Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond
制造业面临日益增长的网络安全威胁,攻击者利用基础设施、员工及数字供应链中的漏洞进行破坏。关键漏洞如Heartbleed、Apache SSRF及PHP RCE等被广泛用于窃取数据或中断生产。为应对风险,制造商需实施定期漏洞管理、强化网络防御措施(如防火墙、入侵检测系统)及严格访问控制(多因素认证、基于角色的访问控制),以保障运营安全。 2025-3-6 17:17:5 Author: www.trustwave.com(查看原文) 阅读量:4 收藏

2 Minute Read

  • Cyber Threats in Manufacturing: The 2025 Trustwave Risk Radar Report highlights how cybercriminals exploit vulnerabilities in manufacturing infrastructure, workers, and digital supply chains, with over 3,500 critical vulnerabilities listed on CISA's KEV list.
  • Top Manufacturing Cyber Risks: Attackers leverage high-profile exploits like CVE-2014-0160 (Heartbleed), CVE-2021-40438 (Apache SSRF), and CVE-2024-4577 (PHP RCE) to disrupt production and steal sensitive data.
  • Proactive Cyber Defense Strategies: Manufacturers must implement regular vulnerability management, network security enhancements (firewalls, IDS/IPS), and strict access controls (MFA, RBAC) to mitigate risks and protect operations.

As noted in the just-released Trustwave SpiderLabs report, 2025 Trustwave Risk Radar Report: Manufacturing Sector, modern manufacturing systems are increasingly interconnected, creating fertile ground for cybercriminals.

The report details the weaknesses attackers exploit in infrastructure, workers, and the digital supply chain. Among the various tactics observed, vulnerability exploitation stood out due to its prevalence and potential impact.

Vulnerability Exploitation: A Growing Concern

In 2023 alone, Trustwave SpiderLabs noted that manufacturing organizations faced 4,370 publicly exposed vulnerabilities, with nearly 3,843 deemed critical. Alarmingly, more than 3,500 of these were listed on the Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerability (KEV) list. These vulnerabilities range from remote code execution flaws to privilege escalation and denial-of-service (DoS) threats.

Notable vulnerabilities include:

  • CVE-2021-40438: A Server-Side Request Forgery (SSRF) in Apache HTTP Server allowing attackers to access internal systems.
  • CVE-2023-44487: Known as "HTTP/2 Rapid Reset", this flaw can lead to large-scale DoS attacks.
  • CVE-2024-4577: A critical remote code execution vulnerability in PHP affecting Windows servers.
  • CVE-2014-0160 (Heartbleed): A vulnerability in OpenSSL that can expose sensitive memory contents.
  • CVE-2019-0708 (BlueKeep): A flaw in Microsoft's Remote Desktop Services allowing unauthenticated remote code execution.

These examples highlight the many ways attackers can infiltrate manufacturing systems, potentially halting production and compromising sensitive data as a result.

Mitigating the Risks: Proactive Defense Strategies

While the threat landscape is complex, it is not insurmountable. Manufacturers can take decisive steps to reduce their exposure and strengthen their defenses.

First, establish a comprehensive vulnerability management program. This should include regular vulnerability scans, with prioritized patching of critical and high-severity vulnerabilities. One of the primary reasons patching is deferred in the manufacturing industry is because of the potential downtime it may bring to the production line.

Downtime can be avoided by testing patches in a non-production environment, and automating patching solutions can also accelerate the process.

Second, network security can be reinforced by deploying a network firewall, Intrusion Detection/Prevention Systems (IDS/IPS), and network segmentation. These measures help control traffic, block unauthorized access, and contain potential breaches.

Third, implement robust access controls. Multi-Factor Authentication (MFA) should be standard practice, along with the principle of least privilege and Role-Based Access Control (RBAC). Regularly review user permissions and promptly revoke access when necessary.

Cyberattacks in the manufacturing sector are becoming more frequent and sophisticated. By understanding the tactics employed by cybercriminals and adopting proactive security measures, manufacturers can better safeguard their operations and data. Trustwave remains committed to helping organizations navigate this evolving threat landscape and build resilient cybersecurity strategies.

The primary report is joined by two companion pieces that dig deeper into specific issues that Trustwave SpiderLabs is seeing in the sector. These are:

Stay Informed

Sign up to receive the latest security news and trends straight to your inbox from Trustwave.


文章来源: https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/defending-manufacturing-how-cybercriminals-are-targeting-the-industry-and-how-to-respond/
如有侵权请联系:admin#unsafe.sh