Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Report: USB threats to ICS systems have nearly doubled
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware

Report: USB threats to ICS systems have nearly doubled

5 years ago Anastasios Arampatzis
Report: USB threats to ICS systems have nearly doubled

The latest Honeywell USB Threat Report 2020 indicates that the number of threats specifically targeting Operational Technology systems has nearly doubled from 16% to 28%, while the number of threats capable of disrupting those systems rose from 26% to 59% over the same period.

Let’s face it. Critical infrastructure operators in manufacturing, aerospace, energy, shipping, chemical, oil and gas, pulp and paper, water and wastewater, and building automation are heavily relying on USB devices. The reason is simple – process control and critical networks are typically well-isolated, with strong physical and logical access controls in place.

It is, therefore, no surprise that removable media remains one of the top vectors for cybersecurity threats. Since the established access controls make network penetration and intrusion more difficult, adversaries are targeting the “low hanging fruit” of required file transfers between industrial automation and control systems.

Overall, we are witnessing an increase in attacks targeting Operational Technology (OT). But, at the same time, we can see an increased awareness of the consequences of such attacks due to broad news coverage of Industroyer, TRITON, Havex, Ekans, USBCulprit, and more. USB devices continue to play an important role in these types of targeted attacks, since they are the second most prevalent attack vector into industrial control and automation systems behind network-based threats.

Report findings

To compile the report, researchers from Honeywell’s Industrial Cybersecurity Global Analysis, Research, and Defense (GARD) team analyzed USB usage and behavioral data collected from production sites.

According to the report findings, 45% of production sites have blocked at least one threat. This reaffirms that USB remains a significant vector for OT threats. It is almost inevitable that, over time, some threat will find its way onto USB removable media.

Despite the fact that the volume of malware discovered on USB removable media was a small fraction of the total sample size, the impact of the malware found increased significantly since the first report in 2018 even if the overall concentration of malware remained steady. A staggering 59% of total discovered threats had the ability to impact industrial control and process automation systems, up from just 26% in 2018. This includes malware capable of creating denial of service attacks to devices connected within automation networks, loss of view to operations management networks, or the destruction or disruption of key assets.

The researchers believe that this finding directly correlates to the increase in ransomware, which was up from 7% to 17%. Although ransomware is not considered an “OT specific” threat, the increased numbers seen in OT environments indicate that industrial corporations are being targeted by ransomware variants. Therefore, the rate of threats targeting OT nearly doubles from 16% to 28%.

The report also shows that 1 in 5 of all threats (19%) was designed specifically to leverage USB removable media as an attack vector, and more than half the threats were designed to open backdoors, establish persistent remote access or download additional malicious payloads. These findings are indicative of more coordinated attacks, likely attempting to target air-gapped systems used in most industrial control environments and critical infrastructure.

“USB-borne malware continues to be a major risk for industrial operators,” said Eric Knapp, director of Cybersecurity Research and engineering fellow, Honeywell Connected Enterprise, Cybersecurity. “What’s surprising is that we’re seeing a much higher density of significant threats that are more targeted and more dangerous. This isn’t a case of accidental exposure to viruses through USB – it’s a trend of using removable media as part of more deliberate and coordinated attacks.”

What is worrying, though, is that 20% of the threats analyzed went undetected, up from 11% in the 2018 report. This is concerning especially with the high prevalence of newer threats and the clear indications of high-impact, targeted threats against industrials originating from USB removable media. The key problem is that many industrial organizations update their anti-virus signatures less frequently, due to the limited availability of maintenance windows where such updates can occur.

Implications for industrial operators

The findings of the report are useful for the industries to enhance their cybersecurity posture.

The evidence demonstrated in the Honeywell report indicates that new threat variants are being introduced more quickly through USB devices, specifically targeting industrials. Hence, industries should revisit their established controls and patch cycles to remediate these threats. Real-time detection of risks and threats, and integrated monitoring and incident response procedures should be part of every operator’s playbook.

Considering the increased threat that USB drives pose, USB security must include technical controls and enforcement. Relying solely on policy updates or staff training is not adequate to prevent increased threats to industrial systems.

USB drivers are usually vectors of initial infection for the attackers to establish remote access and download additional payloads. To prevent this pivot, egress network traffic should be tightly controlled and should be enforced by network controls such as segmentation and firewalls.

Finally, patching and hardening of end nodes is a necessity despite the challenges of patching production systems (you can read more about that topic, here). Keeping the infrastructure current is the best way to mitigate known threats and help security teams respond to sophisticated and targeted attacks.

Industries are already taking steps to address USB threats. For example, the Federal Energy Regulatory Commission has ordered the revision of power reliability standards “to mitigate the risk of malicious code” stemming from such devices. This report has also highlighted that it is important to deliver security solutions that are not either completely unusable or productivity stoppers.

Tripwire offers a wide ranges of security solutions to help industries address threats against ICS systems. You can learn more here.


Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

More Reading

USB Threats to Cybersecurity of Industrial Facilities

The post ” Report: USB threats to ICS systems have nearly doubled” appeared first on TripWire

Source:TripWire – Anastasios Arampatzis

Tags: Critical Severity, Encryption, High Severity, Low Severity, Malware, Ransomware, TripWire

Continue Reading

Previous 22-Year-Old Charged With Hacking Water System and Endangering Lives
Next DeepDotWeb Admin Pleads Guilty to Money Laundering Charges

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

5 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More

10 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them

12 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

13 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

15 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

17 hours ago [email protected] (The Hacker News)

Recent Posts

  • North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
  • ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
  • We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them
  • Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware
  • Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT