首页> 外文会议>International conference on safety and security engineering >RANSOMWARE IN INDUSTRIAL CONTROL SYSTEMS. WHAT COMES AFTER WANNACRY AND PETYA GLOBAL ATTACKS?
【24h】

RANSOMWARE IN INDUSTRIAL CONTROL SYSTEMS. WHAT COMES AFTER WANNACRY AND PETYA GLOBAL ATTACKS?

机译:工业控制系统中的RANSOMWARE。 WANNACRY和PETYA全球攻击后会发生什么?

获取原文

摘要

The cyber security of critical global infrastructures was tested last May 12nd with the global attack via Wannacry, a technically simple Ransomware that used an old Windows operating system vulnerability to propagate. Although it was an important attack and with serious consequences, it was an attack that could be restrained with the use of basic countermeasures like the simple update of the Windows operating system. This paper aims to detail the serious consequences of a Ransomware infection in critical infrastructure Industrial Control Systems networks. The work was developed based on the good practices of ANSI / ISA-99 (current IEC 62443) and aims to raise the awareness of global companies regarding the immediate need for investments in cyber security in industrial networks. To illustrate the consequences of a Ransomware attack on industrial control systems, case studies of two attacks on Brazilian industrial control systems were listed. The first attack occurred in a furniture factory and the second in a control center of a major power utility. In both cases this study detailed the type of Malware used, the consequences of the attack, financial losses and countermeasures made to return to operation. The conclusion of the work sparks reflection on what is to come after the Wannacry and Petya global attacks, mentioning the new ones that are being developed at this time, and what impact should be expected if these new attacks hit critical infrastructure networks with low level of cyber security implemented.
机译:去年5月12日,通过Wannacry进行了全球性攻击,对全球关键基础设施的网络安全进行了测试,Wannacry是一种技术上简单的勒索软件,它使用一个旧的Windows操作系统漏洞进行传播。尽管这是一次重要的攻击并带来了严重的后果,但可以通过使用基本对策(例如Windows操作系统的简单更新)来抑制这种攻击。本文旨在详细介绍勒索软件感染在关键基础设施工业控制系统网络中的严重后果。这项工作是根据ANSI / ISA-99(现行IEC 62443)的良好实践开发的,旨在提高全球公司对工业网络安全方面的迫切需求的认识。为了说明勒索软件对工业控制系统的攻击的后果,列举了两次对巴西工业控制系统的攻击的案例研究。第一次袭击发生在一家家具厂,第二次袭击发生在一家大型电力公司的控制中心。在这两种情况下,本研究都详细说明了所使用的恶意软件的类型,攻击的后果,经济损失以及为恢复运营所采取的对策。这项工作的结论引发了对Wannacry和Petya全球攻击后的思考,提到了此时正在开发的新攻击,以及如果这些新攻击以低级别的关键基础设施网络攻击,将会产生什么样的影响?实施网络安全。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号