
That’s why Gartner and other experts recommend using purpose-built OT security solutions. Active vulnerability scanning technologies like NESSUS cause downtime, while IT network monitoring solutions lack visibility into specialized industrial protocols.Īnd behavioral analytics developed for non-deterministic IT environments - using Bayesian models, for example - aren’t suited to the deterministic behavior of machine-to-machine (M2M) networks.

Traditional IT security technologies weren’t designed ICS environments. Why IT Solutions for Industrial Espionage Don’t Work for OT Networks What was stolen in those breaches? Secrets! More than 90% of the data stolen from manufacturers involves company intellectual property, as can be seen in chart on the right. The chart on the left reflects the prevalence of cyberespionage as the leading pattern of attack in confirmed breaches in the manufacturing sector.
#CORPORATE ESPIONAGE INSTALL#
Verizon writes that the criminals’ goal is to “infiltrate the network, find out where secrets are kept, and then slowly siphon off the nectar for as long as they can.” Attacks typically begin with a phishing exploit allowing them to install malware that eventually enables IP theft. Trade secrets are the #1 data type breached in manufacturing companies.Cyberespionage is by far the most predominant attack vector in the manufacturing sector.Manufacturing is the #1 industry targeted by cyberespionage.However, check out these three data points from the 2017 Verizon Data Breach Investigations Report (DBIR): Verizon says cyber spies are succeeding in stealing trade secretsĭeloitte writes that compared with more familiar cybercrimes such as theft of PII, “IP cyber theft has largely remained in the shadows.” That’s because, unlike retail and financial services organizations that are mandated by law to report consumer data breaches, industrial organizations are not required to report IP theft and other ICS intrusions. So how would you know if cyber spies have already breached your OT network and stolen sensitive data from historians and ladder logic in PLCs, from which they can infer design secrets and other corporate IP? How about third-party vendors who connect directly to your OT network via laptops or USB drives, bypassing traditional perimeter defenses like firewalls and IDS/IPS devices? And according to KMPG, operational information obtained from production systems, such as production and inventory data, can also be valuable as it enables competitors or suppliers to perform market manipulation and weaken negotiating positions. Where is that wealth of IP going? In many cases, it’s going to countries like China, whose government has designated several industries as “strategic.” Businesses receive government “intelligence data” (i.e., stolen IP), which enables them to improve their competitive edge and reduce time spent on R&D.įor many companies, such as those in the pharmaceutical sector, IP is much more valuable than any physical asset. He called it “the greatest transfer of wealth in history.” Cyber Command at the time, assessed the financial value of industrial espionage / cyberespionage losses at about $338 billion a year, including intellectual property losses and downtime due to cyberattacks.

In 2012, General Keith Alexander, who was NSA Director and commander of U.S. Industrial espionage in History – “Greatest transfer of wealth in history” These days there’s an approach that’s much easier and less costly for the perpetrator: industrial espionage / cyberespionage. The scheme took several years to develop and millions of dollars to fund-yet they were still busted. The FBI recently busted six people in Houston, charging them with stealing trade secrets from a marine engineering company and sending the secrets to a manufacturer in China. The problem with getting an insider to steal trade secrets is that it takes time and money. Lombe returned to England and built the first successful powered continuous production unit in the world, based on the purloined technology. At night, working by candlelight, Lombe made illicit drawings of the proprietary equipment the Italians used to spin silk on a large scale. In the early 18th century, a British silk spinner named John Lombe made a great effort to get hired at an Italian manufacturing company. Industrial espionage is sometimes credited for kick-starting the Industrial Revolution. And you probably already know this if you work in industries such as manufacturing, pharmaceuticals, and chemicals. Theft of trade secrets and corporate intellectual property (IP) such as proprietary manufacturing processes, formulas, recipes, and product designs has been happening for decades.

Industrial Espionage is a major threat to the Manufacturing Sector
