Cyber security: Trusting your source for drivers, software tools

Some of the most published cyber security events have been traced back to malicious content embedded on a trusted user's laptop through an e-mail or downloaded document. Is your process control network safe?

06/24/2014


Its two o’clock in the morning and the control system is down. Production has stopped. An automation technician has just arrived. He is reviewing the system status as we read this post. He finds the issue in a few minutes. He knows the solution, but needs to reload the controller. Unfortunately, he finds that this new laptop does not have the right drivers. He is stuck. He goes to the manufacturer’s website to get the new drivers, but since its 2:00 a.m., the website is “under maintenance.” He feels intense pressure to get the plant up and running. He scours the web for the driver and finally finds it at a “divers.ru” website. A warning pops up in his browser saying that the file might not be safe. But the shift manager is on his shoulder. So he ignores the warning and downloads the driver. He successfully loads the controller, and he is a hero for getting the plant online.

However, three weeks later there are some strange controller failures. Resetting seems to work, but every time it stops production. The accounting department is concerned that there are strange invoices that have been automatically paid. IT has reported that internet traffic is actually peaking between 4:00 a.m. and 5:00 a.m. No one even thinks how this could be related to a controller reload just weeks before.

Some of the most published cyber security events have been traced to inadvertent infection of a process control network through a trusted user’s laptop. While the above example gave clear warning that the driver might have malicious content, in many real world examples the malicious content was embedded in an emailed or downloaded picture, a PDF file, or an executable utility.

Often these infected items are found in “water holes.” These “water holes” are places professionals frequent for information and tools. I am sure you have some of your favorite websites. Those who wish to exploit you network also know these are favorite spots. Unfortunately in many cases these sites are poorly monitored or configured, and can easily be exploited to host malicious software.

We all know what to do when everything is okay, but when the plant is down do we always choose the safest path? A good system anticipates the need for drivers, backups, and tools so that they can be found from trusted sources.

So have you discussed with you contractors and technicians where they get drivers, and software tools? If not, you might find the “watering hole” to not be such a comforting place.

This post was written by Bruce Billedeaux. Bruce is a senior consultant at MAVERICK Technologies, a leading automation solutions provider offering industrial automation, strategic manufacturing, and enterprise integration services for the process industries. MAVERICK delivers expertise and consulting in a wide variety of areas including industrial automation controls, distributed control systems, manufacturing execution systems, operational strategy, business process optimization and more.



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Salary and career survey: Benchmarks and advice; Designing controls; Remote data collection, historians; Control valve advances; Hannover Messe; Control Engineering International
System integration: Best practices and technologies to help; Virtualization virtues; Cyber security advice; Motor system efficiency, savings; Product exclusives; Road to Hannover
Collaborative robotics: How to improve safety, return on investment; Industrial Internet of Things, Industrie 4.0: World views; High-performance HMI, Information Integration: OPC and OMG
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.
PLCs, robots, and the quest for a single controller; how OEE is key to automation solutions.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Getting to the bottom of subsea repairs: Older pipelines need more attention, and operators need a repair strategy; OTC preview; Offshore production difficult - and crucial
Digital oilfields: Integrated HMI/SCADA systems enable smarter data acquisition; Real-world impact of simulation; Electric actuator technology prospers in production fields
Special report: U.S. natural gas; LNG transport technologies evolve to meet market demand; Understanding new methane regulations; Predictive maintenance for gas pipeline compressors
click me