A lot of industrial networks have a big hole in their cyber security

June 12, 2014

Despite the fact that the Stuxnet virus made headlines when it attacked programmable logic controllers running Iran's nuclear centrifuges,  a similar attack on industrial facilities in the U.S. would be remarkably easy to pull off.

That was the take-away I got from a session during an event called the Big M, organized by the Society of Manufacturing Engineers. The cyber security panel included Bruce Billedeaux, a senior consultant at Maverick Technologies. Maverick is a systems integrator that does a lot of industrial control work. Billedeaux remarked that though there's more sensitivity to cyber security issues today,  it would still be relatively easy to compromise computer-controlled equipment in most industrial plants. "I have never been asked about the contents of the computer I bring into a plant," he said. Ditto for the USB sticks he occasionally brings in. That's worrying because once the bad guys have gotten behind a plant's firewall, they can exploit the firewall to do a lot of damage, he says.

It seems that third-party support of plant-floor equipment has been a blind spot for a lot of industrial cyber security efforts. "There is almost no outbound protection for industrial equipment in a lot of cases," Billedeaux said. "No one has validated the person on the other end of the line. If you have a VPN coming into the plant, most facilities have no idea whether the remote machine has been compromised or not."

And here is a scenario he outlined that, I noticed, had several audience members shifting in their chairs uncomfortably: Suppose it is late at night and you are trying to get a line up and running quickly because downtime costs thousands of dollars a minute. But you are missing a critical piece of driver software and the manufacture's web site is down, so you can't download it. You start searching. You eventually find the driver somewhere else. But if the site with the driver sits is a domain that looks something like ***.ru, are you still going to download that driver? And in the heat of the moment, will you take time to scan it first?

Billedeaux's message was that manufacturers have to plan ahead to avoid sticky situations like this.

About the Author

Lee Teschler | Editor

Leland was Editor-in-Chief of Machine Design. He has 34 years of Service and holds a B.S. Engineering from the University of Michigan, a B.S. Electrical Engineering from the University of Michigan;, and a MBA from Cleveland State University. Prior to joining Penton, Lee worked as a Communications design engineer for the U.S. Government.

Sponsored Recommendations

Safety Risk Assessment Guidelines for Automation Equipment

Dec. 20, 2024
This Frequently Asked Questions (FAQ) covers the basics of risk assessments, including the goals of the assessment, gathering the right team to perform them, and several methodologies...

Safety Products Overview

Dec. 20, 2024
The collection of machine safeguarding devices from Schmersal include keyed interlocks, solenoid locks, safety sensors, limit switches, safety light curtains and more.

SAFER Workplace: Stop, Assess, Formulate, Execute, Review

Dec. 20, 2024
Our SAFER Workplace initiative promotes workplace safety, with a heightened focus on machine safety, to reduce the potential of near misses, accidents, and injuries. Behaving ...

The advantages of a Built-in Bluetooth Interface for Your Safety Light Curtains

Dec. 20, 2024
Safety Light Curtains with Bluetooth InterfaceGuido Gutmann, Key Account Manager, Optoelectronic Safety Devices, Schmersal Group, explains the advantages of ...

Voice your opinion!

To join the conversation, and become an exclusive member of Machine Design, create an account today!