Unveiling the Dark Side: Common Attacks and Vulnerabilities in Industrial Control Systems

Unveiling the Dark Side: Common Attacks and Vulnerabilities in Industrial Control Systems
December 3, 2024 20 mins

Unveiling the Dark Side: Common Attacks and Vulnerabilities in Industrial Control Systems

Unveiling the Dark Side: Common Attacks and Vulnerabilities in Industrial Control Systems

Introduction to Industrial Cybersecurity. Industrial control systems are crucial for managing critical infrastructure. The growth of Industry 4.0 and Industrial Internet of Things (IIoT) heightens the vulnerability of these systems to cyber threats.

1. Introduction to Industrial Cybersecurity

Industrial control systems are crucial for managing critical infrastructure. The growth of Industry 4.0 and Industrial Internet of Things (IIoT) heightens the vulnerability of these systems to cyber threats. Industrial Control System (“ICS”) emphasize data availability over integrity and confidentiality, in contrast to IT networks. This distinction requires customized security strategies that address the specific needs and vulnerabilities of ICS environments. The integration of cloud services and virtualization further expands the attack surface, creating exploitable gaps. [1]

Recent research highlights the growing exposure of key ICS communication protocols such as Modbus, KNX, and BACnet, particularly in critical sectors such as manufacturing, utilities, and building automation. Although fewer ICS systems are directly internet-facing, these protocols remain highly vulnerable, especially in North America and Europe. The integration of Operational Technology (“OT”) with IT systems amplifies risks, highlighting the necessity for strong cybersecurity strategies. [2]

The assertion that an 'air gap' constitutes a foolproof security approach is misleading. While network segmentation can create security zones, achieving complete network separation is virtually impossible today. Modern systems often include wireless diagnostics and removable media, which can bypass air gaps. In addition, this myth overlooks the threat from insiders, authorized users who can cause harm. To effectively protect ICS environments, organizations must move beyond relying solely on air gaps and adopt a multilayered security approach, including continuous monitoring, employee training, and incident response planning [3].

2. General Attack Vectors in ICS

In January 2024, Shodan identified nearly 110,000 ICS devices [2], including more than 6,500 publicly exposed programming logic controllers (“PLC”), accessible online and using protocols such as Modbus and Siemens S7 [4]. These exposures lead to targeted attacks, such as those by the Iranian hacktivist group Cyber Av3ngers [5], [6], who attacked Unitronics PLCs globally, including at a water utility near Pittsburgh and a small water utility in Ireland, causing a two-day water supply disruption. [7]

To improve ICS security, we strongly urge the implementation of these decisive actions [8]:

  • Change all default passwords.
  • Disconnect PLCs from the Internet.
  • Avoid using default TCP ports.
  • Apply IP allow lists and packet filters.
  • Back up configurations regularly for quick recovery.
  • If remote access is necessary, implement a firewall and VPN with multifactor authentication to securely manage network access securely.

For OT/ICS systems not directly exposed, attackers often employ more sophisticated methods to infiltrate networks. They might start with phishing or watering hole attacks to gain initial access, followed by exploiting software vulnerabilities or using social engineering techniques. Once inside, attackers can move laterally, compromising operational computers, databases, manipulating data, or targeting communication between PLCs and field equipment. The most severe threats occur when attackers gain direct physical access or remote control over critical components, enabling destructive actions such as firmware modification or sabotage. 

While many attacks on ICS are financially motivated, others are driven by hacktivist groups and can escalate into complex operations involving espionage or sabotage. Espionage-driven attacks focus on gathering sensitive information or intellectual property, using advanced malware and social engineering to remain undetected. Financially motivated attacks may involve direct tampering, unauthorized system use, or manipulating physical parameters (e.g., temperature or pressure) to cause damage or alter production output. 

The sophistication of cyber threats has grown with the emergence of rootkits, digitally signed obfuscated malwares, and the commercialization of 0-day vulnerabilities. The increasing risks from AutoRun malware, remote access attacks, and the rise of "hacking as a service" underscore the urgent need for robust cybersecurity actions. These services make advanced malwares and cyberattacks more accessible, emphasizing the need for strengthened defenses. In this evolving threat landscape, it is strongly recommended that organizations implement comprehensive strategies to protect their ICS assets from increasingly sophisticated threats. [1], [9]

3. Special Focus Areas

Maritime Cybersecurity: Navigating the New Digital Waters

The maritime industry, crucial for global trade and economic stability, is increasingly targeted by sophisticated cyberattacks. As ships and ports become more connected through digital systems, they are becoming more targets for cyber threats that take advantage of the unique ways that maritime technology works. The industry has seen a large increase in cybersecurity breaches, especially in operational technology as it becomes more digital. A research study shows a 900% increase [10] in these breaches, highlighting the increasing risks as ships become more connected to the Internet. 

Autonomous ships present new opportunities for cyberattacks within the maritime industry. Currently limited to smaller vessels, they are expected to be used in global shipping by 2030, increasing the risk [49]. These ships rely on sensors and communication systems, making them prime targets for hackers. Past attacks on navigation systems, such as ECDIS and GPS, have shown how vulnerable these systems are. As autonomous ships become more common, they introduce new risks. One major concern is the potential for compromised vessels to be used as weapons. [11] 

Although traditional cyber threats [12], [13] such as phishing and ransomware [14], [15] continue to pose significant risks, the advent of specialized malware specifically designed for maritime systems represents an escalating concern. These advanced threats have the potential to infiltrate critical control systems, such as the Steering Gear Control System (“SGCS”) [16] as detailed below or compromising the integrity of data displayed on a radar system [17]. This type of infiltration can lead to catastrophic outcomes like collisions or groundings, reminiscent of the Ever Given incident [18] in the Suez Canal. Recognizing these vulnerabilities and formulating robust defense strategies are essential for protecting the maritime sector from advancing cyber threats.

Key Vulnerabilities in Maritime Systems:

  • Physical Access and Unauthorized Personnel: Ships, particularly during port stops or maintenance activities, may be vulnerable to physical access by unauthorized individuals. These actors could install malware [19] directly onto the ship’s systems through infected removable media or by physically tampering with the equipment. Even with stringent security measures, the sheer complexity of maritime operations can create opportunities for such breaches, especially when security protocols are less rigorously enforced. [12]
  • Supply Chain Attacks: The risk of supply chain compromises is particularly significant in the maritime industry, where components and systems are sourced from various global suppliers. Malware can be embedded in hardware components or software updates before they are even installed on the ship, making these systems vulnerable long before they are operational. [12]
  • Remote Access Exploitation: Many modern ships use remote access systems for management, diagnostics, and maintenance. While these systems enhance operational efficiency, they also introduce significant cybersecurity risks. Unauthorized access to the ship's network can be achieved by exploiting vulnerabilities in remote access software, enabling the deployment of malware or disruption of essential systems from a distance. This method circumvents the need for physical access, making it a preferred attack vector for sophisticated cyber threats. [12]
  • Social Engineering: Human operators are often the weakest link in the cybersecurity chain, making social engineering a highly effective attack strategy. Attackers may send phishing emails to crew members, embedding malicious files or links to fake websites designed to harvest credentials. Once a user unknowingly engages with these malicious elements, malware can be introduced into the ship’s network. Social engineering tactics may also involve planting infected USB drives or persuading personnel to visit misleading websites that encourage the disclosure of sensitive information. [12]
  • Targeting Integrated and Legacy Systems: Ships often operate with a mix of modern and legacy systems that are interconnected, which can be exploited by attackers. Legacy systems, in particular, may lack adequate cybersecurity defenses, making them vulnerable entry points. Once an intruder infiltrates a segment of the vessel's systems, they are capable of moving laterally among other interconnected systems, executing malware or interfering with operations on an extensive level. The complex nature of these integrated systems, paired with diverse degrees of security across various components, creates an environment that may facilitate sophisticated cyberattacks.[12]
  • Insecure Communication Protocols and ICS Vulnerabilities: Many Industrial Control Systems onboard ships rely on communication protocols such as Modbus and NMEA[17], which are essential for integrating various systems, but often lack robust security features such as encryption and authentication. These insecure protocols make ICS susceptible to a variety of attacks, including interception, data manipulation, and injection of malicious commands. Once attackers gain access through these insecure channels, they can exploit ICS to disrupt critical functions such as navigation, engine control, and steering gear control system, leading to potentially catastrophic outcomes. [16]

Exploring Advanced Standalone Malware Targeting Maritime SGCS: A Realistic Simulation 

Researchers developed and tested malware targeting the Steering Gear Control System on modern ships in a realistic simulation under typical maritime constraints, such as 4 GB of RAM and two CPU cores limited to 5% utilization. The malware autonomously manipulated the SGCS by injecting malicious Modbus packets, exploiting vulnerabilities in protocols such as NMEA 0183 and Modbus. It caused unintended steering changes, posing serious navigational risks. [16]

Such an attack could result in incidents like collisions or groundings, as demonstrated by the Ever Given case. [20] This underscores the need for defense-in-depth cybersecurity strategies, regular vulnerability assessments, comprehensive training, and advanced monitoring tools for early threat detection and response.

Satellites in the Cyber Crosshairs: Securing Space

The rapid expansion of space technology and the surge in satellite deployments [21] for communication, navigation, and surveillance have dramatically increased the surface area for potential cyberattacks. As nations and private companies race to launch satellites, the complexity and number of systems in space have grown, but cybersecurity measures have lagged behind. Many satellites utilize commercial components [22], [23] that often lack space-grade security, thereby heightening vulnerabilities.

Developing and launching a satellite can take decades, yet they remain in orbit while technology and cybersecurity threats evolve rapidly. This mismatch leaves both satellites and their ground stations exposed to sophisticated attacks that could disrupt critical services worldwide, including GPS, communication, and military operations.[24]

The Potential Consequences of a Satellite Hack

If a satellite is hacked, the consequences could be dire, affecting not only the targeted satellite, but potentially disrupting critical services globally. An adversary might compromise a satellite's propulsion system, leading to orbital anomalies and the risk of collisions with other satellites. Attackers could jam communication systems, leading to the loss of internet, GPS services, or even military communications. Malicious actors could intercept telemetry information, exploit satellite subsystems, transmit fake data, and gain control over a part of the satellite infrastructure. This would enable them to potentially seize control of satellite infrastructure, leading to the disabling of satellites or even redirecting them for harmful purposes. Significant financial losses and national security risks may arise from such scenarios. Dependent infrastructures may experience cascading failures as a result.

Vulnerabilities in Aerospace Systems and Common Attack Methods

Aerospace systems, including satellites, are vulnerable across four main attack surfaces [25], [43]:

  • Ground Segment: As the most critical and vulnerable segment, the ground segment connects all other components and is often targeted by various attacks. Vulnerabilities include unauthorized access, which allows malicious users with escalated privileges to disrupt operations, access private data, and misuse systems. The network is vulnerable to malware, DoS attacks, unauthorized access, and data breaches, while communication channels are at risk of interference through electromagnetic sources, jamming, intercepting, and spoofing. 
  • Link Segment: The communication channels between the user and the space segments are susceptible to jamming, spoofing, and other communication attacks. Key vulnerabilities include unauthorized control of the satellite’s orbit, command injection, data tampering, executing malicious payloads. Uplink and downlink channels are particularly at risk, as these attacks can intercept, alter, or disrupt data exchanged between satellites and their control systems.
  • User Segment: This segment is particularly at risk of commercial service interruptions, especially for satellite television, radio, and other user-facing services. Additionally, vulnerabilities include inadequate encryption mechanisms, firmware flaws, and insufficient authentication, which can expose user devices to cyberattacks. Network risks involve data flow interception and insider threats using user equipment to gain unauthorized access.
  • Space Segment: Vulnerabilities include subsystem compromise, computer onboard attacks, and internal communication breaches. These attacks can disrupt the satellite's operations or alter its functionality.

Why Threat Actors Focus on Ground Control

Malicious actors are increasingly targeting the more accessible ground segment, which manages satellite communication. Unlike direct attacks on spacecraft, which require significant resources and are easily detectable due to the power and radio frequencies involved, vulnerabilities in the Space Link Extension (“SLE”) protocol [26], [44], [45] between Control Centres and Ground Stations can be exploited to launch Denial of Service (“DoS”) attacks or manipulate communications [25]. This allows attackers to gain indirect control over satellites, making the ground segment a prime target for cyberattacks.

CCSDS SLE Security Communications Threats

Figure 1: CCSDS SLE Security Communications Threats [44]

The Future of Aerospace Security 

As aerospace cyber threats evolve, quantum cryptography is becoming a vital defense, providing virtually unbreakable encryption through quantum key distribution (QKD) [27]. Leading this innovation are the QEYSSat [24], [25] and Eagle-1 [28] satellites, both set for launch between 2025 and 2026, which will advance quantum-secure satellite communications.

In addition, AES-256 encryption [29] and optical inter-satellite links [30], [31], [32] maintain strong security in current systems. SpaceX's Moonlighter satellite [33], [34], designed for cybersecurity testing, enhances real-time defense capabilities. New protocols such as QPEP [34] tackle high-latency encryption, and with satellites integrating into the 5G ecosystem [35], [36], [37], [38], [39], reducing LEO latency and upgrading encryption standards are crucial for securing future global communications.

4. Advanced Industrial Cyber Threats: Case Studies and Attacks

To understand the impact of cyber threats on critical infrastructure and satellite systems, real-world case studies reveal serious vulnerabilities in the industrial and aerospace sectors. These incidents highlight the urgent need for stronger cybersecurity defenses to protect essential global operations.

  • Stuxnet Attack on Nuclear Facilities (2010): T Stuxnet worm is a significant cyber-attack in history. It specifically targeted Iran's nuclear facilities, particularly the centrifuges used for uranium enrichment, by manipulating their operational speeds, causing significant physical damage. This incident marked a significant turning point in cyber warfare, showcasing the ability of cyber threats to impose substantial harm on vital infrastructure.  [47]
  • Ukraine Power Grid (2015): A cyberattack on Ukraine's electrical infrastructure caused a significant power outage, affecting more than 200,000 people. Malicious actors compromised grid control systems through spear phishing, allowing them to remotely disable substations and disrupt electricity distribution. This incident highlighted the vulnerability of essential infrastructure to cyberattacks and the devastating consequences for society [50].
  • Rosat X-ray Satellite (2000): The Rosat X-ray satellite, a collaborative initiative between the United States and Germany for astronomical exploration, was subjected to a cyber-attack that jeopardized its solar panel array. The hackers' actions caused the satellite's batteries to overheat and fail, resulting in its 2011 re-entry and crash on Earth. This case emphasizes the severe risks associated with vulnerabilities in satellite systems, where even a single compromised component can result in the total failure of the mission [48].
  • Starlink during the Russia-Ukraine Conflict (2022): During the conflict between Russia and Ukraine, the Starlink satellites operating near Russia faced numerous cyberattacks, including jamming and spoofing attempts. These attacks exposed the susceptibility of satellite communication links during geopolitical crises, demonstrating how satellites can be strategically targeted in conflicts. This case reinforces the need for heightened cybersecurity protocols to protect satellite communications.[40]
  • Cyber Av3ngers Attacks on OT/ICS Infrastructure (2023): The recent wave of cyberattacks by a group known as Cyber Av3ngers has exposed the widespread vulnerabilities in operational technology (OT) and industrial control systems (ICS) around the world. One such attack led to a two-day outage in Ireland, but the repercussions were felt globally, affecting utilities across multiple countries and sectors. These incidents highlight the pressing need for comprehensive cybersecurity strategies and proactive steps to defend the OT / ICS infrastructure against increasingly sophisticated cyber threats [5],[6],[7].
  • Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager on March 6, 2023 [41]
  • 1000 shipping vessels affected by ransomware attack on 7 January 2023. [14]
  • Japan's space agency hit by series of cyberattacks (2024) [42]
 

Conclusions and future trends

The growing threat of cyberattacks on industrial and aerospace systems requires robust defenses. Incidents like Stuxnet and satellite vulnerabilities in conflicts show the real dangers these attacks pose.

Future trends, such as quantum cryptography, AI-driven threat detection, and stronger international cybersecurity standards, will be crucial for securing critical infrastructure. Although risks are high, advanced technology and proactive actions can help protect against these evolving threats.

References

[1] ‘Securing the Industrial Backbone: Cybersecurity Threats, Vulnerabilities, and Mitigation Strategies in Control and Automation Systems’, Deleted J., vol. 20, no. 7s, pp. 1111–1120, May 2024, doi: 10.52783/jes.3604.
[2] F. R.-V. Labs, ‘The global threat evolution of internet-exposed OT/ICS’, Forescout. Accessed: Aug. 30, 2024. [Online]. Available: https://www.forescout.com/blog/cybersecurity-threat-evolution-of-otics-and-iot-devices/
[3] E. D. Knapp, ‘2 - About Industrial Networks’, in Industrial Network Security (Third Edition), E. D. Knapp, Ed., Syngress, 2024, pp. 11–43. doi: 10.1016/B978-0-443-13737-2.00014-2.
[4] E. López-Morales and U. Planta, ‘SoK: Security of Programmable Logic Controllers’.
[5] Ylabs, ‘GhostSec, the hacktivist collective targeting ICSs’, YLabs. Accessed: Aug. 30, 2024. [Online]. Available: https://labs.yarix.com/2023/08/ghostsec-the-hacktivist-collective-targeting-icss/
[6] ‘Dark Web Profile: Cyber Av3ngers’, SOCRadar® Cyber Intelligence Inc. Accessed: Aug. 30, 2024. [Online]. Available: https://socradar.io/dark-web-profile-cyber-av3ngers/
[7] E. Kovacs, ‘Cyberattack on Irish Utility Cuts Off Water Supply for Two Days’, SecurityWeek. Accessed: Aug. 30, 2024. [Online]. Available: https://www.securityweek.com/cyberattack-on-irish-utility-cuts-off-water-supply-for-two-days/
[8] ‘Exploitation of Unitronics PLCs used in Water and Wastewater Systems | CISA’. Accessed: Aug. 29, 2024. [Online]. Available: https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems
[9] E. D. Knapp, ‘3 - Industrial Cybersecurity History and Trends’, in Industrial Network Security (Third Edition), E. D. Knapp, Ed., Syngress, 2024, pp. 45–64. doi: 10.1016/B978-0-443-13737-2.00009-9.
[10] F. Akpan, G. Bendiab, S. Shiaeles, S. Karamperidis, and M. Michaloliakos, ‘Cybersecurity Challenges in the Maritime Sector’, Network, vol. 2, no. 1, Art. no. 1, Mar. 2022, doi: 10.3390/network2010009.
[11] M. Ammar and I. A. Khan, ‘Cyber Attacks on Maritime Assets and their Impacts on Health and Safety Aboard: A Holistic View’, arXiv.org. Accessed: Sep. 04, 2024. [Online]. Available: https://arxiv.org/abs/2407.08406v1
[12] ‘Guidelines on Cyber Security Onboard Ships, Version Four’. Accessed: Aug. 30, 2024. [Online]. Available: https://www.ics-shipping.org/resource/guidelines-on-cyber-security-onboard-ships-version-four/
[13] ‘TransNav Journal - BRAT: A BRidge Attack Tool for Cyber Security Assessments of Maritime Systems’. Accessed: Aug. 30, 2024. [Online]. Available: https://www.transnav.eu/Article_BRAT:_A_BRidge_Attack_Tool_for_Hemminghaus,57,1092.html
[14] ‘1000 Shipping Vessels Impacted by Ransomware Attack - Infosecurity Magazine’. Accessed: Sep. 01, 2024. [Online]. Available: https://www.infosecurity-magazine.com/news/shipping-vessels-ransomware-attack/
[15] K. Tsiakaraki, ‘Cyber security focus: Ransomware attacks is a prominent threat for maritime’, SAFETY4SEA. Accessed: Sep. 01, 2024. [Online]. Available: https://safety4sea.com/cm-cyber-security-focus-ransomware-attacks-is-a-prominent-threat-for-maritime/
[16] G. Longo, F. Lupia, A. Pugliese, and E. Russo, ‘Physics-aware targeted attacks against maritime industrial control systems’, J. Inf. Secur. Appl., vol. 82, p. 103724, May 2024, doi: 10.1016/j.jisa.2024.103724.
[17] G. Longo, E. Russo, A. Armando, and A. Merlo, ‘Attacking (and defending) the Maritime Radar System’, IEEE Trans. Inf. Forensics Secur., vol. 18, pp. 3575–3589, 2023, doi: 10.1109/TIFS.2023.3282132.
[18] S. Editor, ‘Ever Given: The grounding that changed the world’s view of shipping’, SAFETY4SEA. Accessed: Sep. 01, 2024. [Online]. Available: https://safety4sea.com/cm-ever-given-the-grounding-that-changed-the-worlds-view-of-shipping/
[19] O. Polikarovskykh, Y. Daus, D. Larin, and M. Tkachenko, ‘Systematization of Cyber Threats in Maritime Transport’, Secur. Infocommunication Syst. Internet Things, vol. 1, no. 1, Art. no. 1, Jun. 2023, doi: 10.31861/sisiot2023.1.01008.
[20] ‘“EVER GIVEN” in the Suez Canal: when is a binding contract concluded? - Andrew Carruth | Quadrant Chambers’. Accessed: Sep. 05, 2024. [Online]. Available: https://www.quadrantchambers.com/news/ever-given-suez-canal-when-binding-contract-concluded-andrew-carruth
[21] ‘Space is booming. Here’s how to embrace the $1.8 trillion opportunity’, World Economic Forum. Accessed: Sep. 04, 2024. [Online]. Available: https://www.weforum.org/agenda/2024/04/space-economy-technology-invest-rocket-opportunity/
[22] ‘COTS Components can be Used in Small Satellites’. Accessed: Sep. 05, 2024. [Online]. Available: https://bisresearch.com/news/satellite-commercial-off-the-shelf-components-enabling-innovation-in-space-technology-
[23] S. Research, ‘Satellite Commercial-Off-the-Shelf Components Market Size, Share and Forecast to 2031’. Accessed: Sep. 05, 2024. [Online]. Available: https://straitsresearch.com/report/satellite-commercial-off-the-shelf-components-market
[24] A. Ribeiro, ‘New Deloitte report addresses increasing danger of cyber threats in space, issues call to action’, Industrial Cyber. Accessed: Sep. 05, 2024. [Online]. Available: https://industrialcyber.co/reports/new-deloitte-report-addresses-increasing-danger-of-cyber-threats-in-space-issues-call-to-action/
[25] ‘Security Threats against Space Missions’, 2015, [Online]. Available: https://public.ccsds.org/Pubs/350x1g3.pdf
[26] T. Ohmüller, ‘Improving Security of Space Link Extension (SLE) Services’, May 2008.
[27] ‘National Security Agency/Central Security Service > Cybersecurity > Quantum Key Distribution (QKD) and Quantum Cryptography QC’. Accessed: Sep. 04, 2024. [Online]. Available: https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC/
[28] ‘Eagle-1’. Accessed: Sep. 04, 2024. [Online]. Available: https://www.esa.int/Applications/Connectivity_and_Secure_Communications/Eagle-1
[29] craig miles, ‘Satellite Encryption Techniques’, Yesway Communications. Accessed: Sep. 04, 2024. [Online]. Available: https://yesway.co.uk/satellite-encryption-techniques/
[30] A. King, ‘What is an optical inter-satellite link communication terminal?’, Iridian Spectral Technologies. Accessed: Sep. 04, 2024. [Online]. Available: https://www.iridian.ca/learning_center/light-notes/what-is-an-optical-inter-satellite-link-communication-terminal/
[31] D. Werner, ‘Intersatellite optical links will shake up the ground segment. But how soon and how fast is anyone’s guess.’, SpaceNews. Accessed: Sep. 04, 2024. [Online]. Available: https://spacenews.com/intersatellite-optical-links-will-shake-up-the-ground-segment-but-how-soon-and-how-fast-is-anyones-guess/
[32] L. Bernstein, ‘Inter-Satellite Links Are Making Space Networks a Reality’. Accessed: Sep. 04, 2024. [Online]. Available: https://www.kratosdefense.com/constellations/articles/inter-satellite-links-are-making-space-networks-a-reality
[33] ‘Moonlighter, the World’s First Hacking Test Bed in Space, to Launch with Five Other Small Satellites on SpaceX CRS-28’. Accessed: Sep. 04, 2024. [Online]. Available: https://www.issnationallab.org/spx28-moonlighter-cubesat-afrl/
[34] ‘Moonlighter – HACK-A-SAT 4’. Accessed: Sep. 04, 2024. [Online]. Available: https://hackasat.com/moonlighter/
[35] ‘Space for 5G’. Accessed: Sep. 04, 2024. [Online]. Available: https://connectivity.esa.int/space-5g
[36] ‘Satellites Role in 5G: The Future of 5G | AccelerComm’. Accessed: Sep. 04, 2024. [Online]. Available: https://www.accelercomm.com/news/satellites-role-in-the-future-of-5g
[37] ‘5G Satellite Spectrum - IEEE Future Networks’. Accessed: Sep. 04, 2024. [Online]. Available: https://futurenetworks.ieee.org/topics/5g-satellite-spectrum
[38] D. Meyer, ‘Hughes combines satellite, open RAN 5G for DoD “tactical edge”’, SDxCentral. Accessed: Sep. 04, 2024. [Online]. Available: https://www.sdxcentral.com/articles/interview/hughes-combines-satellite-open-ran-5g-for-dod-tactical-edge/2024/09/
[39] A. Turner, ‘Spain’s Sateliot to launch four 5G-IoT Satellites with SpaceX in July’, Mobile Europe. Accessed: Sep. 04, 2024. [Online]. Available: https://www.mobileeurope.co.uk/spains-sateliot-to-haunch-four-5g-iot-satellites-with-spacex-in-july/
[40] E. H. last updated, ‘Elon Musk says Russia is ramping up cyberattacks on SpaceX’s Starlink systems in Ukraine’, Space.com. Accessed: Sep. 04, 2024. [Online]. Available: https://www.space.com/starlink-russian-cyberattacks-ramp-up-efforts-elon-musk
[41] I. Arghire, ‘Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager’, SecurityWeek. Accessed: Sep. 04, 2024. [Online]. Available: https://www.securityweek.com/ransomware-gang-publishes-data-allegedly-stolen-from-maritime-firm-royal-dirkzwager/
[42] ‘Japan’s space agency hit by series of cyberattacks since last year, official says’. Accessed: Sep. 04, 2024. [Online]. Available: https://therecord.media/japan-cyberattacks-space-agency-series
[43] ‘Aerospace Cybersecurity: Satellite Hacking (W53)’. [Online]. Available: https://pentestmag.com/course/aerospace-cybersecurity-satellite-hacking-w53/
[44] ‘Ground Control to Major Threat: Hacking the Space Link Extension Protocol’. [Online]. Available: https://visionspace.com/hacking-sle/
[45] ‘Space Link Extension (SLE) Emulation for High-Throughput Network Communication’. [Online]. Available: https://ntrs.nasa.gov/api/citations/20140017058/downloads/20140017058.pdf
[46] ‘Jamming and Cyber Attacks: How Space is Being Targeted in Ukraine’. [Online]. Available: https://www.rusi.org/explore-our-research/publications/commentary/jamming-and-cyber-attacks-how-space-being-targeted-ukraine
[47] M. Baezner and P.Robin, ‘Stuxnet’, Feb. 2018. [Online]. Available: https://www.researchgate.net/publication/323199431_Stuxnet
[48] ‘Hackers could shut down satellites — or turn them into weapons’ [Online]. Available: https://www.astronomy.com/science/hackers-could-shut-down-satellites-or-turn-them-into-weapons/
[49] Rolls-Royce, ‘Autonomous ships - The next step’ [Online]. Available: https://www.rolls-royce.com/~/media/Files/R/Rolls-Royce/documents/%20customers/marine/ship-intel/rr-ship-intel-aawa-8pg.pdf
[50] Wired ‘Inside the Cunning, Unprecedented Hack of Ukraine's Power Grid’. [Online]. Available: https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/ 

Aon’s Thought Leader
  • Zsolt Olah
    Consultant, Security Testing, Cyber Solutions

About Cyber Solutions:

Aon’s Cyber Solutions offers holistic cyber risk management, unsurpassed investigative skills, and proprietary technologies to help clients uncover and quantify cyber risks, protect critical assets, and recover from cyber incidents.

General Disclaimer

This document is not intended to address any specific situation or to provide legal, regulatory, financial, or other advice. While care has been taken in the production of this document, Aon does not warrant, represent or guarantee the accuracy, adequacy, completeness or fitness for any purpose of the document or any part of it and can accept no liability for any loss incurred in any way by any person who may rely on it. Any recipient shall be responsible for the use to which it puts this document. This document has been compiled using information available to us up to its date of publication and is subject to any qualifications made in the document.

Terms of Use

The contents herein may not be reproduced, reused, reprinted or redistributed without the expressed written consent of Aon, unless otherwise authorized by Aon. To use information contained herein, please write to our team.

Subscribe CTA Banner