TechBizWebTechBizWeb

    Subscribe to Updates

    Get the latest news about Technology and Business from all around the web..

    What's Hot

    Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

    November 7, 2022

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022
    Facebook Twitter Instagram
    • About Us
    • Privacy Policy
    • Guest Post
    • Terms
    • Contact
    Facebook Twitter Instagram
    TechBizWebTechBizWeb
    Subscribe
    • Home
    • Technology

      Amazon says it has ‘hundreds’ of Rivian electric vans making deliveries in the US

      November 7, 2022

      Devialet brings its sci-fi design aesthetics to a $790 portable speaker

      November 7, 2022

      Elon Musk’s response to fake verified Elon Twitter accounts: a new permanent ban policy for impersonation

      November 7, 2022

      The iPhone 14 Pro and Pro Max will come with ‘longer wait times’ due to factory lockdown

      November 6, 2022

      Meta’s reportedly planning to lay off ‘thousands’ of workers this week

      November 6, 2022
    • Business
    • Cyber Security
      National Security News

      List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

      September 24, 2022

      Cybersecurity ranked most serious enterprise risk in 2022

      August 31, 2022

      Registration open for CISA virtual summit on K-12 school safety

      August 31, 2022

      What do the Trickbot leaks reveal about Russian cybercrime?

      August 31, 2022

      What cybersecurity measures do CISOs outsource?

      August 30, 2022
    • Blockchain
    • Vulnerabilities
    • Social Engineering
    • Malware
    • Cyber Security Alerts
    TechBizWebTechBizWeb
    Home»Cyber Security»How Radio Frequency Technology is Putting the Industrial Sector at Risk –
    Cyber Security

    How Radio Frequency Technology is Putting the Industrial Sector at Risk –

    March 19, 2019Updated:March 19, 2019No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Each industry has its own unique security risks. The banking and health care sectors, for example, deal with some considerably sensitive financial and client data, and therefore must put robust protections in place to ensure its safety.

    The industrial sector, however, is a bit different. For many years, security-conscious experts focused on other industries, but now that connected devices and intelligent technology are in place within industrial settings to support a wide array of machinery and tasks, new data protection risks are emerging that deserve attention.

    Leaders of industrial organizations must understand that the devices and systems employees leverage to control processes like construction, manufacturing, mining and logistics could open their business up to specific vulnerabilities. One such device is the radio frequency controller used to direct machinery. While these may appear to be simple endpoints similar to consumer-level garage door remote openers, these RF controllers could provide the perfect entryway for malicious activity.

    RF controllers: Uses abound

    Those working within the industrial sector are no doubt familiar with all the different potential ways in which RF controllers – including small, handheld models and belt-pack styles controllers with buttons and joysticks – are used:

    • Within construction activity, controllers can be used to operate cranes and other large machinery.
    • RF remotes are used in the mining sector to control drills and pumps.
    • In shipping and logistics, RF controls are used for trolleys and cranes to enable the movement of sizeable shipment loads across different modes of transportation.
    • In manufacturing settings, they can control robotic fabrication machinery, conveyor belts and more.

    Some RF controllers enable machines to be turned on an operated, others enable emergency stop features, and some more advanced models are capable of all of the above. As large-scale, intelligent robotics become increasingly prevalent across the industrial sector, RF controllers are more widely distributed to support machinery systems.

    Where the risk comes in

    Although RF controllers are typically more basic endpoints compared with elements like smartphones or software dashboards, this hardware can still introduce considerable risk. According to new research from Trend Micro, these issues appear due to several different facts involving RF controller use:

    • Because these endpoints use radio frequency to support operation, as opposed to wireless or other standard connections, it’s easier for malicious actors to break into these systems and take control.
    • RF protocols used to enable the controllers are often proprietary, and several decades old. These outdated modes create further risks.
    • Often, RF remotes are used for much longer than their intended lifespan due to the cost to replace or upgrade them.

    “The core of the problem lies in how, instead of depending on wireless, standard technologies, these industrial remote controllers rely on proprietary RF protocols, which are decades old and are primarily focused on safety at the expense of security,” Trend Micro researchers explained. “In our research and vulnerability discoveries, we found that weaknesses in the controllers can be (easily) taken advantage of to move full-sized machines such as cranes used in construction sites and factories.”

    In addition to taking over operation of an industrial machine or system, this lack of security within the RF controls can even enable a malicious actor to override onboard emergency stop capabilities, and switch a machine back on.

    Millions of RF controllers are at risk of attach.

    How malicious actors could potentially leverage RF controller weaknesses

    As Trend Micro pointed out in its report, A Security Analysis of Radio Remote Controllers for Industrial Applications, there are several different types of attacks that are possible through vulnerable, industrial-level RF controllers.

    One of the first and most obvious issues involves sabotage, either to support extortion or other malicious pursuits. A sabotage attack may involve using an RF controller to damage or destroy machinery or products or cause delays in production. As researchers noted, even short delays can lead to considerable costs, and can affect not only the business that owns the machinery systems but also its partners across the supply chain.

    Other attacks may be less focused on destruction and more centered around theft. RF controllers used within the logistics industry, for example, can be used by attackers to enable the theft of goods within shipping containers on barges.

    “Even traditional harbors and logistics facilities are filled with radio-controlled lifting and handling machines to move containers and loads,” Trend Micro’s report stated. “Attackers can interfere with the lifting operations to facilitate theft or hijacking of in-transit goods.”

    Attackers could also potentially carry out damaging extortion plans, supported by weak RF controllers. Similar to a ransomware attack, where strong encryption is utilized to lock users out of data and files until a digital ransom is paid, attackers could prevent industrial employees from using a machine or simulate a malfunction, ceasing regular operations until the business pays a ransom.

    Overall, these are just general types of attacks, and only scratch the surface when it comes to the malicious potential of targeting RF controller vulnerabilities. Attackers could also carry out such actions as preventing emergency stop capabilities to cause damage, maliciously re-pairing the device so that it does not control the intended device, or reprogramming it to malfunction. As noted, such instances could have far-reaching consequences.

    How pervasive is this issue?

    Researchers discovered that while preventive safety features including specific codes to support device pairing, password protection and virtual fencing can help prevent an attack, these capabilities cannot stop malicious activity that’s already taking place.

    In addition to this issue, of the seven RF remote controller vendors Trend Micro analyzed for its report, none utilized the proper security measures. Reporting on Trend Micro’s findings, ComputerWeekly security editor Warwick Ashford pointed out that this means that literally millions of RF controllers are currently at risk of attack, utilized within industrial sectors across the globe.

    How to address RF controller vulnerabilities

    As Trend Micro noted, one of the main purposes of its report is to raise awareness of this issue among vendors that provide RF controllers. These manufacturers must work to establish and support the proper security features on new devices, and to design and provide the necessary firmware updates to help eliminate existing vulnerabilities. What’s more, researchers urge more vendors to adopt protocols like Bluetooth Low Energy, which includes built-in security functions.

    RF controller users can also do their part by understanding the basics of the remotes, including reading the manual to ensure devices can handle pairing codes. In addition, these codes should be changed from default factory settings and updated on a regular basis. It’s also important for industrial businesses to consider next-generation devices, when possible, that include infrared communications as well as RF, and those that use standard wireless technologies as opposed to “custom” wireless.

    To find out more, check out Trend Micro’s report today.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    National Security News

    List of 620 Russian spies, featuring one alleged agent at the centre of one of the biggest personal scandals in Wall Street history.

    September 24, 2022 Cyber Security

    Cybersecurity ranked most serious enterprise risk in 2022

    August 31, 2022 Cyber Security

    Registration open for CISA virtual summit on K-12 school safety

    August 31, 2022 Cyber Security

    What do the Trickbot leaks reveal about Russian cybercrime?

    August 31, 2022 Cyber Security

    What cybersecurity measures do CISOs outsource?

    August 30, 2022 Cyber Security

    SIA announces Women in Security Forum scholarship recipients

    August 30, 2022 Cyber Security
    Editors Picks

    Ryanair swings to first-half profit and raises passenger forecast

    November 7, 2022

    Devialet brings its sci-fi design aesthetics to a $790 portable speaker

    November 7, 2022

    Google Cloud Says Running Validator on Solana Blockchain

    November 7, 2022

    European stocks rise as investors boosted by China speculation

    November 7, 2022
    Trending Now

    Evergrande creditors sell ‘Versailles mansion’ plot in Hong Kong

    By techbizweb

    OpenSea Creates Tool for NFT Creators to Enforce Royalties On-Chain

    By techbizweb

    FTSE chairs warn of declining relations with institutional investors

    By techbizweb

    https://www.nationalsportsacademy.com

    slot gacor hari ini

    http://www.inadesfo.org/

    http://www.eueomgbissau.org/

    http://www.congo-mai-mai.net/

    http://www.angelesdelafrontera.org/

    http://fifaworldcup2018schedule.com/

    http://tony4gtrmcr.co.uk/

    http://www.standrewsagreement.org/

    http://www.bob-russell.co.uk/

    http://davidmulholland.co.uk/

    http://railwayhotelenniskillen.com/

    http://www.fantasysportstrades.com/

    http://www.rainleaf-flooring.com

    http://mothersagainstguns.org/

    http://ma-coc.org/

    slot online

    http://www.paradoxmag.com/situs-judi-slot-online-gampang-menang-2021/

    http://www.paradoxmag.com/situs-judi-slot-online-terbaru-2021/

    http://slot-terbaru.net/

    Slot Gacor

    Slot Online

    Situs Slot Gacor

    http://www.appdexterity.com/

    https://cars4kids-deutschland.de/

    https://www.stretchingculture.com/

    https://www.b-123-hp.com/slot-gacor/

    https://denzstaffing.nl/

    https://ezbbqcooking.com/slot-gacor/

    https://www.mbahelp24.com/slot-gacor

    https://minhtanstore.com/slot-jackpot-terbesar/

    https://njbpusupplierdiversity.com/slot-gacor-gampang-menang/

    https://www.floridaspecialtycropfoundation.org/slot-gampang-menang/

    https://childrenscornerpreschool.org/slot-gacor-gampang-menang/

    https://cryptoquoter.com/slot-online-terbaik/

    https://alorkantho24.com/slot-gacor/

    https://ellas.xyz/slot-gacor/

    https://it.dougamatome.xyz/slot-online/

    https://www.daltercume.com/slot-gacor/

    https://josi-ana.dougamatome.xyz/slot88/

    https://josi-ana.dougamatome.xyz/slot-gacor/

    https://fastobserver.com/slot-jackpot-terbesar/

    https://www.planetexperts.com/slot-gacor/

    https://bfsolution.group/slot-bet-kecil/

    https://rustleva.co/slot/

    https://bfsolution.group/slot-bet-kecil/

    https://www.hotelcalimareal.com/togel-online/

    https://anime-game.dougamatome.xyz/slot-gacor-gampang-menang/

    https://anime-game.dougamatome.xyz/togel-online/

    https://bourbonbarrelfoods.com/slot/

    http://suneo39.wp.xdomain.jp/slot/

    https://techbizweb.com/slot-gacor/

    https://www.generalcatalyst.com/18-daftar-slot-gacor-terbaik-gampang-menang-jackpot-hari-ini/

    https://www.hotelcalimareal.com/slot-online/

    https://www.blockgates.io/slot-gacor/

    https://l12.com.br/slot-gacor/

    slot paling gacor

    https://www.donalds-hobby.com/slot-online/

    https://thecryptodirt.com/slot-gacor-hari-ini/

    http://iseta.edu.ar/aulavirtual/app/upload/users/1/1205/my_files/sbobet.html

    http://escuelavirtual.mincit.gov.co/app/upload/users/1/194/my_files/slot.html

    https://www.dev.medecinesfax.org/courses/JUDICASINO/document/slot.html

    http://www.e-archivos.org/cursos/courses/JUDICASINO/document/slot-gacor.html

    http://iesma.com.br/ead/main/upload/users/4/447/my_files/slot.html

    https://www.fundacoop.org/chamilo/app/upload/users/1/1185/my_files/slot.html

    https://fata-aatf.org/eskola/main/upload/users/3/31/my_files/slot.html

    https://uancv.edu.pe/ofinvestigacion/app/upload/users/3/328/my_files/slot-terlengkap.html

    https://micost.edu.my/EL/app/upload/users/2/209/my_files/slot-gacor.html

    https://www.academiacoderdojo.ro/elearningdev/app/upload/users/2/2442/my_files/slot-online.html

    http://campus-cidci.ulg.ac.be/courses/JUDICASINO/document/slot-termurah.html

    https://www.escueladerobotica.misiones.gob.ar/aula-ste/courses/LIVECASINO/document/slot-tergacor.html

    http://ccdipeepccqqfar.usac.edu.gt/chamilo/app/upload/users/3/358/my_files/slot-online.html

    https://cunori.edu.gt/campus/app/upload/users/7/7334/my_files/slot-online.html

    http://u-rus.com.ar/aula/app/upload/users/1/1322/my_files/slot.html

    http://icrodarisoveria.edu.it/chamilo/app/upload/users/1/1855/my_files/slot.html

    https://iestpliliagutierrez.edu.pe/clarolgm/courses/CASINO/document/slot.html

    http://pva.cobach.edu.mx/app/upload/users/7/7379/my_files/slot.html

    http://www.imb-pc-online.edu.gt/PL/app/upload/users/3/373/my_files/slot.html

    http://avcs.upeu.edu.pe/main/upload/users/3333/my_files/slot.html

    https://chamilo.fca.uas.edu.mx/app/upload/users/1/11186/my_files/slot-online/

    TechBizWeb
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • Guest Post
    • About Us
    • Privacy Policy
    • Our Authors
    • Terms and Conditions
    • Contact
    © 2023 Tech Biz Web. Developed by Sawah Dev.

    Type above and press Enter to search. Press Esc to cancel.