Blog

Reducing Supply Chain Cybersecurity Risks - 12 Tips for Manufacturing Companies

Aug 25, 2022

The manufacturing sector has seen increased pressure coming from worldwide cyber security attacks halting production and shutting down factories.

It’s important in today’s environment to ensure a high level of security to reduce the risk of disruption of operations as these can have massive monetary and brand impact.

In today’s issue, we’ll take a look at:

  • The 3 common types of cyber attacks in manufacturing.

  • Two case studies showcasing ransomware attacks in the industrial sector (i.e. hydraulic and defence)

  • 12 Practical tips on how to best protect your manufacturing business.

  • More resources to up your organization's cyber security skills

Cyber attacks can halt whole production: image source 

If you are a manager, an individual contributor to your supply chain or an executive worried about the possibility of a cyber attack, this post is for you!

3 Common Types of Cyber Attacks in Manufacturing

There are a few types of cyber security attacks that can cripple your supply chain that you should be aware of. Here are the 3 most common ones that you might have heard recently in the news targeting manufacturing companies.

Ransomware

Ransomware is a type of malware that stops users from accessing files or systems by encrypting them. 

The victim then pays the demanded ransom to the attacker, the attacker then provides the decryption key, which is then used to release/decrypt the files or systems.


These malware or malicious code are usually delivered through an email attachment, which when downloaded executes the malicious code and encrypts the files until the ransom is paid (which is not guaranteed).

Ryuk ransomware message

This type of attack is especially prominent in industries that need to constantly exchange information with partners. This is the case in manufacturing as usually more than 50% of the production is outsourced.

Phishing

Phishing emails are a social engineering technique for manipulating users so they give up confidential information.

Usually, these types of emails are based on principles like urgency (Eg, “The offer lasts only for an hour, hurry up and click the link) or authority (Eg, the Legal department asks for your date of birth, SIN…).

example phishing email

With most of the emails of your employee being available in lists that can be bought online this is a threat that can only be curved with proper employee discipline and security hygiene (more on this in later sections).

Credential stuffing

Credential stuffing is a kind of password brute force attack where the attacker attempts to obtain access to an account by using a list of commonly used usernames and passwords.

This log-in information list is generally collected from data breaches or stolen via phishing scams.

Diagram of a credential stuffing attack

Having a good enforceable security policy and password rotation schedule helps a lot for this kind of attack. More tips on how to set such a policy in a later section.

Let’s take a look at two case studies showcasing how Ransomware impacted two manufacturing companies in real life.

Case Study 1: 35 Worldwide Location of a Manufacturing Company Under Ransomware

Incident: At the end of January 2021, almost 35 worldwide locations of Palfinger were under a ransomware attack. Shortly after the attack came to light, the company shares, which had been listed on Vienna Stock since 1999, dropped by approximately 4%.

The company operations like email communication systems, ERP systems, etc. were stagnant for around ten days.

The company had to pay ransom to free itself from the attack, but the ransom amount paid wasn’t disclosed. The attack was not traced as it originated from the Darknet.

About the company: It is an Austrian company that manufactures hydraulic handling machines like loader cranes, tail lifts, marine cranes, etc.


Prevention tips:

  • Do not download attachments from unknown receivers or also one received from the known receivers, if you were not expecting any mail attachment from them. Always double-check with the known receiver over different mediums.

  • Take regular data backups to reduce the trouble faced during data loss.

  • Update your software as it may contain security patches of known vulnerabilities of the existing version of the software.

  • Disable macros from email attachments as when the user opens the attachment, it executes embedded code within it, which may result in infecting the system.

  • Before clicking on links, inspect them for typos and when you can traverse on your own to the required destination.

  • Avoid plugging unknown USB.

References on the attack:

Case Study 2: Electronic Components Provider for Defence Suffered from Ryuk Ransomware

Ryuk was largely spread through emails containing infected links or attachments. It was one of the most expensive ransomware as the ransom amount demanded was very high to free the systems from the attack when compared to other ransomware.

It had the capability of detecting and encrypting network drives and resources.

In addition to this, it also could delete data backup snapshots created on Windows endpoint systems, which makes data retrieval impossible if the Windows System Restore for users is disabled.

A certain version of this malware was also used to steal the file whose name/contents contained certain keywords like an agent, personal, hidden, court, etc.

This version of malware scans for file types related to C++ source code, Word/excel docs, PDFs, JPG image files, and cryptocurrency wallets.

Incident: In 2020, Electronic Warfare Associates (EWA) was also hit by the Ryuk ransomware. The data in the company’s web servers were encrypted.

Even after a week, when the company shut down its infected web servers, the traces were noted in the Google search cached results i.e., encrypted files and ransom notes.

About the company: It is an electronic equipment provider for customers like the U.S. Department of Defence, the Department of Homeland Security, etc.


Prevention tips:

  • Do not download attachments from unknown receivers or also one received from the known receivers, if you were not expecting any mail attachment from them. Always double-check with the known receiver over different mediums.

  • Take regular data backups to reduce the trouble faced in the event of data loss.

  • Update your software as it may contain security patches of known vulnerabilities of the existing version of the software.

  • Disable macros from email attachments as when the user opens the attachment, it executes embedded code within it, which may result in infecting the system.

  • Before clicking on links, inspect them for typos and when you can traverse on your own to the required destination.

References:

These are very scary examples that can impact any manufacturing business without a proper security habit in place. The more surface exposed to the attacker the higher the chances for this type of attack to hit the target.

In the next section, we will look at a few tips to upskill your manufacturing organization's security and prevent supply chain disruptions!

Security Tips

Tips #1: Passwords
Create strong passwords which are easy to remember. Create a password from your favourite phrase/song lyrics which is easy to remember, and make a meaningful pattern including letters and numbers on your keyboard for unique substitutions.

Make sure passwords are made up of a proper mix, at least 8 characters long, avoid using common words (eg admin) and substitution (eg‘@’ for ‘a’), rotate passwords at least every 6 months, don't reuse passwords, and use password managers.

Tips #2: Preventing vishing (voice + phishing) call

  • Don't respond to a question by pressing buttons

  • hang up call if you suspect it's fake and doesn't call on the call back number provided instead go to the official website to get the number

  • never provide sensitive info over the phone

  • next always personally double-check with the agency/department

  • also check the number to see if someone has already reported the number to be malicious.

Tips #3: Device Repair

  1. backup your data

  2. log out from your online accounts

  3. lock your folders if not required

  4. scrap deleted data

  5. clear sensitive data like stored passwords, browser history, etc.

Tips #4: Backing up your data

  • Take your data backups regularly

  • create more than one copy of your data

  • have them stored in separate locations

  • use a standard naming convention so that it would be easy to identify files

  • decide which files need to be backed up, etc.

Tips #5: Sensitive information protection

  • Don't leave your devices unattended

  • Don't leave passwords written down in an accessible location

  • printouts containing sensitive info should be removed from the printers immediately

  • Avoid using public WiFi for critical transactions

  • Use VPN when logging into critical accounts

  • Access “HTTPS” authentic websites which means the channel is encrypted and has a valid certificate, etc

Tips #6: You clicked on the malicious link… now what?

  1. take a deep breath first…

  2. Then, disconnect the device from the Internet

  3. Communicate with your security or IT department ASAP.

  4. Scan the device

  5. Use another device to change credentials

  6. enable MFA

  7. Backup data offline

  8. Delete the email in which the link was received so you don’t open it by mistake.

Tips #7: QR code scanning

  • Use a QR code reading/scanning app that displays the complete URL of the website linked to the QR code

  • verify the URL of the site once the app has sent you there

  • verify that the company and the URL match

  • turn off any settings that take you to the scanned sites automatically

  • examine the QR code for evidence of manipulation; does it appear like someone has placed something over it? Etc

Tips #8: Safe web browsing

  • Don’t click on ads

  • use ad blockers (sorry google). 

  • Avoid clicking on links that seem fishy

  • check for typos and don't trust shortened links. 

  • Interact with well-known authentic sites. 

  • Be cautious with online downloads.

Tips #9: About updating apps

Update your apps as soon as they are released as they contain security patches for known vulnerabilities of the existing versions. If not patched, there are chances of cybercriminals exploiting them to attain their malicious intent

Tips #10: Software Installation

While installing the software don’t just click next...finish. Carefully follow the installation steps as to what packages will be installed or what permissions are required/asked. Optionally, choose a custom installation to view details.

Tips #11: Phishing emails

  • Never trust email from the public domain authentic companies have their domain

  • check email structure (like spellings, and fonts)

  • always double check before downloading attachments if you were not expecting any

  • be creative with your answers to security questions as they form an additional security layer

  • use the answer that is difficult to guess and is not available over social media i.e., you can use a fake answer or use some random string

  • avoid clicking on the task link when you can traverse to the destination on your own as it is one of the common phishing email techniques “A task is assigned to you” as an attacker can easily mirror the email templates of these utilities.

Phishing emails have characteristics like urgency/emotional (Eg, “The offer lasts just for an hour, click the link), authority/trust (Eg, the Legal department asks for your DoB, SIN) or social proof (Eg, typo in company name).

Tips #12 Ransomware protection

Protect from ransomware:

  • avoid downloading email attachments if you weren't expecting any always double-check with the receiver over different mediums

  • take regular data backups

  • keep your apps up-to-date

  • inspect links before clicking

  • if possible traverse on your own to the required page

  • before clicking on links inspect them for typos or traverse on your own to the destination

  • disable macros from email attachments as when a user opens the attachment, it executes embedded code within it, etc.

Next Steps?

Security is a topic that should be on everyone's minds in the company. It’s the responsibility of all staff members to ensure that they are following best practices to not become themself a vector of social engineering attack.

Here are a few more resources that you can use to level up the security in your manufacturing business:

General Best Practices

These are for common attacks that cause breaches

If you are looking for a trusted supply chain partner with a security-first approach to software development, contact our team!

We have developed an e-procurement software that has been pretested with success multiple times with our manufacturing partners and that is trusted by the leader in aerospace, automotive and the mining industry.

We are also SOC 2 Type 1 certified and on track to hit our Type 2 by the end of the year! To learn more about why security is important for our head over here.

Have a great one and stay safe out there!

Axya

question@axya.co

Canada: +1 438 600-8933
USA: +1 844 996-2812

1155 Metcalfe Street, Suite 1583, Montréal, QC H3B 2V6

© 2024 Axya, Inc. All rights reserved.

Axya

question@axya.co

Canada: +1 438 600-8933
USA: +1 844 996-2812

1155 Metcalfe Street, Suite 1583, Montréal, QC H3B 2V6

© 2024 Axya, Inc. All rights reserved.