By Richard Springer, Director of Marketing, OT Solutions, Fortinet
When controls for physical equipment connect to enterprise computer networks and the cloud, the digital attack surface expands, allowing cyberattackers to penetrate industrial organizations in new ways. As a result, the process of digital transformation (DX) increases cyberthreat vectors through the interconnection with IT and the addition of cloud-based Industrial Internet of Things (IIoT).
This means that industrial breaches — by either attacking IT systems in the operational technology (OT) network or targeting OT-specific devices — are more frequent, with bad actors aggressively scouting their next targets.
IBM Security X-Force reports a 2,204% increase in reconnaissance against OT. Manufacturers have been a particularly enticing target, with a full 75% of all ransomware attacks in the first quarter of 2022 targeting the manufacturing sector. Future attacks are expected to continue the disruption by incorporating “OT kill” processes into new strains of ransomware. Learn more by downloading our white paper, “A Solution Guide to Operational Technology Cybersecurity,” at fortinet.com/ot.
The fact is there are no safe havens — today’s targets (and threats) are global in scope. And while motivation for attacks varies from monetary to political and everything in between, the result is nearly always crippling for the affected organization. Let’s examine some real examples.
Supplier Breach Shuts Down Toyota Plant Operations
Kojima Industries is a key Toyota parts supplier, providing parts for seats and other vehicle components. When Kojima was hit by a cyberattack in March 2022, it forced Toyota to shut down 28 production lines at 14 of its Japanese plants.
The attack is thought to be the result of Emotet malware, possibly entering the Kojima system using authentication information stolen from infected devices of Toyota employees. The virus — and a threatening message — were discovered through a file server error and confirmed after a server reboot.
An ominous fact is that 80% of Kojima’s staff had undergone in-house training on information security.