Home Security Rogue robots wreaking havoc

New research from Trend Micro claims that the plethora of industrial robots poses a real enhanced security threat – not only in subtly sabotaging work processes and products but in the possibility of ransomware attacks and physical harm to humans.

The research puts the spotlight on the security and vulnerability of industrial robots. The Industry 4.0 revolution calls for industrial robots to increase their complexity and interconnectedness exposing them as part of the attacker surface.

In Trend Micro’s analysis, researchers discovered different ways that make industrial robots vulnerable – from the usage of outdated software and weak authentication, to exposure due to the usage of public IPs.

Using the findings, it demonstrated how remote attackers can alter or introduce minor defects in the manufactured product, physically damage the robot, steal industry secrets, or injure humans.

Trend Micro says that due to architectural commonalities of most modern industrial robots, the existence of strict IEEE standards, and common software base, industrial robots are a practical target for hackers. It determined five classes of attacks are possible once an attacker is able to exploit any of the weaknesses found.

These classes include:

  • Altering the controller’s parameter. Attacker alter the control system so the robot moves unexpectedly or inaccurately, at the attacker’s will.
  • Tampering with calibration parameters. The attacker changes the calibration to make the robot move unexpectedly or inaccurately.
  • Tampering with the production logic. The attacker manipulates the program executed by the robot to introduce defects in the workpiece.
  • Altering the user-perceived robot state. The attacker manipulates the status information so the operator is not aware of the true status of the robot.
  • Altering the robot state. The attacker manipulates the true robot status so the operator loses control or can get injured.

While all this sounds a little like Asimov’s i-Robot, Trend Micro was able to exploit all five weaknesses. For example, a robot could be altered to produce faulty goods, and ransom demands follow to identify those robots or goods. Or a robot could even kill someone.

Trend Micro says industrial robot standards must consider cyber security threats the same way ICS and automotive sector standards have evolved to mitigate them. Network defenders must fully understand the unique position that industrial robots have in terms of securing them.

Robots have a very long lifetime, which means vendors must be able to provide security updates to all currently deployed versions, which they may not always be able to do. Furthermore, customers may be worried by downtimes or potential regressions carried by software updates and thus refrain from timely patching their systems.

The technical paper is here.


Our Mesh WiFi system MW3 is the first in Australia market with price below AUD$200 for a set of three.

· Best valued product
· Strong signal covering up to 300m2 for MW3 and 500m2 for MW6
· Aesthetically pleasing and light weigh (blend into any room deco)
· Wireline backhauls supported
· Product units are pre-paired and easy to setup
· Not requiring phone number or email address to set up
· Wall penetration (better than other similar brands)
· Seamless WiFi roaming
· User friendly app with controls to setup a guest network, parental controls for disabling groups of devices you allocate to individuals, QoS and more



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!


Popular News




Sponsored News