Elevator Hacking via PLC: How to Prevent It?

The Security Challenges of IoT Controllers and How a Cyberimmune Approach Solves Them
Elevator Hacking via PLC: How to Prevent It?

What happened?

Last year, attackers compromised programmable logic controllers (PLCs) produced by Tecon-Avtomatika, which were used to monitor lifts. These compromised devices were then exploited in attacks on other targets. While the incident did not result in physical damage, it highlights the growing risks to critical infrastructure. According to analysts, the number of cyberattacks with real-world consequences in the industrial sector increased by 19 per cent in 2024. This underscores the urgent need for fundamentally new approaches to protecting such systems.

How Does Kaspersky IoT Secure Gateway Solve the Problem of PLC Security?

A key issue with hacking PLCs is that, despite their high processing power, they often lack adequate security. Many PLCs run on common operating systems that may contain vulnerabilities, and their security measures are often limited to basic protections such as passwords and encryption. Furthermore, their interactions with external systems are frequently unmonitored, allowing attackers to exploit them as entry points or even take control of critical functions.

To address these risks, Kaspersky offers Kaspersky IoT Secure Gateway (KISG), a cyberimmune solution that acts as a protective barrier between PLCs and enterprise IT systems. This gateway plays a crucial role in infrastructure security by preventing PLCs from being hacked and exploited by attackers.

How Does It Work in Practice?

Consider an enterprise that uses PLCs to control lifts connected to an IoT platform for remote monitoring and diagnostics. Without KISG, these PLCs could be vulnerable to attack, as demonstrated in the Tecon-Avtomatika case.

Had the infrastructure included KISG, the attack scenario would have played out differently:

  1. Attackers would attempt to gain access to the PLC through a network or firmware vulnerability.
  2. KISG would block any unauthorised connections, as the gateway filters all incoming requests and prevents uncontrolled access to the equipment.
  3. Even if attackers managed to compromise the PLC itself, they would not be able to use it to attack other systems because KISG restricts outbound traffic, preventing the spread of threats.
  4. The monitoring system would be alerted to suspicious activity, allowing the enterprise to respond promptly.

Real-World Implementation

A smart city infrastructure scheme using PLCs and IoT gateways running KasperskyOS was successfully tested in a cloud-based control room project in Orenburg.

As part of this project, three sites—a polyclinic, a residential building, and a college—were connected to a cloud platform. At each facility, PLCs and sensors were used to collect the following parameters:

  • Electricity supply: Voltage by phase, current frequency, current intensity.
  • Water supply: Hot and cold water consumption, hot water temperature, and water pressure in the supply/return pipeline.
  • Heat supply: Heat carrier temperature at various points, consumed heat energy.
  • Environmental conditions in building entrances: Temperature, illumination, humidity, CO₂ levels, noise levels.
  • Lift operation: Status and door openings.
  • Intercom system: Functionality monitoring.
  • Fire alarms: Status and operational checks.
  • Access control systems: Monitoring and functionality verification.

The collected data is securely transmitted via a GSM channel to the Inspark IoT Platform cloud service using Kaspersky IoT Secure Gateway, where it is displayed on the operator’s dashboard.

The cloud-based control room enables centralised collection and comprehensive monitoring of key housing and utility indicators, consolidating all data into a single platform.

Why Is a Cyberimmune Approach Necessary?

Traditional security measures such as passwords, antivirus software, and encryption are no longer sufficient to counter modern threats, as they do not prevent the exploitation of vulnerabilities embedded within device architecture.

The cyberimmune approach implemented in Kaspersky IoT Secure Gateway provides a higher level of protection. It ensures that even if vulnerabilities exist in a device, attackers cannot exploit them for malicious purposes.

The case of Tecon-Avtomatika PLCs is just one example of why securing industrial systems is critical. By integrating KISG into IoT infrastructure, organisations can reduce attack risks, eliminate the possibility of remote hacking, and make systems truly resilient to modern cyber threats.

Elevator Hacking via PLC: How to Prevent It?

What happened?

Last year, attackers compromised programmable logic controllers (PLCs) produced by Tecon-Avtomatika, which were used to monitor lifts. These compromised devices were then exploited in attacks on other targets. While the incident did not result in physical damage, it highlights the growing risks to critical infrastructure. According to analysts, the number of cyberattacks with real-world consequences in the industrial sector increased by 19 per cent in 2024. This underscores the urgent need for fundamentally new approaches to protecting such systems.

How Does Kaspersky IoT Secure Gateway Solve the Problem of PLC Security?

A key issue with hacking PLCs is that, despite their high processing power, they often lack adequate security. Many PLCs run on common operating systems that may contain vulnerabilities, and their security measures are often limited to basic protections such as passwords and encryption. Furthermore, their interactions with external systems are frequently unmonitored, allowing attackers to exploit them as entry points or even take control of critical functions.

To address these risks, Kaspersky offers Kaspersky IoT Secure Gateway (KISG), a cyberimmune solution that acts as a protective barrier between PLCs and enterprise IT systems. This gateway plays a crucial role in infrastructure security by preventing PLCs from being hacked and exploited by attackers.

How Does It Work in Practice?

Consider an enterprise that uses PLCs to control lifts connected to an IoT platform for remote monitoring and diagnostics. Without KISG, these PLCs could be vulnerable to attack, as demonstrated in the Tecon-Avtomatika case.

Had the infrastructure included KISG, the attack scenario would have played out differently:

  1. Attackers would attempt to gain access to the PLC through a network or firmware vulnerability.
  2. KISG would block any unauthorised connections, as the gateway filters all incoming requests and prevents uncontrolled access to the equipment.
  3. Even if attackers managed to compromise the PLC itself, they would not be able to use it to attack other systems because KISG restricts outbound traffic, preventing the spread of threats.
  4. The monitoring system would be alerted to suspicious activity, allowing the enterprise to respond promptly.

Real-World Implementation

A smart city infrastructure scheme using PLCs and IoT gateways running KasperskyOS was successfully tested in a cloud-based control room project in Orenburg.

As part of this project, three sites—a polyclinic, a residential building, and a college—were connected to a cloud platform. At each facility, PLCs and sensors were used to collect the following parameters:

  • Electricity supply: Voltage by phase, current frequency, current intensity.
  • Water supply: Hot and cold water consumption, hot water temperature, and water pressure in the supply/return pipeline.
  • Heat supply: Heat carrier temperature at various points, consumed heat energy.
  • Environmental conditions in building entrances: Temperature, illumination, humidity, CO₂ levels, noise levels.
  • Lift operation: Status and door openings.
  • Intercom system: Functionality monitoring.
  • Fire alarms: Status and operational checks.
  • Access control systems: Monitoring and functionality verification.

The collected data is securely transmitted via a GSM channel to the Inspark IoT Platform cloud service using Kaspersky IoT Secure Gateway, where it is displayed on the operator’s dashboard.

The cloud-based control room enables centralised collection and comprehensive monitoring of key housing and utility indicators, consolidating all data into a single platform.

Why Is a Cyberimmune Approach Necessary?

Traditional security measures such as passwords, antivirus software, and encryption are no longer sufficient to counter modern threats, as they do not prevent the exploitation of vulnerabilities embedded within device architecture.

The cyberimmune approach implemented in Kaspersky IoT Secure Gateway provides a higher level of protection. It ensures that even if vulnerabilities exist in a device, attackers cannot exploit them for malicious purposes.

The case of Tecon-Avtomatika PLCs is just one example of why securing industrial systems is critical. By integrating KISG into IoT infrastructure, organisations can reduce attack risks, eliminate the possibility of remote hacking, and make systems truly resilient to modern cyber threats.