Skip to main navigation Skip to search Skip to main content

Ransomware Threat and its Impact on SCADA

  • Usman Javed Butt
  • , Maysam Abbod
  • , Anzor Lors
  • , Hamid Jahankhani
  • , Arshad Jamal
  • , Arvind Kumar
  • Brunel University London
  • Northumbria University

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

33 Scopus citations

Abstract

Modern cybercrimes have exponentially grown over the last one decade. Ransomware is one of the types of malware which is the result of sophisticated attempt to compromise the modern computer systems. The governments and large corporations are investing heavily to combat this cyber threat against their critical infrastructure. It has been observed that over the last few years that Industrial Control Systems (ICS) have become the main target of Ransomware due to the sensitive operations involved in the day to day processes of these industries. As the technology is evolving, more and more traditional industrial systems are replaced with advanced industry methods involving advanced technologies such as Internet of Things (IoT). These technology shift help improve business productivity and keep the company's global competitive in an overflowing competitive market. However, the systems involved need secure measures to protect integrity and availability which will help avoid any malfunctioning to their operations due to the cyber-attacks. There have been several cyber-attack incidents on healthcare, pharmaceutical, water cleaning and energy sector. These ICS' s are operated by remote control facilities and variety of other devices such as programmable logic controllers (PLC) and sensors to make a network. Cyber criminals are exploring vulnerabilities in the design of these ICS's to take the command and control of these systems and disrupt daily operations until ransomware is paid. This paper will provide critical analysis of the impact of Ransomware threat on SCADA systems.

Original languageEnglish
Title of host publicationProceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538670019
DOIs
StatePublished - 10 Apr 2019
Externally publishedYes
Event12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019 - London, United Kingdom
Duration: 16 Jan 201918 Jan 2019

Publication series

NameProceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019

Conference

Conference12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019
Country/TerritoryUnited Kingdom
CityLondon
Period16/01/1918/01/19

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 9 - Industry, Innovation, and Infrastructure
    SDG 9 Industry, Innovation, and Infrastructure
  2. SDG 16 - Peace, Justice and Strong Institutions
    SDG 16 Peace, Justice and Strong Institutions

Keywords

  • Coin Miner
  • Cryptocurrency
  • Cryptojacking
  • Cryptor
  • Cyber Actor
  • Cyber Attack
  • Cyber threat
  • Cybercriminals
  • Cybersecurity
  • Data and System Access
  • Data Backup
  • Data Extortion
  • Data Mitigation
  • Device Compromising
  • Downtime
  • Encrypting
  • Human Machine Interface
  • Industrial Control
  • Industrial Control Systems
  • Industrial Networks
  • Industrial Processes
  • Infected System
  • Information Security
  • Locker
  • Malicious Software
  • Malware
  • Network
  • Operation Technology
  • Petya
  • Programmable Logic Controllers
  • Ransom
  • Ransomware
  • Ransomware Attack
  • Ransomware Deadline
  • Ransomware Incidents
  • Ransomware Prevention
  • Ransomware Strategies
  • Ransomware Taxonomy
  • Ransomware Threating
  • Remote Terminal Units
  • Supervisory Control and Data Acquisition
  • Threat Report
  • WannaCry

Fingerprint

Dive into the research topics of 'Ransomware Threat and its Impact on SCADA'. Together they form a unique fingerprint.

Cite this