BIGFISH TECHNOLOGY LIMITED
02 July 2024

Cyber physical attacks, in which computer code is weaponized to inflict physical disruption or harm, are an increasing global concern. These attacks typically target water treatment facilities, power plants, transportation services, and other aspects of our society that are digitally connected and rely on essential infrastructure.


Years ago, cyber and physical systems had minimal to no interconnectedness. However, in recent years, internet-based solutions have been used extensively to control physical systems and objects. Emerging cyber physical systems include sensors, computational capabilities, real-time monitoring choices, and automated components, among other (fancy and helpful) features.

Experts have raised concern about how AI could lead to an era of cyber and physical attacks. Some could argue that as technology advances, so does responsibility. The difficulty right now is that we've mainly under-allocated resources.

 

10 challenging cyber physical attacks (and proactive mitigations).

  1. Threats to water treatment facilities. Cyberphysical attacks on water treatment plants and systems are increasing and becoming more severe. Threats include potential contamination with lethal substances, as was nearly the case in the Oldsmar water treatment plant attack. Water treatment plants, at least in the United States, have historically been hesitant to implement proper cyber security measures.

    Mitigation: Experts generally propose that the water sector use a multi-layered approach to cyber security. This involves strict network segmentation to separate OT systems from IT networks, multi-factor authentication, monitoring network traffic and system logs, and training employees on cyber security best practices.

 

  1. Threats to industrial machinery. Although these attacks have not been as common as water treatment facility threats, some of the world's most sophisticated cyber thieves can target construction sites.

    White hat researchers have demonstrated that cyber criminals can theoretically manipulate excavators, cranes, scrapers, and other massive pieces of machinery. Forbes observed five years ago that in the context of cyber security studies, "cranes were hopelessly vulnerable." Patches and workarounds have been released, although some problems may continue to exist.

    Mitigation: To prevent cyber physical attacks on industrial machinery located on or near active construction sites, cyber security experts should implement a comprehensive cyber security policy that includes both technical and procedural components. Products with built-in AI security, such as this, can help.

 

  1. Threats to power plants and the electrical grid. As the globe develops toward smart grid technologies, cyber physical attacks against such systems become more frequent and sophisticated. Experts believe that artificial intelligence can make developing and launching these assaults easier than ever before.

    Mitigation: One of the most difficult difficulties with power plant dangers is a lack of knowledge about mitigation. Organizations must ensure that all default passwords in systems have been changed to unique ones. They also need to update systems to the most recent patch level. It is also necessary to decommission unused systems. Employees must be aware of social media and social engineering threats. Contractors must meet high security standards, among other requirements. The US government's detailed assessments and recommendations

 

  1. Threats to the transportation system. Every day, transportation systems move millions of people and things across countries and continents. Cyber physical attacks on transportation infrastructure have the potential to impede or halt the supply chain, preventing people from obtaining critical, life-sustaining goods.

    Mitigations: One challenge in the transportation sector is the historically low level of resources dedicated to cyber security and cyber physical hazards. However, as the many transportation sub-sectors become more interconnected, greater funding, comprehensive cyber security policies, and joint efforts will become critical.

 

  1. Threats to autonomous vehicles. Self-driving cars and trucks rely on a complex network of sensors, AI algorithms, and communication networks, making them vulnerable to cyber physical attacks. Sensor spoofing, exploitation of vehicle-to-vehicle and vehicle-to-infrastructure connections, and hostile interference with AI decision-making systems are among the most significant risks.

    In 2023, researchers proved the potential to disrupt an autonomous vehicle's driving capabilities by pasting stickers on traffic signs. This type of fraud (or sabotage) might result in mistaken traffic signals or road conditions.

    Mitigations: Watch this expert interview about connected vehicle cyber security mitigations. In addition, this post on EV cyber security concerns and best practices may be useful.

 

  1. Threats to smart building systems. While building-based attacks are uncommon at the moment, building system attacks are poised to become a major issue. Waiting for a disaster to strike before acting is not worth it.

    Modern buildings frequently contain interconnected HVAC, lighting, access control, and elevator systems, all of which are susceptible to cyber physical attacks unless adequately secured.

    Mitigations: Cyber security professionals should first become acquainted with the intrinsic management system and its security characteristics (basics, right?).

    Professionals may then choose to implement network segmentation. Patches and updates to systems should be performed on a regular basis. Security assessments at regular periods are mandatory. Furthermore, put in place strong access controls, such as least privileged access, and keep an eye out for unusual activity.

 

  1. Threats to manufacturing facilities. Within production contexts, Industry 4.0 has increased connectivity. In this case, cyber physical attacks could disrupt manufacturing, jeopardize product quality, and/or reduce revenues. Operational changes, such as remote work adoption, have further increased the vulnerability of cyber-physical attacks in this sector.

    Mitigations: The Cybersecurity and Infrastructure Security Agency recommends creating a long-term, multifaceted cyber security strategy. Manufacturing businesses should also spend in training for both security analysts and those operating on the'shop floor'. Those who are on-site should be knowledgeable about cyber security and operations. Collaborations between production employees and security analysts should be encouraged and aligned with the organization's risk tolerance.

 

  1. Threats to healthcare devices. Cybercriminals are known to attack hospital-based IoT systems, implanted IoT systems, and personal wearable devices (such as smartwatches).

    To demonstrate the scope of implantable IoT security concerns, Dr. Sanjay Gupta, an American neurosurgeon, stated that former US Vice President Dick Cheney's heart defibrillator had to be monitored prior to implantation to avoid potential cyber-physical terrorist assaults.

    Mitigations: Because the healthcare cyber physical attack landscape is so diverse, it is difficult to outline mitigations in a single paragraph. For hospital-specific threat prevention insights

  1. Potential dangers to drone systems. The growth of commercial drones has opened the door to new types of cyber-physical attacks. We're not talking about flying pizzas that fail to land.Drone attacks might damage important national infrastructure and raise public safety concerns.

    Mitigations: Enterprises that use drones should encrypt drone communication protocols. They should also use anti-spoofing and anti-jamming technology. Beyond that, experts recommend building real-time monitoring capabilities for drone fleets, including automatic anomaly detection. These are only a few of the cyber security tactics that can be implemented.

 

  1. Threats from quantum computing. While technology isn't quite there yet, quantum computing could pose a threat to cyber-physical systems by allowing adversaries to circumvent encryption methods used for sensitive data.

    As a result, cyber criminals may acquire access to industrial control systems or other critical cyber infrastructure, which might be exploited to cause physical damage.

    Mitigations: Organizations may want to focus on employing employees who are conversant with quantum computing security. Organizations may also want to help build quantum security standards and best practices. Keep up with the latest developments in quantum technology.

 

Summary

To effectively prevent cyber-physical threats, firms must first understand their own ecosystems, which include both digital and physical assets.

Comprehensive system visibility will allow firms to prioritize risk mitigation activities, better allocate resources, and establish focused strategies to address the most significant vulnerabilities in cyber physical infrastructure.

It's also worth noting that a cyber physical security strategy should go beyond internal systems to cover third-party vendors and supply chain partners.

 

Source: CyberTalk.org