Manufacturers bear brunt as cyber criminals innovate

Cyber criminals are becoming more and more innovative, and are increasingly automating attacks, with manufacturers the most attacked sector in the UK by some way, and the tech sector the most attacked at the global level. As widely reported, some look to gain from the ongoing COVID-19 pandemic. Despite their best efforts, many organisations are unable to stay ahead of attackers, while others are still struggling with basics such as patching old vulnerabilities.

These are among the headline findings of NTT's latest Global Threat Intelligence Report, which again confirms the pace of innovation amongst threat actors.

Attackers are investing in automation techniques, developing multi-function attack tools and using artificial intelligence and machine learning. About a fifth of attacks globally were in the form of a vulnerability scanner.

Manufacturing regularly appears as one of the most attacked industries globally. Most commonly linked to intellectual property (IP) theft, it increasingly faces financially motivated data breaches, global supply chain risks and risks from unpatched vulnerabilities.

Manufacturing topped the list of most attacked sectors in both the UK and Hong Kong. The tech sector was next in the UK, followed by business and professional services, then government and finance.

Reconnaissance attacks accounted for half of all hostile activity in the UK and Ireland (29%), with web application the next most common form of attack (22%). Reconnaissance activity (60%) was also the most common attack type against manufacturers followed by web application attacks (36%).

NTT's Rory Duncan said: “UK manufacturing has become a major target for attackers in recent years as a result of the increased risks brought about from the convergence of IT and Operational Technology (OT). The biggest worry is that security has lagged behind in this sector, potentially exposing systems and processes to attack. Poor OT security is a legacy issue; many systems were designed with efficiency, throughput and regulatory compliance in mind rather than security. In the past, OT also relied on a form of ‘security through obscurity’. The protocols, formats and interfaces in these systems were often complex and proprietary and different from those in IT systems, so it was difficult for attackers to mount a successful attack. As more and more systems come online, hackers are innovating and see these systems as ripe for attack.

"The current global pandemic and the flow of trusted and untrusted information used to mask the activities of cyber criminals has shown us that they will take advantage of any situation."

    Share Story:

Recent Stories

Are property insurers ready for timber
The Structural Timber Association is gearing up to help all stakeholders in the construction supply chain to fully appreciate the advantages of building in timber, how to deliver such projects and most importantly to understand and manage the risks.

The changing face of BC and WAR
The working environment has changed quite dramatically for many over the last six months. With social distancing and the rise of homeworking, it is not just how businesses operate that has changed, but also how they recover. In this podcast we discuss some of the challenges created by the quick shift to home working, why the office may not have seen its last days and how the current environment can impact the ability of a business to recover.