999国内精品永久免费视频,色偷偷9999www,亚洲国产成人爱av在线播放,6080亚洲人久久精品,欧美超高清xxxhd

中國(guó)自動(dòng)化學(xué)會(huì)專家咨詢工作委員會(huì)指定宣傳媒體
新聞詳情
gkongbbs

卡巴斯基報(bào)告:能源和工控系統(tǒng)集成公司面臨最高的網(wǎng)絡(luò)攻擊風(fēng)險(xiǎn)

http://bfqmb.cn 2018-04-10 16:45 《中華工控網(wǎng)》翻譯

Kaspersky Report: Energy and ICS Integration companies face highest chance of cyberattack
卡巴斯基報(bào)告:能源和工控系統(tǒng)集成公司面臨最高的網(wǎng)絡(luò)攻擊風(fēng)險(xiǎn)

A report from Kaspersky Lab found that in the second half of 2017, nearly 40 percent of all industrial control systems (ICS) in energy organizations protected by Kaspersky Lab solutions were attacked by malware at least once – closely followed by 35 percent of engineering & ICS integration networks.

卡巴斯基實(shí)驗(yàn)室發(fā)布的一份報(bào)告發(fā)現(xiàn),在2017年下半年,受卡巴斯基實(shí)驗(yàn)室解決方案保護(hù)的能源組織中,有近40%的工業(yè)控制系統(tǒng)(ICS)至少遭到一次的惡意軟件攻擊,緊隨其后的是35%的工程和工控系統(tǒng)集成網(wǎng)絡(luò)。

The Kaspersky Lab report, “Threat Landscape for Industrial Automation Systems in H2 2017,” also found that for all other industries (manufacturing, transportation, utilities, food, healthcare, etc.) the proportion of ICS computers attacked ranged from 26 percent to 30 percent on average. The vast majority of detected attacks were accidental hits.

這份“2017年下半年工業(yè)自動(dòng)化系統(tǒng)威脅情況”卡巴斯基實(shí)驗(yàn)室報(bào)告還發(fā)現(xiàn),對(duì)于所有其他行業(yè)(制造業(yè)、交通運(yùn)輸業(yè)、公用事業(yè)、食品、醫(yī)療保健等)而言,工控系統(tǒng)計(jì)算機(jī)遭受攻擊的比例平均介乎26%到30%之間。絕大多數(shù)檢測(cè)到的攻擊都是意外擊中。

The cybersecurity of industrial facilities remains an issue that can lead to very serious consequences affecting industrial processes, as well as businesses losses. While analyzing the threat landscape in different industries, Kaspersky Lab ICS CERT recorded that nearly all industries regularly experience cyberattacks on their ICS computers. However, there are two industries that were attacked more than others – energy organizations (39%), and engineering and ICS integration businesses (35%).

工業(yè)設(shè)施的網(wǎng)絡(luò)安全仍然是一大問題,可能導(dǎo)致影響工業(yè)流程的嚴(yán)重后果,造成企業(yè)損失。在分析不同行業(yè)的威脅情況時(shí),卡巴斯基實(shí)驗(yàn)室工控系統(tǒng)網(wǎng)絡(luò)應(yīng)急響應(yīng)小組記錄了幾乎所有行業(yè)其工控系統(tǒng)計(jì)算機(jī)日常遭受的網(wǎng)絡(luò)攻擊。但有兩個(gè)行業(yè)較其他行業(yè)受到的攻擊更多,那就是能源機(jī)構(gòu)(39%),以及工程和工控系統(tǒng)集成業(yè)務(wù)(35%)。

1

The sector that demonstrated the most noticeable growth of ICS computers attacked during the second half of 2017 (compared to the first half of 2017) was construction, with 31 percent attacked. The relatively high percentage of attacked ICS computers in the construction industry compared to the first half of 2017 could indicate that these organizations are not necessarily mature enough to pay the required attention to the protection of industrial computers. Their computerized automation systems might be relatively new and an industrial cybersecurity culture is still being developed in these organizations.

在2017年下半年(與2017年上半年相比),工控系統(tǒng)計(jì)算機(jī)受攻擊上升最為明顯的行業(yè)是建筑業(yè),有31%受到攻擊。與2017年上半年相比,建筑行業(yè)受到攻擊的工控系統(tǒng)計(jì)算機(jī)的比例相對(duì)較高,這可能表明這些機(jī)構(gòu)未必足夠成熟,無法對(duì)工業(yè)計(jì)算機(jī)的保護(hù)給予必要的關(guān)注。他們的計(jì)算機(jī)自動(dòng)化系統(tǒng)可能相對(duì)較新,并且這些組織仍未確立工業(yè)網(wǎng)絡(luò)安全意識(shí)。

The lowest percentage of ICS attacks – 15 percent – has been found in enterprises specializing in developing ICS software, meaning that their ICS research/development laboratories, testing platforms, demo stands and training environment are also being attacked by malicious software, although not as often as the ICS computers of industrial enterprises. Kaspersky Lab ICS CERT experts point to the significance of ICS vendors’ security, because the consequences of an attack spreading over the vendor’s partner ecosystem and customer base could be very dramatic – as seen during the ExPetr malware epidemic.

專注于開發(fā)工控系統(tǒng)軟件的企業(yè)受攻擊比例最低,僅為15% ,不過這意味著這些工控系統(tǒng)研究/開發(fā)實(shí)驗(yàn)室、測(cè)試平臺(tái)、演示臺(tái)和培訓(xùn)環(huán)境也會(huì)受到惡意軟件的攻擊,盡管不像工業(yè)企業(yè)的工控系統(tǒng)計(jì)算機(jī)那么頻繁??ò退够鶎?shí)驗(yàn)室工控系統(tǒng)網(wǎng)絡(luò)應(yīng)急響應(yīng)小組專家了指出工控系統(tǒng)供應(yīng)商安全的重要性,因?yàn)閷?duì)供應(yīng)商合作伙伴生態(tài)系統(tǒng)和客戶群的攻擊蔓延的后果可能非常強(qiáng)烈——正如ExPetr惡意軟件流行期間所發(fā)生的。

Among the new trends of 2017, Kaspersky Lab ICS CERT researchers have discovered a rise in mining attacks on ICS. This growth trend began in September 2017, along with an increase in the cryptocurrency market and miners in general. But in the case of industrial enterprises, this type of attack can pose a greater threat by creating a significant load on computers, and as a result, negatively affecting the operation of the enterprise’s ICS components and threatening their stability.

在2017年的新趨勢(shì)中,卡巴斯基實(shí)驗(yàn)室工控系統(tǒng)網(wǎng)絡(luò)應(yīng)急響應(yīng)小組的研究人員發(fā)現(xiàn)了對(duì)工控系統(tǒng)挖礦攻擊的增加。這種增長(zhǎng)趨勢(shì)始于2017年9月,伴隨加密貨幣市場(chǎng)火爆和礦工總體增加。但對(duì)工業(yè)企業(yè)而言,這類攻擊可能會(huì)對(duì)計(jì)算機(jī)造成重大負(fù)擔(dān)從而構(gòu)成更大的威脅,對(duì)企業(yè)的工控系統(tǒng)組件的運(yùn)行產(chǎn)生負(fù)面影響并威脅其穩(wěn)定性。

Overall, during the period from February 2017 to January 2018, cryptocurrency mining programs attacked three percent of industrial automation system computers, in most cases accidentally.

總的來說,在2017年2月至2018年1月期間,加密電子貨幣挖掘程序攻擊了3%的工業(yè)自動(dòng)化系統(tǒng)計(jì)算機(jī),絕大多數(shù)是意外攻擊。

Other highlights from the report include:
報(bào)告的其他亮點(diǎn)包括:

  • Kaspersky Lab products blocked attempted infections on 38% of ICS computers protected by them. This is 1.4 percentage points less than in the second half of 2016.
  • The internet remains the main source of infection with 22.7% of ICS computers attacked. This is two percent higher than in the first six months of the year. The percentage of blocked web-borne attacks in Europe and North America is substantially lower than elsewhere.
  • The top five countries by percentage of ICS computers attacked has remained unchanged since reported in the first half of 2017. This includes Vietnam (70%), Algeria (66%), Morocco (60%), Indonesia (60%) and China (60%).
  • In the second half of 2017, the number of different malware modifications detected by Kaspersky Lab solutions installed on industrial automation systems increased from 18,000 to over 18,900.
  • In 2017, 11% of all ICS systems were attacked by botnet agents, a malware that secretly infects machines and includes them in a botnet network for remote command execution; the main sources of attacks like this were the internet, removable media and email messages.
  • In 2017, Kaspersky Lab ICS CERT identified 63 vulnerabilities in industrial systems and IIoT/IoT systems, and 26 of them have been fixed by vendors.

  • 有38%的受卡巴斯基實(shí)驗(yàn)室產(chǎn)品保護(hù)的工控系統(tǒng)計(jì)算機(jī)遭遇攻擊,比2016年下半年減少1.4個(gè)百分點(diǎn)。
  • 互聯(lián)網(wǎng)仍然是主要感染源,有22.7%的工控系統(tǒng)計(jì)算機(jī)遭受攻擊,比當(dāng)年前六個(gè)月高出兩個(gè)百分點(diǎn)。歐洲和北美網(wǎng)絡(luò)攻擊受阻的比例明顯低于其他地區(qū)。
  • 自2017年上半年報(bào)告以來,工控系統(tǒng)計(jì)算機(jī)遭受攻擊的前五位國(guó)家百分比保持不變。其中包括越南(70%),阿爾及利亞(66%),摩洛哥(60%),印度尼西亞(60%)和中國(guó)( 60%)。
  • 在2017年下半年,安裝在工業(yè)自動(dòng)化系統(tǒng)上的卡巴斯基實(shí)驗(yàn)室解決方案檢測(cè)到的不同惡意軟件修改數(shù)量從18,000個(gè)增加到18,900個(gè)以上。
  • 2017年,所有工控系統(tǒng)中有11%受到僵尸網(wǎng)絡(luò)代理的攻擊,這是一種惡意軟件,它會(huì)秘密感染機(jī)器并將其包含在僵尸網(wǎng)絡(luò)中以執(zhí)行遠(yuǎn)程命令,這種攻擊的主要來源是互聯(lián)網(wǎng)、可移動(dòng)媒介和電子郵件。
  • 2017年,卡巴斯基實(shí)驗(yàn)室工控系統(tǒng)網(wǎng)絡(luò)應(yīng)急響應(yīng)小組發(fā)現(xiàn)了工業(yè)系統(tǒng)和工業(yè)物聯(lián)網(wǎng) / 物聯(lián)網(wǎng)系統(tǒng)中的63個(gè)漏洞,其中26個(gè)已被供應(yīng)商修復(fù)。

“The results of our research into attacked ICS computers in various industries have surprised us, “said Evgeny Goncharov, head of Kaspersky Lab ICS CERT. “For example, the high percentage of ICS computers attacked in power and energy companies demonstrated that the enterprises’ effort to ensure cybersecurity of their automation systems after some serious incidents in the industry is not enough, and there are multiple loopholes still there that cybercriminals can use.”

卡巴斯基實(shí)驗(yàn)室工控系統(tǒng)網(wǎng)絡(luò)應(yīng)急響應(yīng)小組負(fù)責(zé)人Evgeny Goncharov表示:“我們對(duì)各行業(yè)受攻擊工控系統(tǒng)計(jì)算機(jī)的研究結(jié)果讓我們感到驚訝。例如,電力和能源公司遭受工控系統(tǒng)計(jì)算機(jī)攻擊的比例很高,這表明企業(yè)在行業(yè)發(fā)生嚴(yán)重事故后確保其自動(dòng)化系統(tǒng)網(wǎng)絡(luò)安全的努力是不夠的,留給網(wǎng)絡(luò)犯罪分子利用的漏洞仍然很多。”

Kaspersky Lab ICS CERT recommends the following technical measures to be taken:
卡巴斯基實(shí)驗(yàn)室工控系統(tǒng)網(wǎng)絡(luò)應(yīng)急響應(yīng)小組建議采取以下技術(shù)措施:

  • Regularly update operating systems, application software and security solutions on systems that are part of the enterprise’s industrial network.
  • Restrict network traffic on ports and protocols used on the edge routers and inside organization's OT networks.
  • Audit ICS component access control in the enterprise’s industrial network and at its boundaries.
  • Deploy dedicated endpoint protection solutions onto ICS servers, workstations and HMIs to secure OT and industrial infrastructure from random cyberattacks.
  • Deploy network traffic monitoring, analysis and detection solutions for better protection from targeted attacks.

  • 定期更新企業(yè)工業(yè)網(wǎng)絡(luò)系統(tǒng)中的的操作系統(tǒng)、應(yīng)用軟件和安全方案。
  • 限制邊緣路由器和企業(yè)運(yùn)營(yíng)網(wǎng)絡(luò)內(nèi)使用的端口和協(xié)議的網(wǎng)絡(luò)流量。
  • 在企業(yè)工業(yè)網(wǎng)絡(luò)及其邊界內(nèi),審核工控系統(tǒng)組件訪問控制。
  • 將專用端點(diǎn)保護(hù)解決方案部署到工控系統(tǒng)服務(wù)器、工作站和人機(jī)界面上,以保護(hù)運(yùn)營(yíng)和工業(yè)基礎(chǔ)設(shè)施免受隨機(jī)網(wǎng)絡(luò)攻擊。
  • 部署網(wǎng)絡(luò)流量監(jiān)控、分析和檢測(cè)解決方案,以更好地防范有針對(duì)性的攻擊。
版權(quán)所有 中華工控網(wǎng) Copyright?2025 Gkong.com, All Rights Reserved