STOCK TITAN

Smart Manufacturers Face a Security Conundrum as they Tackle Emerging 5G Threats

Rhea-AI Impact
(Low)
Rhea-AI Sentiment
(Negative)
Tags
Rhea-AI Summary

Trend Micro has published a report revealing threats to 4G/5G campus networks, emphasizing vulnerabilities in critical operational technology environments. The study outlines various attack scenarios targeting core network services, VMs, and network infrastructure, highlighting the risks posed by outdated security measures. Recommendations include using VPNs, application-layer encryption, and prompt patching to mitigate risks. Security evangelist Yohei Ishihara pointed out the dilemma manufacturers face between maintaining uptime and addressing vulnerabilities, stressing the importance of implementing security during the design phase.

Positive
  • The report provides detailed mitigations for emerging 5G threats, aiding organizations in enhancing their security framework.
  • Trend Micro showcases its expertise in cybersecurity, reinforcing its position as a leader in protecting digital information.
Negative
  • Organizations face challenges with downtime when attempting to patch critical vulnerabilities, potentially leaving them exposed.
  • Some systems, like Microsoft RDP, remain vulnerable even after transitioning to 5G, complicating security measures.

DALLAS, May 27, 2021 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, released in-depth research highlighting new threats to 4G/5G campus networks, many of which capitalize on the difficulty organizations have in patching critical OT environments.

The report details multiple attack scenarios and possible mitigations, using a testing environment designed to mimic a smart factory campus network.

To read a fully copy of the report, Attacks From 4G/5G Core Networks: Risks of the Industrial IoT in Compromised Campus Network, please visit: https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/the-transition-to-5g-security-implications-of-campus-networks.

"Manufacturers are at the cutting edge of IIoT deployment, gearing up with 5G to tap the power of connectivity everywhere to drive greater speed, safety and efficiency. But with new technology comes new threats added to legacy challenges," said Yohei Ishihara, security evangelist for Trend Micro. "As the report warns, many are stuck in a bind—unable to afford the downtime necessary to patch critical system vulnerabilities that may otherwise be exploited. Fortunately, our extensive research also highlights multiple mitigations and best practices to protect the smart factories of today and tomorrow."

The report identifies several key entry points for attackers to compromise a core 4G/5G network:

  • Servers hosting core network services: targeting of vulnerabilities and weak passwords in these standard COTS x86 servers.
  • VMs or containers: these can also be exposed if the latest patches aren't applied promptly.
  • Network infrastructure: appliances are often overlooked during patching cycles.
  • Base stations: also contain firmware which needs to be updated from time-to-time.

Once the attacker gets in the core network from any of these entry points, they will attempt lateral movement in a bid to intercept and change network packets. By attacking industrial control systems in smart manufacturing environments like the test site, attackers could steal sensitive data, sabotage production, or hold organizations to ransom.

From the 11 attack scenarios demonstrated, one of the most potentially damaging involves targeting Microsoft Remote Desktop Protocol (RDP) servers, which are commonly used by IT and field engineers. The upgrade to 5G doesn't automatically protect RDP traffic, so attackers could use this access to download malware and ransomware, or directly hijack industrial control systems. RDP v 10.0 is the most secure version and may offer some protections against these attacks, but again it may be difficult for organizations to upgrade.

Among the recommendations made in the report to protect 4G/5G campus networks are:

  • VPN or IPSec to protect remote communication channels, including to remote sites and base stations
  • Application-layer encryption (HTTPS, MQTTS, LDAPS, encrypted VNC, RDP v10, and secure industrial protocols like S7COMM-Plus)
  • EDR, XDR or MDR to monitor attacks and lateral movement inside the campus and the containerized core network
  • Proper network segregation with VLAN or SDN
  • Prompt patching, where possible, of servers, routers and base stations
  • Anomaly detection products, like Trend Micro Mobile Network Security, which are campus network-aware and provide a robust way to cut off unlisted device/SIM card pairs

Building a mobile network in an enterprise environment involves both the end users as well as various stakeholders, including service providers and integrators. In addition, private 4G / 5G networks are large-scale infrastructure and have a long life, so once built, they are difficult to replace or modify. Therefore, it is essential to implement "security by default" to identify and mitigate security risks at the design stage.

About Trend Micro
Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world. www.TrendMicro.com.

Cision View original content:http://www.prnewswire.com/news-releases/smart-manufacturers-face-a-security-conundrum-as-they-tackle-emerging-5g-threats-301300614.html

SOURCE Trend Micro Incorporated

FAQ

What threats to 4G/5G networks are highlighted in Trend Micro's report?

Trend Micro's report details vulnerabilities in core network services, VMs, network infrastructure, and outdated security measures.

What recommendations does Trend Micro provide to secure 4G/5G campus networks?

Recommendations include using VPNs, application-layer encryption, EDR/XDR monitoring, network segregation, and prompt patching.

Who is the security evangelist at Trend Micro that commented on the report?

Yohei Ishihara is the security evangelist for Trend Micro who emphasized the security challenges manufacturers face.

How does Trend Micro suggest addressing security risks during network construction?

The company advises implementing 'security by default' during the design phase of mobile networks.

What is the impact of not patching vulnerabilities in smart factories?

Failure to patch vulnerabilities may lead to data theft, sabotage, and potential ransom situations.

TREND MICRO INC S/ADR

OTC:TMICY

TMICY Rankings

TMICY Latest News

TMICY Stock Data

7.39B
131.19M
0.01%
Software - Infrastructure
Technology
Link
United States of America
Tokyo