News
News Categories

Critical infrastructure vulnerable to cybercriminals – Kaspersky Lab

By Patrick Alcantara - on 3 Mar 2017, 10:14am

Critical infrastructure vulnerable to cybercriminals – Kaspersky Lab

Kaspersky Lab, the global cybersecurity company, warns that threats against the highly important facilities can catastrophically endanger both business networks and people's lives.

Industrial and critical infrastructure serve as the backbones of a nation or state. Main sectors of these are energy, transportation, aerospace, oil and gas, chemical, automotive and manufacturing, food and beverage, government, financial and medical services.

When cybercriminals take over such ICS facilities, they can use them to effectively undermine a nation's economy, safety, peace, or all of the above. In 2015, Kaspersky Lab has unmasked the highly sophisticated Advanced Persistent Threat (APT) actor named the Equation Group, which targeted diverse industrial and ciritcal facilities.

The hacking group has been discovered to be infiltrating and spying into networks of infrastructures from more than 30 countries worldwide since 2001. 

In December of the same year, the successful malware attack using BlackEnergy malware resulted in the massive unscheduled power outage in Ukraine which left more than 230,000 residents without electricity for up to six hours. Experts from Kaspersky Lab has found out that the group had been actively trying to control ICS, energy, government, and media in Ukraine as well as ICS/SCADA companies and energy companies worldwide.

To secure ICS and critical infrastructure, Kaspersky has developed Kaspersky Industrial CyberSecurity, a specialized security solution designed to protect complex industrial environments that contain a diverse range of propriety systems. The solution provides effective at all industrial layers including SCADA servers, HMI panels, workstations, PLCs and network connections. It delivers protection in support of integrity control, intrusion prevention and detection, anti-malware and anomaly detection among others.