WIT Press


RANSOMWARE IN INDUSTRIAL CONTROL SYSTEMS. WHAT COMES AFTER WANNACRY AND PETYA GLOBAL ATTACKS?

Price

Free (open access)

Volume

174

Pages

6

Page Range

329 - 334

Published

2018

Size

506 kb

Paper DOI

10.2495/SAFE170301

Copyright

WIT Press

Author(s)

MARCELO AYRES BRANQUINHO

Abstract

The cyber security of critical global infrastructures was tested last May 12nd with the global attack via Wannacry, a technically simple Ransomware that used an old Windows operating system vulnerability to propagate. Although it was an important attack and with serious consequences, it was an attack that could be restrained with the use of basic countermeasures like the simple update of the Windows operating system. This paper aims to detail the serious consequences of a Ransomware infection in critical infrastructure Industrial Control Systems networks. The work was developed based on the good practices of ANSI / ISA-99 (current IEC 62443) and aims to raise the awareness of global companies regarding the immediate need for investments in cyber security in industrial networks. To illustrate the consequences of a Ransomware attack on industrial control systems, case studies of two attacks on Brazilian industrial control systems were listed. The first attack occurred in a furniture factory and the second in a control center of a major power utility. In both cases this study detailed the type of Malware used, the consequences of the attack, financial losses and countermeasures made to return to operation. The conclusion of the work sparks reflection on what is to come after the Wannacry and Petya global attacks, mentioning the new ones that are being developed at this time, and what impact should be expected if these new attacks hit critical infrastructure networks with low level of cyber security implemented.

Keywords

ransomware, security, malware, attacks