Security Market Segment LS
Thursday, 04 May 2017 12:14

Rogue robots wreaking havoc

By

New research from Trend Micro claims that the plethora of industrial robots poses a real enhanced security threat – not only in subtly sabotaging work processes and products but in the possibility of ransomware attacks and physical harm to humans.

The research puts the spotlight on the security and vulnerability of industrial robots. The Industry 4.0 revolution calls for industrial robots to increase their complexity and interconnectedness exposing them as part of the attacker surface.

In Trend Micro’s analysis, researchers discovered different ways that make industrial robots vulnerable – from the usage of outdated software and weak authentication, to exposure due to the usage of public IPs.

Using the findings, it demonstrated how remote attackers can alter or introduce minor defects in the manufactured product, physically damage the robot, steal industry secrets, or injure humans.

Trend Micro says that due to architectural commonalities of most modern industrial robots, the existence of strict IEEE standards, and common software base, industrial robots are a practical target for hackers. It determined five classes of attacks are possible once an attacker is able to exploit any of the weaknesses found.

These classes include:

  • Altering the controller’s parameter. Attacker alter the control system so the robot moves unexpectedly or inaccurately, at the attacker’s will.
  • Tampering with calibration parameters. The attacker changes the calibration to make the robot move unexpectedly or inaccurately.
  • Tampering with the production logic. The attacker manipulates the program executed by the robot to introduce defects in the workpiece.
  • Altering the user-perceived robot state. The attacker manipulates the status information so the operator is not aware of the true status of the robot.
  • Altering the robot state. The attacker manipulates the true robot status so the operator loses control or can get injured.

While all this sounds a little like Asimov’s i-Robot, Trend Micro was able to exploit all five weaknesses. For example, a robot could be altered to produce faulty goods, and ransom demands follow to identify those robots or goods. Or a robot could even kill someone.

Trend Micro says industrial robot standards must consider cyber security threats the same way ICS and automotive sector standards have evolved to mitigate them. Network defenders must fully understand the unique position that industrial robots have in terms of securing them.

Robots have a very long lifetime, which means vendors must be able to provide security updates to all currently deployed versions, which they may not always be able to do. Furthermore, customers may be worried by downtimes or potential regressions carried by software updates and thus refrain from timely patching their systems.

The technical paper is here.

DIGITAL MARKETING HAS NO SOCIAL DISTANCING OR TRAVEL RESTRICTIONS

As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email andrew.matler@itwire.com

CONTACT US!

LAYER 1 ENCRIPTION A KEY TO CYBER-SECURITY SOLUTION

Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.

DOWNLOAD!

Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments