By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    How to Fight Rootkits -Kaspersky Daily
    1 year ago
    Faketoken Banking Trojan is Getting Widespread in 55 Countries
    1 year ago
    95% of Android phones can be hacked with one just MMS
    1 year ago
    Latest News
    PDF Phishing: Beyond the Bait
    51 mins ago
    Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
    4 hours ago
    Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware
    22 hours ago
    Patchstack Alliance Bounty Program Events for December
    3 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Unscheduled update for WordPress fixes two critical vulnerabilities
    Unscheduled update for WordPress fixes two critical vulnerabilities
    1 year ago
    Windows 11 build 22621.457 (KB5016695) outs in Release Preview Channel
    1 year ago
    How to change time zone on Windows 11
    1 year ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    10 months ago
    Now you can speed up any video in your browser
    10 months ago
    How to restore access to a file after EFS or view it on another computer?
    10 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    11 months ago
  • How To
    How ToShow More
    A year in recap: Windows accessibility
    4 hours ago
    How to stop, disable, and remove any Android apps — even system ones
    2 days ago
    Bigger, Better, Cooler in a 2U1N form factor
    Bigger, Better, Cooler in a 2U1N form factor
    3 days ago
    Vulnerability in crypto wallets created online in the early 2010s
    4 days ago
    Use Windows 11 features to inspire creativity, speed up everyday tasks
    5 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    The Russian division of the PlayStation changed the negative review of the game to positive
    1 year ago
    Why pay attention to DuckDuckGo?
    1 year ago
    Huawei employees fined for tweeting from iPhone
    1 year ago
    Latest News
    How to disable news feed from Widgets on Windows 11
    2 hours ago
    How to fix performance issues after upgrading to Windows 11 23H2
    2 hours ago
    How to disable updates on Windows 10 Pro and Home
    1 day ago
    Change screen brightness on Windows 11
    3 days ago
  • Glossary
  • My Bookmarks
Reading: Hacking industrial robots
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Threats

Hacking industrial robots

Tom Grant
Last updated: 13 October
Tom Grant 1 year ago
Share
4 Min Read

As unpleasant as it is to see a ransomware message pop up on your monitor, WannaCry or ExPetr/NotPetya are not worst-case scenarios. Researchers demonstrated far more physical cyberattacks at the Black Hat hacking conference.

Contents
Managing cybersecurityWhy hack a robot?

Thousands of factories around the world employ robots whose mechanical manipulators move boxes around, drill through parts, and perform other actions by following preprogrammed routines. These robots are quite complex, consisting of a computer (used for monitoring by an operator), a controller, and a mechanical manipulator. A program with logical operations, such as “lift the box” or “turn the arm,” is created on the control computer, and the controller breaks it down into a series of smaller steps.

Industrial robot architecture

The process is intricate, with many factors. For example, a box needs to be lifted smoothly and only to a certain height, and the pressing force of the “fingers” must remain at a certain value to hold the transported part firmly. The controller stores configuration files that contain data for applying a certain voltage to servomotors at a clearly specified moment, thus allowing the manipulator to lift the box correctly.

Managing cybersecurity

The developers of industrial robots have invested substantial efforts to ensure their inventions operate safely. Various safety devices, logical checks, and user manuals secure both factory and operators against physical damage and injury in case of operation problems or robot failures. At the same time, factory infrastructure is assumed to be “friendly”; a robot fully trusts its control computer.

However, that assumption is not always fair. Group of researchers from Polytechnic University of Milan and Trend Micro has discovered that some robots are directly connected to the Internet (for example, for receiving updates from the manufacturer or sending telemetry to company headquarters), or to an insufficiently isolated factory Wi-Fi network. This enables malefactors to discover robots with the help of a dedicated scanner.

IRC5 control unit

The robots are easy prey. With no encryption used when updating firmware, no digitally signed firmware at all, and default user names and passwords used, anyone who finds a robot’s IP address can modify its configuration files and change its operation logic.

Why hack a robot?

Depending on a hacker’s goals, these opportunities can be used for both espionage (downloading existing configuration files to discover manufacturing secrets) and sabotage. Researchers have demonstrated a crafty attack on a robot that was supposed to draw straight lines (in real-life applications, it could perform electric-welding). Hacked, the robot slightly shifted its manipulator by just a fraction of a millimeter, an error that was imperceptible to the naked eye but would render the resulting product defective. The robot’s programming wasn’t modified; the only thing affected was the controller’s parameters.

Other attacks remain hypothetical, but some are dangerous for the operator. A movable robot can be reprogrammed with altered movement threshold values, for example, and that would be catastrophic.

Other attacks remain hypothetical, but some are dangerous for the operator

In the short term, protection against such attacks comes down to increasing the security of existing robots to make them less accessible to the outer world as well as applying manufacturer patches that close known cybersecurity holes. In the longer term, robot manufacturers need to find new approaches and update their production standards, prioritizing not only requirements for physical safety and electrical safety but also cybersecurity. It is worth noting that Kaspersky Lab offers critical infrastructure security solutions to accomplish those goals.


Source: kaspersky.com

Translate this article

TAGGED: Apple, Encryption, RC4, Security, Software, Targeted Attack, Threats, YouTube
Tom Grant October 13, 2022 October 7, 2022
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

PDF Phishing: Beyond the Bait
Threats 4 hours ago
A year in recap: Windows accessibility
Windows 4 hours ago
How to disable news feed from Widgets on Windows 11
News 5 hours ago
How to fix performance issues after upgrading to Windows 11 23H2
News 5 hours ago
Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
Wordpress Threats 7 hours ago

You Might Also Like

Threats

PDF Phishing: Beyond the Bait

4 hours ago
News

How to fix performance issues after upgrading to Windows 11 23H2

5 hours ago
Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
Wordpress Threats

Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution

7 hours ago
Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware
Wordpress Threats

Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware

1 day ago
Show More

Related stories

Several Critical Vulnerabilities including Privilege Escalation, Authentication Bypass, and More Patched in UserPro WordPress Plugin
BridesMaid – neuron writes toasts For those very occasions when you need to give out a powerful
The other day Yandex pleased us with the announcement of a new Midi station – an excellent reason to listen
REMIX – remixes of pictures from neural networksCreate, share and correct works
How to download Diablo IV for free and absolutely legallyBlizzard has opened a free
Rostelecom employees were forced to abandon Android and iOS in favor of Aurora.
Previous Next

10 New Stories

Fake CVE Phishing Campaign Tricks WordPress Users Into Installing Malware
How to disable updates on Windows 10 Pro and Home
How to stop, disable, and remove any Android apps — even system ones
Patchstack Alliance Bounty Program Events for December
Your Smart Coffee Maker is Brewing Up Trouble
Bigger, Better, Cooler in a 2U1N form factor
Previous Next
Hot News
PDF Phishing: Beyond the Bait
A year in recap: Windows accessibility
How to disable news feed from Widgets on Windows 11
How to fix performance issues after upgrading to Windows 11 23H2
Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?