The criminal sneaks over the network – and also scare in the middle of the pandemic before the implementation of your home-style plan. "Production plants had to be shut down due to the errreng", says steffen zimmermann. It is not possible to extinguish that the consequences of the attack maybe "until in covid-19 supply chains".
Urgency not yet everywhere
What the end of marz happened to the french pharmaceutical company pierre fabre, the head of the competence center industrial security at the mechanical engineering association vdma in frankfurt is still driving around. After a hacker attack on the factory-it, it came to delays in tightly clocked processes, also damages claims were caused. And that’s just in an industry that goes to the further occasion of the corona crisis just under full load ride.
Whether in medicine, caravans or in other industrial operations: not only the buro software on the computers of employees, but also the complex control of entire machine parks is vulnerable to cyberbuberfliffs. Still, serious forcales are in the increasingly networking "internet of things" relatively rare with digitally communicating plants, zimmermann reports – see examples such as multiple attack on thyssenkrupp. But the danger rises. Some companies have to take care of the urgency.
"It is impossible to protect themselves 100 percent", rooms the vdma expert. "Everyone can be made, as every immune system can be made by a virus. However, the increased consciousness must also lead to investments in more security." often, companies reacted only when hackers had already served their chaos and they only react. "Theme number one for the mechanical engineering industry is now the cyber security."
Weekly stoppage possible
In the case of a coarse-flat shuttering of data through ransomware, rough production companies could be completely resting four to six weeks completely. "With all follow-ups, this can take up to a three-year year – in the end, the company will not look like this as before."
If this happens in anyway tense times, the risks can still be swapped – especially in the healthcare sector. So there were reports in winter reports that north korean hackers should have tried to get information about the corona vaccine of the us group and biontech partners pfizer.
Hospasters are not immune to the digital intruders: the public prosecutor gottingen is just around an online erpreng of the hospital in lower sachsian wolfenbuttel. In the district of anhalt-bitterfeld in saxony-anhalt, after a similar action against the administration went as good as nothing more.
Inclusion come to
What can be done concrete to pravention and defense too strong? Rough insurers have already recognized the problem a long time, but now point to the faded race between software providers and criminals around the discovery of weak points and security. The most famous case of a cyber attack on industrial infrastructure is probably still the 2010 discovered stuxnet virus, which saboted facilities for uranium enrichment in iran.
The refund will come again. "For a good one and a half years, we see a steadily increasing threat situation, which has recently changed very dynamically", johannes steffl, at industrial insurers hdi global in hanover, stated in the analysis of cyber risks. "Partly this may be coronabed, because in the home office some it processes are not so well laid." but even for the "operational it" in production, the topic becomes more important: "we are talking about it, the systems and machines around the clock. Operations are still working with old systems."
In the ara of "industry 4.0" machine builder cyber security already had to remember when planted. "That will be an essential qualitative feature", so steffl. "Because when a cyberattacke is really trusting on the production of a whole industry, the damage can be considerable from a long interruption. Or even errors can occur on the products that were still manufactured after attack." in industrial circles is sometimes to horen, sometimes it also give the temptation to train the shutdown then something out – after the motto: "never change a running system."
Danger of a blackout
The harmful scattering effect also in the energy industry rough, keyword blackout danger. Here, however, the motifs are often stored differently, believes steffl. "For attacks on the electricity grid and similar conceivable actions, one has to be more important in the direction of terrorist or political goals." classic cybercriminals had reservations to land a whole country. "You are mostly disruption, not pure destruction."
So or so seems clear: industry and administration have to take the problem serious – and especially sensitive matters beyond running operation maybe offline. "We move in a world of trugger security", it is called at the lower sachsian city and community office. "In the long run, we only help us if we process important things in crazy systems."
Zimmermann, in whose association companies have fed together with a working group against network developments, the core problem sees the same: "the reciprocity is still a difficult field."