Security Breach: Criminal Organizations Know Manufacturing

Using hacker tactics against them by getting IT and OT on the same page.

One of the most recent, widespread and hardest hitting cyberattacks is the MOVEit exploit spearheaded by the ransomware gang Clop.

The zero-day vulnerabilities associated with this file transfer tool impacted a number of global manufacturers, including Shell, Schneider Electric, Siemens Energy, Emerson, FANUC, Bristol Myers Squibb, TTI and Honeywell. Essentially, Clop was able to infiltrate MOVEit files and inject commands that allowed the hackers to access databases and steal a plethora of personal and operational data from over 300 companies.

Since its origins in 2019 Clop has targeted over 10,000 companies around the world.

To help offer some clarity on the depth of this attack, some lessons learned from this ordeal, and things manufacturers need to know about the evolving threat landscape, it’s our pleasure to welcome Mike DeNapoli to the show. Mike serves as the cybersecurity architect and director at Cymulate – a leading provider of attack surface management and cyber risk mitigation solutions.  

 We’re excited to announce that Palo Alto Networks is sponsoring this episode. For more information on zero trust security for all OT environments and simplified operations, go to www.paloaltonetworks.com/network-security.

To catch up on past episodes, you can go to Manufacturing.netIEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected]

To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click here.

More in Educational Resources - FM