Of 50 industrial locations studied, nearly half faced threats from removable USB media devices
More than 25 percent of the threats detected had the potential to cause a major disruption to plant operations
A wide variety of facilities – not just critical infrastructure – were actively targeted
New, first-of-its-kind research released today by Honeywell (NYSE: HON) shows that removable USB media devices such as flash drives pose a significant – and intentional – cybersecurity threat to a wide array of industrial process control networks.
Data derived from Honeywell technology used to scan and control USB devices at 50 customer locations showed that nearly half (44 percent) detected and blocked at least one file with a security issue. It also revealed that 26 percent of the detected threats were capable of significant disruption by causing operators to lose visibility or control of their operations.
The threats targeted a wide variety of industrial sites, including refineries, chemical plants and pulp-and-paper manufacturers around the world, and the threats themselves ranged in severity. About 1 in 6 targeted industrial control systems or Internet of Things (IoT) devices.
“The data showed much more serious threats than we expected, and taken together, the results indicate that a number of these threats were targeted and intentional,” said Eric Knapp, director of strategic innovation, Honeywell Industrial Cyber Security. “This research confirms what we have suspected for years – USB threats are real for industrial operators. What is surprising is the scope and severity of the threats, many of which can lead to serious and dangerous situations at sites that handle industrial processes.”
The research marks the first commercial report to focus exclusively on USB security in industrial control environments. It examined data collected from Honeywell’s Secure Media Exchange (SMX) technology, which is specifically designed to scan and control removable media, including USB drives. Among the threats detected were high-profile, well-known issues such as TRITON and Mirai, as well as variants of Stuxnet, an attack type previously leveraged by nation-states to disrupt industrial operations. In comparative tests, up to 11 percent of the threats discovered were not reliably detected by more traditional anti-malware technology.
“Customers already know these threats exist, but many believe they aren’t the targets of these high-profile attacks,” Knapp said. “This data shows otherwise, and underscores the need for advanced systems to detect these threats.”
The research, which is presented in the Honeywell Industrial USB Threat Report, recommends that operators combine people training, process changes, and technical solutions to reduce the risk of USB threats across industrial facilities.