Honeywell, a leading technology company, released first-of-its-kind research showing that removable USB media devices such as flash drives pose a significant, and intentional, cybersecurity threat to a wide array of industrial process control networks.

Data derived from Honeywell technology used to scan and control USB devices at 50 customer locations showed that nearly half (44 per cent) detected and blocked at least one file with a security issue, said the report.

It also revealed that 26 per cent of the detected threats were capable of significant disruption by causing operators to lose visibility or control of their operations, it said.

The threats targeted a wide variety of industrial sites, including refineries, chemical plants and pulp-and-paper manufacturers around the world, and the threats themselves ranged in severity.

About one in six targeted industrial control systems or Internet of Things (IoT) devices.

The research, which is presented in the Honeywell Industrial USB Threat Report, recommends that operators combine people training, process changes, and technical solutions to reduce the risk of USB threats across industrial facilities.

Eric Knapp, director of strategic innovation, Honeywell Industrial Cyber Security, said: “The data showed much more serious threats than we expected, and taken together, the results indicate that a number of these threats were targeted and intentional.”

“This research confirms what we have suspected for years – USB threats are real for industrial operators. What is surprising is the scope and severity of the threats, many of which can lead to serious and dangerous situations at sites that handle industrial processes,” he added.

The research marks the first commercial report to focus exclusively on USB security in industrial control environments.

It examined data collected from Honeywell’s Secure Media Exchange (SMX) technology, which is specifically designed to scan and control removable media, including USB drives.

Among the threats detected were high-profile, well-known issues such as Triton and Mirai, as well as variants of Stuxnet, an attack type previously leveraged by nation-states to disrupt industrial operations.

In comparative tests, up to 11 per cent of the threats discovered were not reliably detected by more traditional anti-malware technology.

Knapp said: “Customers already know these threats exist, but many believe they aren’t the targets of these high-profile attacks.”

“This data shows otherwise, and underscores the need for advanced systems to detect these threats,” he added.

© Copyright 2014 www.tradearabia.com

Copyright 2018 Al Hilal Publishing and Marketing Group Provided by SyndiGate Media Inc. (Syndigate.info).

Disclaimer: The content of this article is syndicated or provided to this website from an external third party provider. We are not responsible for, and do not control, such external websites, entities, applications or media publishers. The body of the text is provided on an “as is” and “as available” basis and has not been edited in any way. Neither we nor our affiliates guarantee the accuracy of or endorse the views or opinions expressed in this article. Read our full disclaimer policy here.