{"id":22861,"date":"2018-06-22T06:50:30","date_gmt":"2018-06-22T10:50:30","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=22861"},"modified":"2019-11-15T06:35:48","modified_gmt":"2019-11-15T11:35:48","slug":"ics-report-2018","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/ics-report-2018\/22861\/","title":{"rendered":"Conventional malware in industrial environments"},"content":{"rendered":"<p>There have been some stories about the kind of network air-gapping ordinary folks might see in spy movies or \u201cMr. Robot,\u201d the point being that systems that have never been exposed to the Internet cannot have been compromised.<\/p>\n<p>However, the \u201cair-gap\u201d concept isn\u2019t the magic bullet it was once widely thought to be \u2014 but perhaps not for the reasons you might expect. According to our latest <a href=\"https:\/\/ics.kaspersky.com\/the-state-of-industrial-cybersecurity-2018\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_ics-report-2018_organic&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_link_blog_ics-report-2018\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Industrial Control Systems survey<\/a>, 90% of companies use wireless connectivity in their ICS environments \u2014 environments designed with the assumption that they would be used internally. But wireless connectivity increases the exposure of those industrial networks to the Internet \u2014 and to tons of malware intended to attack common computers.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/06\/22064318\/ics-report-2018-infographic-1.png\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/06\/22064318\/ics-report-2018-infographic-1.png\" alt=\"90% of companies use wireless connectivity in their ICS environments\" width=\"1460\" height=\"520\" class=\"aligncenter size-full wp-image-22866\"><\/a><\/p>\n<p>As a result, more than 40% of industrial companies registered at least one cybersecurity incident with operational technology, ICS or control system networks in the past 12 months. And almost two-thirds of them say that the cause of those incidents was conventional malware outbreaks. At least, those are results of the abovementioned survey, called \u201cThe state of industrial cybersecurity 2018.\u201d<\/p>\n<p>Of course, increased connectivity is only part of the problem. Consider the <a href=\"https:\/\/www.forbes.com\/sites\/gauravsharma\/2018\/06\/11\/major-u-s-refineries-at-risk-of-cyber-attacks-as-many-continue-to-use-windows-xp\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Forbes journalist<\/a> who said he found 10 facilities working in the gas and oil industries using control systems that relied on outdated operating software. And knowing how conservative those industries tend to be about changing their software or processes in any way, we think it\u2019s safe to say far more than 10 of them aren\u2019t up to date.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/06\/22064330\/ics-report-2018-infographic-2.png\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/06\/22064330\/ics-report-2018-infographic-2.png\" alt=\"More than 40% of industrial companies registered at least one cybersecurity incident with operational technology, ICS or control system networks in the past 12 months\" width=\"1460\" height=\"561\" class=\"aligncenter size-full wp-image-22867\"><\/a><\/p>\n<p>Another part of the problem may be in the way they implement protective measures. Most of them use traditional antimalware and antivirus solutions in their office networks, but not in industrial ones. That\u2019s understandable; they are afraid antimalware solutions would interfere with technological processes and cause more problems than they could possibly solve.<\/p>\n<p>However, that does not explain another finding of our survey: Only 56% of companies implemented network monitoring and log analysis instruments for OT\/ICS purposes. And 28% do not even understand the concept of performing regular <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/vulnerability\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerability <\/a>scanning.<\/p>\n<p>Learn more about the results of the survey in our report, \u201c<a href=\"https:\/\/ics.kaspersky.com\/the-state-of-industrial-cybersecurity-2018\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_ics-report-2018_organic&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_link_blog_ics-report-2018\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">The state of industrial cybersecurity 2018<\/a>.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Targeted attacks are dangerous, but that doesn\u2019t mean you should forget about threats that are more common.<\/p>\n","protected":false},"author":700,"featured_media":22863,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052,2683],"tags":[1713,2485,614,119],"class_list":{"0":"post-22861","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"category-threats","10":"tag-ics","11":"tag-industrial-cybersecurity","12":"tag-report","13":"tag-survey"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ics-report-2018\/22861\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ics-report-2018\/13540\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ics-report-2018\/11307\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ics-report-2018\/15611\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ics-report-2018\/13865\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ics-report-2018\/9321\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/ics-report-2018\/9730\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ics-report-2018\/20662\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ics-report-2018\/20488\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ics-report-2018\/20475\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ics\/","name":"ICS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22861"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22861\/revisions"}],"predecessor-version":[{"id":29700,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22861\/revisions\/29700"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22863"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}