The report, based on surveys of 600 IT and security executives from these firms worldwide, says these highly sensitive networks are being hit by distributed denial-of-service (DDoS) attacks, malware, and targeted attacks, including advanced persistent threat-style ones. Among the findings: The cost of downtime incurred from an attack is more than $6 million a day, and up to $8 million a day for the oil and gas industries. More than one-third of the execs in all sectors say the threat is growing, and two-fifths expect a major attack in their industry within the next year.
Oil and gas executives suffered the highest rate of stealthy targeted attacks, with 71 percent. Around 54 percent of all respondents had suffered these types of attacks, and more than one-third say they experience multiple infiltrations each month. The findings from the CSIS-McAfee "In the Crossfire: Critical Infrastructure in the Age of Cyberwar" report come in the wake of revelations that the oil industry, including Marathon Oil, ExxonMobil, and ConocoPhillips, reportedly were hit with a wave of targeted attacks in 2008.
Around 54 percent of the respondents say their companies had been hit by a "large-scale denial of service attacks by high level adversary like organized crime, terrorists or nation-state (e.g. like in Estonia and Georgia)," according to the report. And more than half of the respondents had experienced a targeted, stealthy attack akin to the attacks Google, Adobe, and nearly 30 other companies suffered recently.
Nearly 60 percent say critical infrastructures in their countries had been targeted by "representatives" of foreign governments.
The report demonstrates that the actual attacks on critical infrastructure networks worldwide "is as bad as we thought," says Phyllis Schneck, vice president and director of threat intelligence for the Americas at McAfee. "A big takeaway here is this is a giant step toward global engagement on critical infrastructure protection ... helping us incentivize and motivate the private sector to protect these networks."
Nearly 90 percent of the respondents' networks had been infected with malware attacks, and more than 70 percent had suffered low-level DDoS attacks and vandalism, insider threats, leakage of sensitive data, and phishing or pharming.
SQL injection and DNS poisoning attacks had occurred at 57 percent of the organizations, and half of them say these types of attacks happen on a monthly basis.
Execs worldwide aren't exactly confident of their ability to protect their networks in the future, either: Only 20 percent say their industry sector is safe from a serious attack during the next five years, and one-third say their industry sector isn't prepared to handle major attacks or APTs. Among the 80 percent of execs who work on SCADA or industrial control systems and say their networks are connected to the Internet or another IP network, more than half say this generates an "unresolved security issue."
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.