Intelligent CIO Africa Issue 28 | Page 17

//////////////////////////////////////////////////////////////////////////////////// TRENDING REPORT REVEALS THE POTENTIAL CYBERTHREATS FACING RF CONTROLLERS Industrial manufacturers have come to rely a great deal on radio frequency (RF) protocols in their day-to- day functioning. A report from Trend Micro reveals the potential cyberthreats facing RF controllers. F rom simple operations such as turning on a motor to more intricate functions like manoeuvring a heavy-duty vehicle, RF forms an integral part of the smooth running of industry. Signals are sent over the air, which provides an opportunity for cybercriminals and attackers who are equipped with the right RF tools to possibly intercept or commandeer industrial machines and systems. This is a particularly frightening thought when considering that among others, radio frequencies can be used to control cranes, drills and even help miners navigate where they are. “Trend Micro has done some extensive research into the threats that could www.intelligentcio.com compromise RF remote controllers and compiled a research report titled A Security Analysis of Radio Remote Controllers for Industrial Applications, explained Indi Sirinwasa, Vice President of Trend Micro, Sub-Saharan Africa. “The research has found that it is quite possible to launch a cyberattack both within and out of RF range. Considering the extensive use of machinery using RF remote controllers, the consequences of such breaches are horrifying.” RF devices are not generally designed with cybersecurity in mind, which is precisely what makes them fair game for malicious actors if they are not properly patched. Industrial “ THE RESEARCH HAS FOUND THAT IT IS QUITE POSSIBLE TO LAUNCH A CYBERATTACK BOTH WITHIN AND OUT OF RF RANGE. INTELLIGENTCIO 17