Corpus ID: 38668350

Out of Control : Ransomware for Industrial Control Systems

@inproceedings{Formby2017OutOC,
  title={Out of Control : Ransomware for Industrial Control Systems},
  author={David Formby and Surya S. Durbha and R. Beyah},
  year={2017}
}
  • David Formby, Surya S. Durbha, R. Beyah
  • Published 2017
  • Computer Science
  • Ransomware has recently emerged as the trending new business model for cybercrime with high-profile attacks on hospitals revealing how profitable the technique can be when used to hold operationally critical assets for ransom. Meanwhile, industrial control system (ICS) networks are still struggling to update their security practices due to the perceived absence of threats and rarity of real-world ICS attacks. Recent reports suggest that ICS networks may be the next domain that ransomware is… CONTINUE READING
    24 Citations

    Figures, Tables, and Topics from this paper

    Securing Critical Infrastructure: A Ransomware Study
    • Highly Influenced
    A11 Your PLCs Belong to Me: ICS Ransomware Is Realistic
    • Yipeng Zhang, Z. Sun, +4 authors X. Zhang
    • Computer Science
    • 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
    • 2020
    Ransomware Threat and its Impact on SCADA
    • 5
    • Highly Influenced
    • PDF
    Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things
    • 12
    Toward an early assessment for Ransomware attack vulnerabilities
    Preparing Smart Cities for Ransomware Attacks
    • Pranshu Bajpai, R. Enbody
    • Computer Science
    • 2020 3rd International Conference on Data Intelligence and Security (ICDIS)
    • 2020
    Industrial robot ransomware: Akerbeltz
    • 1
    • PDF
    Using Global Honeypot Networks to Detect Targeted ICS Attacks
    • PDF
    Volenti non fit injuria: Ransomware and its Victims
    • 2
    • PDF
    Developing Deception Network System with Traceback Honeypot in ICS Network
    • 2
    • PDF

    References

    SHOWING 1-9 OF 9 REFERENCES
    Evolution of ransomware
    • 80
    Internet-facing PLCs-A New Back Orifice
    • 22
    • PDF
    The Purdue Enterprise Reference Architecture
    • 481
    Schwartke. Plc-blaster: A worm living solely in the plc, 2016
    • 2016
    Cyber-extortion losses skyrocket, says fbi. http://money.cnn.com/2016/04/15/technology/ ransomware-cyber-security
    • 2016
    Move over healthcare, ransomware has manufacturing in its sights. https://blog.fortinet.com/2016/06/06/move-over-\ \healthcare-ransomware-has-manufacturing-in-its-sights
    • 2016
    Ransomware crooks demand $70,000 after hacking san francisco transport system – updated. https://www.forbes.com/sites/thomasbrewster/2016/11/28/ san-francisco-muni-hacked-ransomware/\#53cc57247061
    • 2016
    Ransomware: Lucrative, fast growing, hard to stop. http://www.cnbc.com/2016/04/11/ ransomware-lucrative-fast-growing-hard-to-stop.html
    • 2016
    To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve
    • 159
    • PDF