theDocumentId => 1132852 Global Critical Infrastructure Networks Regularly ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:39 PM
Connect Directly

Global Critical Infrastructure Networks Regularly Under Attack

New report from the Center for Strategic and International Studies finds it's not a matter of when energy, telecom, and other networks will be attacked -- but how often

Critical infrastructures worldwide -- everything from oil and gas, electrical, and telecommunications -- are under constant attack, and mainly from foreign nation-states, according to a new report published today by The Center for Strategic and International Studies and commissioned by McAfee.

The report, based on surveys of 600 IT and security executives from these firms worldwide, says these highly sensitive networks are being hit by distributed denial-of-service (DDoS) attacks, malware, and targeted attacks, including advanced persistent threat-style ones. Among the findings: The cost of downtime incurred from an attack is more than $6 million a day, and up to $8 million a day for the oil and gas industries. More than one-third of the execs in all sectors say the threat is growing, and two-fifths expect a major attack in their industry within the next year.

Oil and gas executives suffered the highest rate of stealthy targeted attacks, with 71 percent. Around 54 percent of all respondents had suffered these types of attacks, and more than one-third say they experience multiple infiltrations each month. The findings from the CSIS-McAfee "In the Crossfire: Critical Infrastructure in the Age of Cyberwar" report come in the wake of revelations that the oil industry, including Marathon Oil, ExxonMobil, and ConocoPhillips, reportedly were hit with a wave of targeted attacks in 2008.

Around 54 percent of the respondents say their companies had been hit by a "large-scale denial of service attacks by high level adversary like organized crime, terrorists or nation-state (e.g. like in Estonia and Georgia)," according to the report. And more than half of the respondents had experienced a targeted, stealthy attack akin to the attacks Google, Adobe, and nearly 30 other companies suffered recently.

Nearly 60 percent say critical infrastructures in their countries had been targeted by "representatives" of foreign governments.

The report demonstrates that the actual attacks on critical infrastructure networks worldwide "is as bad as we thought," says Phyllis Schneck, vice president and director of threat intelligence for the Americas at McAfee. "A big takeaway here is this is a giant step toward global engagement on critical infrastructure protection ... helping us incentivize and motivate the private sector to protect these networks."

Nearly 90 percent of the respondents' networks had been infected with malware attacks, and more than 70 percent had suffered low-level DDoS attacks and vandalism, insider threats, leakage of sensitive data, and phishing or pharming.

SQL injection and DNS poisoning attacks had occurred at 57 percent of the organizations, and half of them say these types of attacks happen on a monthly basis.

Execs worldwide aren't exactly confident of their ability to protect their networks in the future, either: Only 20 percent say their industry sector is safe from a serious attack during the next five years, and one-third say their industry sector isn't prepared to handle major attacks or APTs. Among the 80 percent of execs who work on SCADA or industrial control systems and say their networks are connected to the Internet or another IP network, more than half say this generates an "unresolved security issue."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-07-23
All versions of package gitlogplus are vulnerable to Command Injection via the main functionality, as options attributes are appended to the command to be executed without sanitization.
PUBLISHED: 2021-07-23
A stored cross site scripting (XSS) vulnerability in the /sys/attachment/uploaderServlet component of Landray EKP V12.0.9.R.20160325 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG, SHTML, or MHT file.
PUBLISHED: 2021-07-23
Arbitrary file upload vulnerability in Victor CMS v 1.0 allows attackers to execute arbitrary code via the file upload to \CMSsite-master\admin\includes\admin_add_post.php.
PUBLISHED: 2021-07-23
Cross-site scripting (XSS) vulnerability in SourceCodester E-Commerce Website v 1.0 allows remote attackers to inject arbitrary web script or HTM via the subject field to feedback_process.php.
PUBLISHED: 2021-07-23
Arbitrary file upload vulnerability in SourceCodester Responsive Ordering System v 1.0 allows attackers to execute arbitrary code via the file upload to Product_model.php.