The researchers at Georgia Tech found that factors such as ICS firewalls, PLC firmware versions and customer configurations cause PLCs to divulge incomplete and transitory network data that simple queries are unable to detect. “Modern PLCs communicate through many different network protocols, each of which provides a unique fingerprint that changes over time depending on the firmware version and other customer-specific settings. Simplistic IoT search engine queries no longer capture the entire range of possibilities,” says Pickren. As a result of this complexity, previous security analyses on the Internet have inadvertently ignored a large proportion of the vulnerable devices. The researchers claim that the actual number of at-risk devices could be up to 37 times higher than previously documented. The researchers have already begun to contact the affected parties so that they can correct the network misconfigurations that led to this – presumably unintentional – possibility of Internet access.
“Such a high number of unreported cases illustrates the ever-increasing need for more secure operation of OT systems, especially when they are connected to the Internet. For this reason, WAGO is launching new consulting services, along with other measures like hardening guidelines, so that in future, we will be able to provide more sustained support for our customers with cybersecurity issues,” says Kilian Fröhlich (Business Development Manager at WAGO). “As a logical consequence of the steps already initiated for certification of our processes and products per IEC 62443-4-1 and 4-2 and for establishing our PSIRT team early on, WAGO is now taking the next step by setting up a Cybersecurity Consulting Team.” It will allow us to continue to provide the best possible support for our customers on cybersecurity issues, as well as offering new market services.”