Hackers halt plant operations in watershed cyber attack
December 18, 2017
It was only a matter of time. “Triton” has emerged as third computer virus discovered to date that is capable of disrupting industrial processes. The first, Stuxnet, was discovered in 2010 and was used to attack Iran’s nuclear program. The second, known as Crash Override or Industroyer, was discovered last year by researchers who said it was likely used in a December 2016 attack that cut power in Ukraine. In this case, the virus was used to attack Triconex safety systems in an undisclosed Saudi Arabian facility.
According to cyber investigators and the firm whose systems were targeted, the hackers were likely working for a nation-state to invade the safety system of a critical infrastructure facility in a watershed attack that halted plant operations. Department of Homeland Security spokesman Scott McConnell said the agency was looking into the matter “to assess the potential impact on critical infrastructure.”
Not to put too fine a point on it, but Bedrock Automation controllers with Cybershield™ were designed from the ground up specifically to stop this kind of attack in its tracks. Installing a Bedrock Secure Proxy solution “in front” of your existing ICS is a simple, cost effective way to introduce this powerful capability without replacing your entire ICS. A small investment that can pay huge dividends. Contact our sales team to learn more.
NEWS RELEASE: Bedrock® Cybershield 3.0 Delivers on the Promise of Open Secure Automation (OSA®) with a Suite of Cyber Defense Tools and Open SCADA Partners
February 12, 2018
San Jose, Calif. – February 12, 2018 – As part of their participation at the ARC Conference, Bedrock Automation has […]
February 5, 2018
Leading SCADA Software Vendors Commit to Using Specification to Deliver Bedrock Open Secure Automation (OSA®) Solutions San Jose, Calif. […]