The Columbus Dispatch

Hackers looking to shut down factories for pay

- By Emery P. Dalesio

DURHAM, N.C. — The malware entered the North Carolina transmissi­on plant’s computer network via email last August, just as the criminals wanted, spreading like a virus and threatenin­g to lock up the production line until the company paid a ransom.

AW North Carolina stood to lose $270,000 in revenue, plus wages for idled employees, for every hour the factory wasn’t shipping its crucial auto parts to nine Toyota car and truck plants across North America, said John Peterson, the plant’s informatio­n technology manager.

The company is just one of a growing number being hit by cybercrimi­nals looking for a payday.

While online thieves have long targeted banks for digital holdups, today’s just-in-time manufactur­ing

sector is climbing toward the top of hackers’ hit lists.

Production lines that integrate computer-imaging, barcode scanners and measuring tolerances to a hair’s width at multiple points are more vulnerable to malevolent outsiders.

“These people who try to hack into your network know you have a set schedule. And they know hours are meaningful to what you’re doing,” Peterson said in an interview. “There’s only a day and a half of inventory in the entire supply chain. And so if we don’t make our product in time, that means Toyota doesn’t make their product in time, which means they don’t have a car to sell on the lot that next day. It’s that tight.”

He said that creates pressure on manufactur­ers to make the criminals go away by paying the sums demanded.

“They may not know what that number is, but they know it’s not zero. So what is that number? Where do you flinch?”

Last August at the 2,200worker Durham transmissi­on factory, the computer virus coursed through the plant’s network, flooding machines with data and stopping production for about four hours, Peterson said.

Data on some laptops was lost, but the malware was blocked by a firewall when it tried to exit the plant’s network and put the hackers’ lock on the plant’s computer network.

The plant was hit again in April, this time by different crooks using new malware designed to hold data or devices hostage to force a ransom payment, Peterson said. The virus was contained before affecting production, and no ransom was paid to either group, he said.

Manufactur­ers, government and financial firms are now the top targets globally for illicit intrusions by criminals, foreign espionage agencies and others up to no good, according to a report this spring by NTT Security.

A survey of nearly 3,000 corporate cybersecur­ity executives in 13 countries last year by Cisco Systems Inc. found about one out of four manufactur­ing organizati­ons reported cyberattac­ks that cost them money in the previous 12 months.

Since 2015, U.S. manufactur­ers considered “critical” to the economy and to normal modern life, like makers of autos and aviation parts, have been the main targets of cyberattac­ks — outstrippi­ng energy, communicat­ions and other critical infrastruc­ture, according to Department of Homeland Security incident response data. The numbers may be imprecise because companies in key industries often don’t report attacks for fear of diminished public perception.

But attacks demanding ransom against all U.S. institutio­ns are spiraling higher. The FBI’s Internet Crime Complaint Center received 2,673 ransomware reports in the year ending last September — nearly double from 2014.

While manufactur­ers are increasing­ly prey to these cyber-stickups, it may just be because criminals are playing the odds and striking as many enterprise­s of all types as they can across a targeted region, said John Miller, who heads a team at cybersecur­ity firm FireEye that tracks moneydrive­n online threats.

Attackers “aren’t necessaril­y going after manufactur­ing to the exclusion of other sectors or with a preference above other sectors. It’s more that, ‘OK, we’re going to try to infect everybody in this country that we can,’” Miller said.

One high-profile example came in May and June, when auto manufactur­ers including Renault shut down production after they were swept up in the worldwide onslaught of the WannaCry ransomware virus.

But attackers also are increasing­ly injecting ways to remotely control the robots and other automated systems that control production inside targeted factories.

The threat of computer code tailored to hit specific targets has been around since researcher­s in 2010 discovered Stuxnet, malware apparently designed to sabotage Iran’s nuclear program by causing centrifuge machines to spin out of control. Stuxnet is widely believed to be a covert American and Israeli creation, but neither country has officially acknowledg­ed a role in the attack.

Malicious software that attacked Ukraine’s electricit­y grid last December was built to remotely sabotage circuit breakers, switches and protection relays, researcher­s said.

Cyberattac­ks that reach into industrial control systems have doubled in the past two years in the U.S. to nearly four dozen so far in the federal fiscal year that ends in September, outstrippi­ng last year’s total, according to DHS data.

“I think the emerging threat you’re going to see in the future now is really custom ransomware that’s going to be targeted more toward individual companies,” said Neil Hershfield, the acting director of the DHS team that handles emergency response to cyberattac­ks on industrial control systems.

 ?? [AW NORTH CAROLINA VIA THE ASSOICATED PRESS] ?? AW North Carolina tech manager John Peterson said “These people who try to hack into your network know you have a set schedule. And they know hours are meaningful to what you are doing.”
[AW NORTH CAROLINA VIA THE ASSOICATED PRESS] AW North Carolina tech manager John Peterson said “These people who try to hack into your network know you have a set schedule. And they know hours are meaningful to what you are doing.”

Newspapers in English

Newspapers from United States