
![]() |
Charlotte Stonestreet
Managing Editor |
Home> | AUTOMATION | >Security | >Cyber attack on steel mill causes physical damage |
Cyber attack on steel mill causes physical damage
09 January 2015
For the first time since the infamous 'Stuxnet' incident it would seem, a cyber attack has caused confirmed physical damage. A report released by the German Federal Office for Information Security (BSI) at the latter end of December details how a German steel plant suffered "massive damage" as a result of the attack on the plant network.
It is reported that the attackers used targeted spear-phishing emails to trick recipients into opening messages that sought and grabbed login details and passwords. Access was gained to the control system via the plant's business network, from where the attackers successively worked their way through the production network. The attackers were familiar not just with conventional IT security systems, but also the specialised industrial controls and production processes.
The attack led to parts of the plant failing and meant a blast furnace could not be shut down as normal. The unscheduled shutdown of the furnace caused the damage.
The date of the attack and the company operating the plant are not detailed in the BSI report.
- Training robots to solve problems like a human
- Ultra-low-power microcontrollers
- 3D Hubs launches manufacturing fund in fight against Covid-19
- £24m R&D fund for pioneering aerospace SMEs
- UK manufacturers turn to automation to boost domestic capacity amid trade uncertainty
- Research discovers 106% increase in new malware
- Innovations in Robotics Webinar to address cobot safety
- Edging ahead
- Pay-per-pick
- Funding for food suply chain automation announced
- Insight Into Security Threats
- Secure Network Interoperation
- SAFETY & SECURITY - STRANGE BEDFELLOWS
- Siemens extends TIA Portal engineering framework
- Partnership To Enhance Industrial Control Systems Security
- GAMBICA forms industrial network security group
- Infosecurity: stop throwing rocks at each other
- Secure data handling process
- Rising risk of cyber security attacks
- Scalable safety integration for small applications