Security flaws put wind farms and factory robots at risk of ransomware
A single day of downtime could cost $700,000 researcher claims at Black Hat


Wind farms and factories that use robots are at risk from ransomware attacks, according to new research into the vulnerabilities found within many industrial control systems.
Security researcher Jason Staggs discovered that controllers are not encrypting all of their messages, reports the Financial Times, and often use default passwords or fail to separate networks. Researchers have warned that these major security flaws could force organisations to choose between damaging operational downtime or paying hackers a ransom in order to resume business.
Staggs told an audience at Black Hat conference in Las Vegas: "What if we wanted to ransomware a wind farm? I'm not talking encrypting data, I'm talking about paralysing wind farm operations in such a way they are no longer able to produce electricity."
Staggs estimated that shutting down a wind farm for a single day would cost the energy provider up to $700,000, and the attacker could cause further damage if the victim does not comply.
David Emm, principal researcher at Kaspersky Labs, commented "It's clear that the world isn't ready for cyber-attacks against critical infrastructure this includes governments, law enforcement agencies, those who run such facilities and those who design and build them.
"Attackers, on the other hand, are clearly ready and able to launch attacks on these facilities. We've seen attacks on power grids, oil refineries, steel plants, financial infrastructure, seaports and hospitals."
The devastating impact of these kinds of ransomware attacks has been illustrated by a number of recent cases, including the widespread Wannacry outbreak that hit the NHS last month.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
In that case, the under-funding of the NHS was partly blamed for the breach, with experts calling for more "trained, registered and accountable" security professionals to be recruited in future. Without them, the attack was dubbed inevitable.
"It's not sufficient to simply protect endpoints and networks, not least because no two facilities are the same," Emm continued. "Security must be tailored to the specific needs of each organisations and be seen as an ongoing process."
Main image credit: Bigstock
Caroline has been writing about technology for more than a decade, switching between consumer smart home news and reviews and in-depth B2B industry coverage. In addition to her work for IT Pro and Cloud Pro, she has contributed to a number of titles including Expert Reviews, TechRadar, The Week and many more. She is currently the smart home editor across Future Publishing's homes titles.
You can get in touch with Caroline via email at caroline.preece@futurenet.com.
-
The Allianz Life data breach just took a huge turn for the worse
News Around 1.1 million Allianz Life customers are believed to have been impacted in a recent data breach, making up the vast majority of the insurer's North American customers.
-
US authorities take down prolific 'Rapper Bot' botnet
News The Rapper Bot botnet was responsible for a series of large-scale DDoS attacks on government agencies and tech companies. Now it's gone.
-
Average ransom payment doubles in a single quarter
News Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate
-
BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group
News The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos
-
Google cyber researchers were tracking the ShinyHunters group’s Salesforce attacks – then realized they’d also fallen victim
News In an update to an investigation on the ShinyHunters group, Google revealed it had also been affected
-
Nearly one-third of ransomware victims are hit multiple times, even after paying hackers
News Many ransomware victims are being hit more than once, largely thanks to fragmented security tactics
-
75% of UK business leaders are willing to risk criminal penalties to pay ransoms
News A ransom payment ban is a great idea - until you're the one being targeted...
-
The Scattered Spider ransomware group is infiltrating Slack and Microsoft Teams to target vulnerable employees
News The group is using new ransomware variants and new social engineering techniques - including sneaking into corporate teleconferences
-
Hackers breached a 158 year old company by guessing an employee password – experts say it’s a ‘pertinent reminder’ of the devastating impact of cyber crime
News A Panorama documentary exposed hackers' techniques and talked to the teams trying to tackle them
-
The ransomware boom shows no signs of letting up – and these groups are causing the most chaos
News Thousands of ransomware cases have already been posted on the dark web this year