Blog-Layout

Chemical sites and IT security: Too many cooks spoil the broth

Andreas Flegel • Apr. 06, 2021

For English, please scroll to the end of this blog article
Für Englisch, scrollen Sie bitte an das Ende dieses Blogartikels

74% of all cyberattacks are directed against the chemical and pharmaceutical industries most affected by this form of crime – according to a study by the Criminological Research Institute of Niedersachsen. 

This gives food for thought due to their handling of hazardous materials as well as a corporate structure that often makes it difficult to deal with cybersecurity in a state-of-the-art and uniform manner.

 

Individual divisions – Too many IT solutions
Chemical sites and chemical parks are usually controlled and managed autonomously by the various corporate divisions or individual companies on the site. Synergies are achieved through highly efficient interaction between the various production facilities on a site or in a chemical park.

Chemicals are a capital-intensive industry, and the life cycle of production plants is therefore very long. Due to the long-life cycle and the demand for cost-efficient production, investments are handled very restrictively.

In these companies, cybersecurity, if it is an issue at all, is usually handled by a central unit, such as an additional staff position in IT.

However, the cybersecurity needs of each individual production plant are not reflected. The knowledge of what the various business units actually need is low or is not coordinated well. Each division is responsible for the operation of its chemical plants and does not have a clear view of the issue of cybersecurity.

Production control systems, some of which are up to 30 years old, are replaced from time to time, but only in part, so that IT inevitably drifts apart.

This special IT is often outdated because of the high acquisition costs, and the technology used is only tailored to the special plant and cannot be integrated. The problem is clear: because of the strong focus on costs that is often found, urgently needed modern technology is not purchased. Thus, you find software programs in these plants that can no longer be updated. This investment gap means that most companies in heavy industry are not sufficiently prepared for the increasing threats and cybercrime has an easy game. In addition, there are also organizational specifics. The door is virtually open to intruders.

 

Cybersecurity must work cross-functionally
It makes sense for business units to be responsible for cybersecurity-related issues on a chemical site themselves, as well as to work very closely with central units.

The central units are usually responsible for major IT projects on a site, e.g., setting up a 5G network as a basis for the further rollout of digitization projects.

Large enterprises such as chemical sites often experience attacks on both their IT and their OT (operational technology) systems, which, as in most companies, operate in isolation from each other. Because many systems, including critical controls, are digitized in these companies, vast amounts of data are exposed to potential manipulation that could cause catastrophic accidents in a worst-case scenario.

TIP: Security experts should be in any digitization project from the beginning. They belong in every company organization and in large industrial even more than one! We support you in structuring the tasks and work with you side by side for the security of your company.

von Radha Mehta 09 Nov., 2023
GERMAN: Die nächste Grenze der Cybersicherheit: KI und ML revolutionieren die Cybersicherheit, indem sie intelligentere Verteidigungsmaßnahmen und adaptives Lernen ermöglichen. Diese Technologien verbessern die Erkennung von Bedrohungen und die Effizienz der Reaktion. Neue Herausforderungen wie feindliche Angriffe erfordern jedoch eine Mischung aus neuen und traditionellen Sicherheitsansätzen.
von Radha Mehta 12 Okt., 2023
GERMAN: In einer Zeit, in der sich Cyber-Bedrohungen in einem noch nie dagewesenen Tempo weiterentwickeln, ist die Notwendigkeit robuster Sicherheitsmaßnahmen unübersehbar. Da Unternehmen ihren digitalen Fußabdruck immer weiter ausdehnen, wird es immer schwieriger, einen engen Sicherheitsrahmen aufrechtzuerhalten. Die Nachfrage nach zeitnahen und effektiven Penetrationstests ist gestiegen, was zur Konvergenz von maschinellem Lernen und Cybersicherheit geführt hat und eine neue Ära der automatisierten Penetrationstests einläutete.
von Ibrahim Husić & Justin Shabani 12 Sept., 2023
GERMAN: In einer zunehmend vernetzten Welt, in der unsere Abhängigkeit von digitalen Systemen stetig wächst, sind wir auch anfälliger für eine dunkle Bedrohung namens Ransomware. Diese bösartige Software hat in den letzten Jahren einen erschreckenden Aufschwung erlebt und richtet erheblichen Schaden an. In diesem Artikel werden wir uns eingehend mit der Welt der Ransomware beschäftigen, ihre Entstehung, ihre Ziele und die Motivationen hinter diesen Cyberangriffen. Die Einführung in Ransomware Ransomware ist eine Art von Schadsoftware, die entwickelt wurde, um den Zugriff auf Computersysteme oder Daten zu blockieren, bis eine Geldsumme (Lösegeld) bezahlt wird. Typischerweise verschlüsselt Ransomware die Dateien des Opfers und fordert die Zahlung in Kryptowährung für den Entschlüsselungsschlüssel. Es ist beängstigend zu wissen, dass Ransomware-Angriffe in den letzten fünf Jahren um 13% gestiegen sind, wobei der durchschnittliche Schaden pro Vorfall bei 1,85 Millionen US-Dollar liegt. Das Ziel der Angreifer: Dateien im Visier Die Ransomware versucht nicht, jede Datei auf dem infizierten System zu verschlüsseln. Stattdessen sucht sie gezielt nach bestimmten Dateitypen, die wahrscheinlich wertvolle Inhalte enthalten. Über 300 Dateierweiterungen sind im Visier, darunter 17 Arten von Mediendateien. Diese gezielte Auswahl ermöglicht es den Angreifern, den maximalen Schaden zu verursachen.
Weitere Beiträge

Let's talk.

You have questions about this article or want a consultation?

Please contact us directly!

Let's talk.
Share by: