• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Endpoint Security  /  Rise of cyber-physical attacks
27 May 2019

Rise of cyber-physical attacks

Written by Seqrite
Seqrite
Cybersecurity, Endpoint Security
Estimated reading time: 3 minutes

It was back in 2012 when the then Defense Secretary of the United States warned of the possibility of the country facing a “cyber-Pearl Harbor”. He painted a bleak possibility – that extremist groups and enemy nations would use cyber tools to gain access to critical switches and disrupt transport and infrastructure.

While an attack on such a grand scale has not materialized as yet, Panetta’s warning sounds even more pertinent in this day and age of the Internet of Things (IoT). We live in the era of smart, where every device has the smart label in front of it – smart televisions, smart vehicles, smart cities, smart toasters, smart lights, etc. The boundaries between the physical and the cyber has merged and there has been a rise of cyber-physical attacks – cyber attacks which have an impact in the physical world as well.

Not a new phenomenon

Of course, perhaps the most noteworthy cyber-physical attack was the Stuxnet malicious worm, discovered in 2010. While no one has claimed responsibility, it caused substantial damage to Iran’s nuclear program, causing the nuclear centrifuges to tear themselves apart. It was believed to be created by American & Israeli cyber experts.

But in recent years, there have been examples of cyber-physical attacks at a much lower scale but with a similar likelihood of destruction. In Italy this year, some researchers travelled to various construction sites and demonstrated to workers there that they could easily take control of construction cranes remotely making them perform actions they wished. The message was clear – construction cranes are incredibly vulnerable and in the hands of a malicious group, could cause immense destruction.

Shock and awe

At a grander scale, power grids in Ukraine were successfully targeted in December 2015 and the consequences were severe. Electricity supply was disrupted and more than 230 thousand people were left without power for one to six hours. In Germany in 2014, a cyber attack caused massive damage at a blast furnace in a German steel mill when attackers gained access to control systems, which led to parts of the plant failing and the blast furnace being damaged.

It’s quite clear then that enterprises also must take note of this growing and troubling trend of cyber-physical attacks and take the necessary steps required to secure themselves against this growing threat. Some of the ways they can do that is through:

  • Plug the gaps – Most cyber-physical attacks happen due to gaps in the enterprise’s network security. Enterprises must constantly keep monitoring their security perimeters and step in to plug those gaps as soon as possible.
  • Understand your environment – It is important for organizations to have an ear to the ground regarding the industry they operate in and what are the new threats. Staying aware of the new trends and vulnerabilities will ensure that they can react and respond to threats as soon as they emerge.
  • Create a culture of security – It is incumbent on enterprises to create a security-first approach in their organization. This includes training employees on the importance of cybersecurity, ensuring that there are strict policies regarding cybersecurity with compliance to it.
  • Include physical security with cybersecurity – As mentioned earlier, the boundaries between the physical and digital worlds are converging and enterprises must be secure in both the worlds. Physical security is also paramount in this regard with strict rules against tailgating, secure access control systems and proper storage of confidential information.
  • Use a secure cybersecurity solution – A strong cybersecurity solution will allow enterprises to secure their defenses along with monitoring their network activity. Enterprises can consider Seqrite’s Endpoint Security (EPS) which is a simple and innovative platform integrating advanced technologies to protect the network.

 Previous PostCVE-2019-11815: Experts discovered a privilege escalation vulnera...
Next Post  APT-27 like Newcore RAT, Virut exploiting MySQL for targeted atta...
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Turn the Page Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Building a holistic cybersecurity strategy to safeguard the pharma sector

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021
  • Data breach volumes worry governments and businesses

    The Data breach inferno burning big-ticket businesses

    February 5, 2021

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • Are we prepared against risks generating from the IoT revolution? Are we prepared against risks generating from the IoT revolution? January 15, 2021
  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.