing situation.
Service delivery and the individual experience within health and human services (HHS) is often very siloed and fragmented.
In this episode, Marianne Steger explains why health care for Pre-Medicare retirees and active employees just got easier.
Government organizations around the world are experiencing the consequences of plagiarism firsthand. A simple mistake can lead to loss of reputation, loss of trust and even lawsuits. It’s important to avoid plagiarism at all costs, and government organizations are held to a particularly high standard. Fortunately, technological solutions such as iThenticate allow government organizations to avoid instances of text plagiarism in an efficient manner.
Creating meaningful citizen experiences in a post-COVID world requires embracing digital initiatives like secure and ethical data sharing, artificial intelligence and more.
GHD identified four themes critical for municipalities to address to reach net-zero by 2050. Will you be ready?