Resource

The 6 biggest OT hacks of the past few years (and what they teach us about OT security)

OT security is more current than ever. Operational Technology (OT) is the beating heart of industry, energy, transport and healthcare. But where these systems were once separate from the outside world, they are now increasingly connected to IT networks — and therefore vulnerable to cyber attacks. These six OT hacks show how vulnerable industrial systems are — and what organizations can do to protect themselves.

1. Colonial Pipeline

Location: United States — 2021
Impact: Shutdown of the largest fuel pipeline in the US; panic buying and billions of losses

In May 2021, a ransomware attack on Colonial Pipeline completely shut down fuel supplies on the US East Coast. The attack started with one leaked VPN password. This gave attackers access to the IT network, and ultimately to systems that affected the physical operation. As a precaution, the entire pipeline was shut down.

The case shows how vulnerable operational processes are when IT and OT systems are insufficiently separated. One IT vulnerability led to a national incident.

Read more here

2. Norsk Hydro

Location: Norway — 2019
Impact: Global production failure at one of the world's largest aluminum producers; damage of tens of millions of euros

Norsk Hydro was affected by the LockerGoga ransomware. The attack disrupted IT systems in 40 countries and had a direct impact on production processes in smelters and factories. Although the company had good backups and a proactive crisis plan, it took weeks for systems to be operational again.

What is striking is how difficult it is to restart OT systems — often proprietary and fragile — safely after an attack. The financial and operational impact turned out to be many times greater than in a pure IT incident.

Read more here

3. Ukraine electricity network

Location: Ukraine — 2015
Impact: Hours of power outages in several regions; tens of thousands of households without power

In December 2015, attackers carried out a coordinated cyber attack against multiple electricity companies in Ukraine. Through spearphishing and malware (BlackEnergy), they got access to industrial control systems and actually turned off the power. It was the first documented successful attack where a cyber attack caused a physical blackout.

The attack underlined that OT environments — even in critical infrastructures — can be vulnerable to relatively familiar attack techniques. The incident serves as a wake-up call for energy companies worldwide.

Read more here

4. Port of Antwerp

Location: Belgium — 2011—2013
Impact: Criminal group hacks OT systems to get containers full of drugs out of port unseen

A drug gang managed to gain access to the OT systems of a logistics company in the port of Antwerp. Using keyloggers and remote access software, they manipulated container planning and access procedures. As a result, they were able to pick up containers of cocaine undisturbed for months, without employees noticing anything.

The attack was technically simple but strategically ingenious. It shows that OT is not only interesting for states or cybercriminals with ransomware, but also for organized crime with physical objectives.

Read more here

5. Stuxnet

Location: Iran — 2010
Impact: Sabotage of nuclear installations; physical damage to centrifuges via malware

Stuxnet is often regarded as the beginning of the OT attack era. The malware was specifically designed to sabotage industrial control systems (SCADA/PLC) and thereby cause physical damage to Iranian uranium enrichment facilities. The attack was presumably carried out by state actors, with an unprecedented level of precision and preparation.

Although this case is more than ten years old, it remains a blueprint for how to sabotage OT from within — even in highly protected environments. The relevance for critical infrastructures is still high today.

Read more here

6. Maastricht University

Location: Netherlands — 2019
Impact: Complete network failure; OT systems such as climate control and medical equipment also failed

In December 2019, Maastricht University was hit by ransomware. In addition to IT systems, facility systems such as access control, lab equipment and climate control were also affected — mostly OT-based infrastructure that was unnoticed linked to the IT network.

This case highlights how OT often becomes insidiously intertwined with IT without appropriate security measures being taken. During recovery actions, these systems prove difficult to access, let alone repair.

Read more here

OT is vulnerable, visible and strategically important

These six cases make one thing clear: OT is no longer a blind spot, but a concrete target. The impact of an OT attack often goes beyond data breaches or financial damage. It affects the physical world, production capacity, and even people's safety.

Organizations that depend on industrial processes, logistical infrastructure or smart buildings are wise to take their OT environment seriously into the wider picture. cybersecurity policy. That means insight into your own OT assets, segmentation between IT and OT, monitoring network traffic and, above all, awareness that it can happen.

Want to know more about OT security in your organization?
At Aumatics, we help organizations make their OT systems resilient to digital threats. Read more on our OT Security Services page, contact us or request a free quick scan.

Also available: our free Cyber Security Checklist.

Vrijblijvend adviesgesprek?

Is jouw organisatie voorbereid op de nieuwste cybersecurity dreigingen? Kom er achter in een vrijblijvend adviesgesprek.

Gesprek inplannen

Geschreven door:

Roel van den Bleek, Sales & Marketing Manager Aumatics

Roel van den Bleek

Sales Manager

Roel is verantwoordelijk voor de Sales en Marketing binnen Aumatics. Met een rijke ervaring en een passie voor IT geeft Roel adviezen precies op maat.

Get started today
for a safe tomorrow.

Because yesterday could have been too late.

Microsoft Gold Partner
24/7 security
Broad partner network

Book a free consultation today!

Wondering how we can help you?

We will contact you within 1 business day!
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.