Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Industrial Risk: The New Targets that Hackers are Aiming For

The Growing Cybersecurity Threat to Industrial Control Systems

In recent years, there’s been a troubling shift in the world of cyberattacks. Hackers are no longer just going after our personal data or bank accounts (the fact the shift AWAY from this is troubling should be extremely alarming already); they’re increasingly setting their sights on something much larger: industrial control systems (ICS). These systems are the backbone of factories, power plants, water treatment facilities, and countless other pieces of critical infrastructure that keep modern society running. Many of our industries rely on these systems in some capacity or another. Unfortunately, many of these systems weren’t built with today’s cyber risks in mind. In fact, when most of these industrial control systems were designed, “connectivity” often meant nothing more than isolated, local networks. Security was barely a consideration because access was controlled by physical barriers rather than firewalls.

Fast forward to today, and many of these once-isolated systems are now linked into vast, complex networks that span the globe. This connectivity allows for remote monitoring, control, and data analysis – a huge advantage for efficiency but also a gaping vulnerability. When hackers get access to ICS, they’re able to do much more than disrupt operations. They can bring production lines to a halt, tamper with safety mechanisms, or even endanger lives by manipulating critical controls in facilities that supply our water, electricity, or fuel.

With the rapid expansion of the Internet of Things (IoT) and the growing integration of operational technology (OT) with information technology (IT), the “attack surface” – or the number of ways a hacker can potentially enter a system – is bigger than ever. And as more connected devices enter the industrial ecosystem, the potential for vulnerabilities only grows (anyone have a “smart” toaster?). Industrial cybersecurity is no longer just a business expense; it’s becoming an urgent necessity. In this article, we’ll explore why specific industries are at heightened risk, look at real-world examples of attacks, and discuss what can be done to safeguard these critical systems.


Targeted Systems and Industries

So, what types of systems and industries are hackers targeting, and why are they so vulnerable? The answer largely lies in the critical nature of these industries, which include sectors like energy, water, manufacturing, transportation, and chemicals. Each of these industries relies heavily on ICS to manage operations, and because these systems control essential infrastructure, the effects of a successful attack can ripple out to affect entire communities, economies, and even national security.

Take the energy sector, for example. Power grids, oil pipelines, and nuclear facilities depend on ICS to monitor, control, and adjust everything from power flow to fuel supplies. An attack that disrupts these systems doesn’t just cause a power outage; it could potentially cause millions of dollars in damage, disrupt lives for weeks, and in some cases, pose a direct threat to public safety. Similarly, water treatment plants rely on ICS to maintain safe levels of chemicals in drinking water, so any interference there could lead to contaminated water supplies. Manufacturing industries – everything from food production to electronics – rely on ICS to streamline production lines. If those lines go down, production stalls, supply chains suffer, and entire industries may feel the consequences.

What makes these sectors even more vulnerable is their reliance on aging technology. Many ICS in operation today were installed decades ago, and they weren’t built with today’s cyber threats in mind. Rather than starting from scratch with new, secure technology (an expensive and complicated process), many organizations have opted to “modernize” by layering new technology onto old. While this may solve certain problems, it also introduces compatibility issues and potential weaknesses that hackers can exploit.


Notable Incidents in Industrial Cybersecurity

When it comes to industrial cybersecurity, real-world incidents illustrate just how high the stakes can be. Here are a few examples that demonstrate how damaging (and terrifying) these attacks can be – and why it’s so important to protect industrial systems from cyber threats.

Stuxnet: A Game-Changer in Industrial Cybersecurity

I can’t write an article about industrial system impacts and not mention the scariest incident of all. Stuxnet is often cited as the cyberattack that opened the world’s eyes to the vulnerabilities in industrial systems. Back in 2010, Stuxnet, a sophisticated worm, was deployed to target Iran’s Natanz nuclear facility. This wasn’t just any malware – it was highly specialized, designed specifically to disrupt the operation of centrifuges used in uranium enrichment. By causing these centrifuges to spin erratically, Stuxnet effectively sabotaged Iran’s nuclear ambitions without a single missile or bomb.

What made Stuxnet truly alarming was that it wasn’t just malware aimed at a computer; it was targeted at specific industrial processes. It worked by infiltrating PLCs (Programmable Logic Controllers) that controlled the centrifuges, showing how vulnerable ICS could be if hackers found a way in. Stuxnet marked the beginning of a new era in cyber warfare, where attacks could be used as tools of international strategy. The event also highlighted the potential for state-sponsored cyberattacks, which continue to pose serious risks to industrial systems worldwide.

Clorox Hack

In 2023, Clorox, a major consumer product company, became the target of a cyberattack that disrupted its operations and significantly impacted its supply chain. The attackers leveraged ransomware (though never officially confirmed, the timeline to recover suggests it’s likely) to lock down parts of Clorox’s operational network, forcing the company to shut down portions of its production facilities. This hack underscored a critical point: even companies outside the usual “high-risk” industries like energy or water are vulnerable to cyberattacks.

The Clorox attack led to a shortage of products in stores, causing ripple effects throughout the supply chain and impacting consumers directly. The final total of damages this incident caused ended up being a bit north of 350 million. This incident demonstrated that hackers aren’t just looking to create chaos in traditionally high-stakes sectors; they’re targeting any company where they believe they can extract a ransom or cause widespread disruption. For companies like Clorox, which rely heavily on continuous production and distribution, any interruption can quickly lead to financial losses and supply issues, making cybersecurity an urgent priority.

Applied Materials Attack

Another significant cyber incident in 2023 involved Applied Materials, a key supplier in the semiconductor industry. The attack targeted the company’s IT systems, but its effects quickly spilled over to the production side, halting operations and impacting the broader chip supply chain. Given that the world was already facing a semiconductor shortage, this attack had global implications, potentially delaying production for everything from consumer electronics to vehicles.

The Applied Materials attack showcased how interconnected global supply chains are and how a cyberattack on a single company can affect entire industries. It’s a reminder that cybersecurity isn’t just about protecting one organization; it’s about safeguarding a whole ecosystem.

Colonial Pipeline Incident

In 2021, the Colonial Pipeline attack made headlines for its wide-reaching impact on the U.S. fuel supply. Colonial Pipeline, a major transporter of gasoline and other fuels on the East Coast, was hit by a ransomware attack that forced the company to shut down its entire pipeline system. The result was a fuel shortage that sparked panic buying, long lines at gas stations, and even temporary gas station closures in some areas.

This attack, believed to have been carried out by a hacking group known as DarkSide, underscored the vulnerability of critical infrastructure in the U.S. to cyberattacks. While Colonial Pipeline ultimately paid a ransom to regain access to its systems, the incident exposed significant weaknesses in the cybersecurity protocols governing critical infrastructure and led to calls for stricter cybersecurity standards.

Oldsmar, Florida, Water Treatment Plant Attack

In 2021, hackers attempted to poison the water supply at a treatment plant in Oldsmar, Florida. They gained access to the plant’s ICS and attempted to increase the amount of sodium hydroxide – a chemical used to treat water – to dangerous levels. Fortunately, an operator noticed the change and corrected it before any harm could be done.

This incident highlighted the very real dangers that cyberattacks pose to public health and safety. If the attempt had gone unnoticed, thousands of residents could have been exposed to contaminated water. The Oldsmar attack serves as a chilling example of how hackers can exploit the vulnerabilities in ICS to target essential services.


Mitigation Strategies and Potential Solutions

With these alarming incidents in mind, the question becomes: what can we do to protect industrial control systems from cyberattacks? While there’s no one-size-fits-all solution, there are several strategies that can significantly reduce the risk.

Network Segmentation and Access Control: One of the most effective ways to limit a hacker’s ability to move through a network is to segment the network (granted this didn’t work with Stuxnet, which was likely delivered via dead drop) but that’s where employee training comes in). By creating isolated sections for different operations, companies can limit the potential damage a hacker could cause. Access control measures, such as multi-factor authentication and role-based access, also play a key role in restricting unauthorized access to sensitive systems.

Real-Time Threat Detection with AI: Advances in artificial intelligence are providing new tools for detecting cyber threats in real-time. AI can analyze network activity, flagging unusual patterns that may indicate an attack. By detecting threats early, companies can respond faster, potentially stopping an attack before it escalates.

Employee Training: Often, the weakest link in cybersecurity is the human element. Employees should be trained to recognize phishing attacks, avoid suspicious downloads, and report any unusual activity. Regular training programs can significantly reduce the likelihood of a cyber breach due to human error.

Enhanced Government and Industry Standards: Regulatory bodies are increasingly recognizing the need for stringent cybersecurity protocols in critical infrastructure. For example, the National Institute of Standards and Technology (NIST) offers cybersecurity guidelines specifically for industrial systems. Adopting these standards can help companies stay a step ahead of attackers.


The Urgent Need for Stronger Industrial Cybersecurity

The world is more connected than ever, and with that connectivity comes risk. Industrial control systems that once seemed secure behind physical barriers are now vulnerable to cyberattacks with potentially catastrophic consequences. The incidents we’ve looked at in this article – from Stuxnet to the Colonial Pipeline – serve as stark warnings of what can happen if we don’t prioritize cybersecurity in our most critical industries.

If we want to avoid more incidents like these, it’s imperative that both companies and governments take steps to protect industrial systems. This means investing in cybersecurity solutions, adopting stronger regulations, and staying vigilant as hackers continue to evolve their tactics. The stakes couldn’t be higher; without robust defenses, the next major cyberattack could have consequences that extend far beyond the digital realm.