Comparing Cyber Security Attacks in Q3 – Q4 of 2022 for the Manufacturing Sector

[vc_row pix_particles_check=”” nav_skin=”light” consent_include=”include”][vc_column][vc_column_text]

What Happened in Manufacturing Sector in Q3 – Q4 of 2022?

In recent years, ransomware attacks have become frequent and severe. The onslaught has concentrated on the manufacturing sector, with producers providing easy targets for bad actors. In this industry, it’s vital to recognize the latest trends and defend yourself accordingly.

The manufacturing sector comprises establishments engaged in the mechanical, physical, or chemical transformation of materials, substances, or components into new products. Establishments in the manufacturing sector are often described as plants, factories, or mills and characteristically use power-driven machines and materials-handling equipment. However, establishments that transform materials or substances into new products by hand or in the worker’s home and those engaged in selling to the general public products made on the same premises from which they are sold, such as bakeries, candy stores, and custom tailors, may also be included in this sector.

As the manufacturing sector increasingly relies on software and digitization, it becomes a common target for ransomware attacks that can compromise data security and cause costly disruptions. To prevent these issues, many companies in this sector are prioritizing cybersecurity measures to protect their data and operations.[/vc_column_text][vc_empty_space height=”10px”][vc_single_image image=”17916″ img_size=”full” add_caption=”yes” alignment=”center”][vc_empty_space height=”10px”][vc_column_text]While no industry is safe from ransomware attacks, the manufacturing sector has been hit especially hard. In the last quarter alone, there was an astronomical increase of 151% in the manufacturing sector compared to the third quarter. Once the second most frequently targeted sector, it is now the most attacked industry. With the assaults coming thick and fast, manufacturers need to beef up their cybersecurity systems before it’s too late. There are two main reasons why the sector has seen such a rise in cybercrime:[/vc_column_text][vc_column_text]

A Conceptual Look About Ransomware Attacks in Other Sectors

Ransomware attacks increased substantially in 2022 across multiple sectors, with the government sector experiencing the highest increase at 425%. Other sectors, such as energy and utilities, manufacturing, banking and finance, and IT, also saw notable increases. However, some sectors saw less of an increase, with business professionals and legal services seeing only a 20% increase and retail only seeing a 53% increase. The healthcare and public health sector were the least affected, with a 14% increase. This data emphasizes the importance of cyber security for all industries.[/vc_column_text][vc_empty_space height=”10px”][vc_single_image image=”17918″ img_size=”full” add_caption=”yes” alignment=”center”][vc_empty_space height=”10px”][vc_empty_space height=”10px”][pix_card layout=”big_padding” target=”true” style=”” hover_effect=”1″ add_hover_effect=”1″ bold=”font-weight-bold” color=”custom” title_size=”h4″ text_bold=”” text_color=”custom” link_bold=”font-weight-bold” link_italic=”font-italic” link_color=”custom” explicit_width_height=”true” animation=”fade-in-left” title=”Ransomware Trends Report (Q3-Q4 2022)” link=”” css=”.vc_custom_1675077420371{background-color: #ffffff !important;}” link_text=”Get your free copy” text=”Inside, you’ll learn the world’s most targeted sectors, countries and malicious groups’ activity over the last 6 months.” custom_color=”#07024b” text_custom_color=”#07024b” link_custom_color=”#ff5247″][vc_empty_space][vc_column_text]

Why Are Ransomware Attacks on the Rise?

The COVID-19 pandemic has put a strain on IT workforces and made it difficult for companies to keep up with the constantly changing tactics of cybercriminals. As a result, factories, which often have large computer systems with inadequate security measures in place, have become vulnerable targets for attacks. The limited size of many security teams only compounds this problem, making it difficult for these organizations to effectively defend against these threats.[/vc_column_text][vc_column_text]The graphic shows the attacks received by the sectors in the last 6 months of 2022. Especially Manufacturing and Business, Professionals % Legal (such as law office, hotels insurance companies) sectors the biggest share of the pie. Moreover, the education, health and information technologies sectors are among the sectors most preferred by threat actors.[/vc_column_text][vc_empty_space height=”10px”][vc_single_image image=”17921″ img_size=”full” add_caption=”yes” alignment=”center”][vc_empty_space height=”10px”][vc_column_text]Cybercriminals are always happy to take advantage of weaknesses, and they’ve identified factories as vulnerable targets. To understand how these crimes unfold, it’s helpful to analyze specific cases. In each of the incidents outlined below, a criminal organization succeeded in locking or extracting a company’s data. Either by publishing sensitive information or bringing operations to a halt, each assault had a truly disastrous effect.[/vc_column_text][vc_column_text]In 2020, Visser Precision suffered a massive DoppelPaymer cyberattack. The aerospace precision parts manufacturer has private dealings with many major firms and agencies, including Tesla, SpaceX, and General Dynamics, and this preponderance of sensitive information attracted criminals’ attention. The hackers published important company documents on their website, including nondisclosure agreements.

In 2021, the technology manufacturer Acer suffered a massive cyber assault. The criminals, who call themselves REvil, claimed credit for the disruptions. While the route of entry remains unknown, experts have speculated that a Microsoft Exchange vulnerability might be to blame. REvil demanded $50 million to release the locked data, more than any previous ransom in the history of cybercrime. To prove their involvement in the assault, the group posted pictures of sensitive files online.[/vc_column_text][vc_column_text]

How to Brandefense Can Help You?

When it comes to cybersecurity, the “attack surface area” refers to the various points within a system that could potentially be targeted by malicious actors. It is the sum total of all potential entry points or attack vectors into a system, application or network. It includes all the various ways an attacker can access sensitive information or disrupt the normal functioning of the system. The attack surface can encompass a wide range of entry points, such as network ports, services, software vulnerabilities, user credentials, and more. In general, the larger the attack surface, the more potential vulnerabilities there are that can be exploited by an attacker.

Attack Surface Management (ASM) is the process of identifying, analyzing, and reducing the attack surface of a system, application or network. It involves identifying all entry points, or attack vectors, that a potential attacker could use to gain access to sensitive information or disrupt the normal functioning of a system. The goal of ASM is to reduce the risk of security breaches by identifying and mitigating vulnerabilities in systems and applications.[/vc_column_text][vc_empty_space height=”10px”][vc_single_image image=”17925″ img_size=”full” add_caption=”yes” alignment=”center”][vc_empty_space height=”10px”][vc_column_text]

Conclusion, Mitigations & Recommendations

There are several steps that companies can take to protect themselves, such as;

  • Improving email security,
  • Regularly backing up data,
  • Keep systems and applications up to date by scanning for security vulnerabilities,
  • Do not access links in unsafe spam messages or unknown websites,
  • Do not provide personal information to untrusted sources,
  • Never use USB sticks obtained from unknown sources,
  • Use VPN services on public Wi-Fi networks,
  • Institutions and organizations should provide awareness training to their employees against cyber security threats,
  • Up-to-date security solutions should be used in systems and e-mail mail servers.

By taking these measures, companies can significantly reduce their risk of falling victim to a cyberattack.


Share This: