Last year, attackers compromised programmable logic controllers (PLCs) produced by Tecon-Avtomatika, which were used to monitor lifts. These compromised devices were then exploited in attacks on other targets. While the incident did not result in physical damage, it highlights the growing risks to critical infrastructure. According to analysts, the number of cyberattacks with real-world consequences in the industrial sector increased by 19 per cent in 2024. This underscores the urgent need for fundamentally new approaches to protecting such systems.
A key issue with hacking PLCs is that, despite their high processing power, they often lack adequate security. Many PLCs run on common operating systems that may contain vulnerabilities, and their security measures are often limited to basic protections such as passwords and encryption. Furthermore, their interactions with external systems are frequently unmonitored, allowing attackers to exploit them as entry points or even take control of critical functions.
To address these risks, Kaspersky offers Kaspersky IoT Secure Gateway (KISG), a cyberimmune solution that acts as a protective barrier between PLCs and enterprise IT systems. This gateway plays a crucial role in infrastructure security by preventing PLCs from being hacked and exploited by attackers.
Consider an enterprise that uses PLCs to control lifts connected to an IoT platform for remote monitoring and diagnostics. Without KISG, these PLCs could be vulnerable to attack, as demonstrated in the Tecon-Avtomatika case.
A smart city infrastructure scheme using PLCs and IoT gateways running KasperskyOS was successfully tested in a cloud-based control room project in Orenburg.
As part of this project, three sites—a polyclinic, a residential building, and a college—were connected to a cloud platform. At each facility, PLCs and sensors were used to collect the following parameters:
The collected data is securely transmitted via a GSM channel to the Inspark IoT Platform cloud service using Kaspersky IoT Secure Gateway, where it is displayed on the operator’s dashboard.
The cloud-based control room enables centralised collection and comprehensive monitoring of key housing and utility indicators, consolidating all data into a single platform.
Traditional security measures such as passwords, antivirus software, and encryption are no longer sufficient to counter modern threats, as they do not prevent the exploitation of vulnerabilities embedded within device architecture.
The cyberimmune approach implemented in Kaspersky IoT Secure Gateway provides a higher level of protection. It ensures that even if vulnerabilities exist in a device, attackers cannot exploit them for malicious purposes.
The case of Tecon-Avtomatika PLCs is just one example of why securing industrial systems is critical. By integrating KISG into IoT infrastructure, organisations can reduce attack risks, eliminate the possibility of remote hacking, and make systems truly resilient to modern cyber threats.
Last year, attackers compromised programmable logic controllers (PLCs) produced by Tecon-Avtomatika, which were used to monitor lifts. These compromised devices were then exploited in attacks on other targets. While the incident did not result in physical damage, it highlights the growing risks to critical infrastructure. According to analysts, the number of cyberattacks with real-world consequences in the industrial sector increased by 19 per cent in 2024. This underscores the urgent need for fundamentally new approaches to protecting such systems.
A key issue with hacking PLCs is that, despite their high processing power, they often lack adequate security. Many PLCs run on common operating systems that may contain vulnerabilities, and their security measures are often limited to basic protections such as passwords and encryption. Furthermore, their interactions with external systems are frequently unmonitored, allowing attackers to exploit them as entry points or even take control of critical functions.
To address these risks, Kaspersky offers Kaspersky IoT Secure Gateway (KISG), a cyberimmune solution that acts as a protective barrier between PLCs and enterprise IT systems. This gateway plays a crucial role in infrastructure security by preventing PLCs from being hacked and exploited by attackers.
Consider an enterprise that uses PLCs to control lifts connected to an IoT platform for remote monitoring and diagnostics. Without KISG, these PLCs could be vulnerable to attack, as demonstrated in the Tecon-Avtomatika case.
A smart city infrastructure scheme using PLCs and IoT gateways running KasperskyOS was successfully tested in a cloud-based control room project in Orenburg.
As part of this project, three sites—a polyclinic, a residential building, and a college—were connected to a cloud platform. At each facility, PLCs and sensors were used to collect the following parameters:
The collected data is securely transmitted via a GSM channel to the Inspark IoT Platform cloud service using Kaspersky IoT Secure Gateway, where it is displayed on the operator’s dashboard.
The cloud-based control room enables centralised collection and comprehensive monitoring of key housing and utility indicators, consolidating all data into a single platform.
Traditional security measures such as passwords, antivirus software, and encryption are no longer sufficient to counter modern threats, as they do not prevent the exploitation of vulnerabilities embedded within device architecture.
The cyberimmune approach implemented in Kaspersky IoT Secure Gateway provides a higher level of protection. It ensures that even if vulnerabilities exist in a device, attackers cannot exploit them for malicious purposes.
The case of Tecon-Avtomatika PLCs is just one example of why securing industrial systems is critical. By integrating KISG into IoT infrastructure, organisations can reduce attack risks, eliminate the possibility of remote hacking, and make systems truly resilient to modern cyber threats.