{"id":68232,"date":"2023-06-19T11:35:21","date_gmt":"2023-06-19T03:35:21","guid":{"rendered":"https:\/\/version-2.com\/?p=68232"},"modified":"2023-06-19T11:36:59","modified_gmt":"2023-06-19T03:36:59","slug":"protecting-industrial-networks-analyzing-a-cyber-attack-on-a-factory","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/06\/protecting-industrial-networks-analyzing-a-cyber-attack-on-a-factory\/","title":{"rendered":"Protecting Industrial Networks: Analyzing a Cyber Attack on a Factory"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"68232\" class=\"elementor elementor-68232\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-534888b post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"534888b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;80510b6&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40115d5\" data-id=\"40115d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca14f89 elementor-widget elementor-widget-text-editor\" data-id=\"ca14f89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item\"><p>The integration of <span class=\"caps\">IT<\/span> and <span class=\"caps\">OT<\/span> networks has brought significant benefits to industrial processes, including increased efficiency, real-time data access, and improved decision-making. However, this integration also brings serious security challenges that could threaten equipment availability and the integrity of factory data. Manufacturers rely on data to make critical business decisions, which can cause production delays, equipment failures, and even safety hazards if the data is compromised.<\/p><blockquote class=\"blockquote\"><p>This blog post reviews and analyzes a\u00a0potential cyber attack on a\u00a0production factory and demonstrates how it could be detected using <a title=\"GREYCORTEX Mendel in OT\" href=\"\/en\/greycortex-mendel-ot-environment\/\" data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"2e82fdfa-710e-4a00-9005-664cef6792ea\"><span class=\"caps\">GREYCORTEX<\/span> Mendel<\/a>. It serves as an example of how network detection and response solutions can effectively protect against massive cyber attacks.<\/p><\/blockquote><p>Traditional security approaches, such as air-gapping or <span class=\"caps\">DMZ<\/span>, are no longer effective in protecting <span class=\"caps\">OT<\/span> networks. Although existing security solutions are attempting to close the gap between <span class=\"caps\">IT<\/span> and <span class=\"caps\">OT<\/span> infrastructures, unfortunately, it is highly problematic to achieve. Industrial equipment is more outdated as its lifecycle is much longer than that of <span class=\"caps\">IT<\/span> devices (which, in some cases, can be 20\u00a0years or more). Furthermore, <span class=\"caps\">IT<\/span> professionals are responsible for network security in both <span class=\"caps\">IT<\/span> and <span class=\"caps\">OT<\/span>, whereas <span class=\"caps\">OT<\/span> professionals are more concerned with maintaining smooth operations and data integrity than cybersecurity. And the lastly, <span class=\"caps\">IT<\/span> and <span class=\"caps\">OT<\/span> professionals have difficulty communicating and understanding each other due to the use of different terminologies, technologies, and educational orientations.<\/p><h3>About the Factory<\/h3><p>For this scenario, we will imagine that <span class=\"caps\">GREYCORTEX<\/span> Mendel has been installed in a\u00a0bakery consisting of three separate locations: the main office building, the storage and production building, and the packaging and logistics building. Although separate, the <span class=\"caps\">IT<\/span> and <span class=\"caps\">OT<\/span> networks of these locations are interconnected.<\/p><figure class=\"figure align-left\" role=\"group\"><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/about-factory.png?itok=dFfHUAew\" data-lg-id=\"5572f1b4-804b-4970-8921-48e58dc1fb36\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/about-factory.webp?itok=dFfHUAew\" type=\"image\/webp\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/about-factory.png?itok=dFfHUAew\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><figcaption class=\"figure-caption mt-2\"><\/figcaption><\/figure><h3>Attack Description<\/h3><p>The cyber attack took place over the weekend. The attackers, who may have been amateurs, cybercriminals, or hackers hired by a\u00a0competitor, were able to connect to a\u00a0device that had an outdated operating system on the private office network via public Wi-Fi. Using the infected device, they launched a\u00a0network scan and discovered production machines in remote facilities. The attackers gained control over the oven and packing line and made changes to their configuration.<\/p><article class=\"align-center media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/attack-description_0.png?itok=c2ylcUnz\" data-lg-id=\"28dee5cf-a704-4224-933a-e39414e1efc7\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/attack-description_0.webp?itok=c2ylcUnz\" type=\"image\/webp\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/attack-description_0.png?itok=c2ylcUnz\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><h3>Detection in <span class=\"caps\">GREYCORTEX<\/span> Mendel<\/h3><p>The first thing that <span class=\"caps\">IT<\/span> or <span class=\"caps\">OT<\/span> specialists would see in <span class=\"caps\">GREYCORTEX<\/span> Mendel is a\u00a0representation of the industry standard <span class=\"caps\">MITRE<\/span> <span class=\"caps\">ATT<\/span><span class=\"amp\">&amp;<\/span><span class=\"caps\">CK<\/span>\u00ae Security Framework. It is a\u00a0dashboard designed to be a\u00a0connection point for <span class=\"caps\">IT<\/span> and <span class=\"caps\">OT<\/span> specialists as it uses terminology that is understandable for both sides. Here, they can detect security alerts concerning industrial equipment.<\/p><article class=\"align-left media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/mitre-attckr-security-framework.png?itok=Jaenf4oZ\" data-lg-id=\"e4c83ba0-2bb1-40ce-9af4-6848a8bc341d\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/mitre-attckr-security-framework.webp?itok=Jaenf4oZ\" type=\"image\/webp\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/mitre-attckr-security-framework.png?itok=Jaenf4oZ\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><p>By going to the event section in Mendel, the analysts can filter all events related to the <span class=\"caps\">OT<\/span> network and this cyberattack. Here, they detect that the attacks were able to infiltrate the internal network and, upon scanning, discover both <span class=\"caps\">IT<\/span> and <span class=\"caps\">OT<\/span> infrastructures. The cybercriminals found devices that were open and could be used to initiate a\u00a0connection.<\/p><article class=\"align-left media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/list-of-events.png?itok=kGHpCAeX\" data-lg-id=\"657b4db8-9362-48e7-b5a2-624a0fad8e75\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/list-of-events.webp?itok=kGHpCAeX\" type=\"image\/webp\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/list-of-events.png?itok=kGHpCAeX\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><h3>Security Alert: <strong>Temperature Change in the\u00a0Oven<\/strong><\/h3><p>The attackers tested their ability to make changes to the machine settings. They connected to a\u00a0device controlling the oven and altered the temperature.<\/p><p>Continuing in the incident investigation, the analysts observe that Mendel detected the change in the oven temperature. Upon analyzing this event, they discover that there was a\u00a0connection from the engineering workstation from the <span class=\"caps\">IT<\/span> network to a\u00a0machine in the Storage and Preparation network over the <span class=\"caps\">MODBUS<\/span> protocol. In the application layer, they detect that the attackers set a\u00a0high temperature, which could result in the cookies coming out\u00a0burnt.<\/p><article class=\"align-center media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/security-alert-temperature-change.jpg?itok=iZghzyYG\" data-lg-id=\"3a1b48b3-5c88-4f4f-81dc-327b9746afe7\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/security-alert-temperature-change.webp?itok=iZghzyYG\" type=\"image\/webp\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/security-alert-temperature-change.jpg?itok=iZghzyYG\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><h3>Security Alert: <strong>Change in Packaging Settings<\/strong><\/h3><p>Similar to the oven, the attackers in this example attempted to connect to the packaging line and change its configuration.<\/p><p>Mendel also detected that the cybercriminals changed the default number of pieces per package. They connected to a\u00a0system within the Packaging and Logistics network via the <span class=\"caps\">MODBUS<\/span> protocol, and upon analyzing the application layer, it was discovered that only eight pieces would be placed in one box instead of the usual\u00a0ten.<\/p><article class=\"align-center media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/security-alert-change-in-packaging-settings-1.jpg?itok=FGaZjjlU\" data-lg-id=\"df60416a-e821-4bcf-90bd-fe29016b473b\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/security-alert-change-in-packaging-settings-1.webp?itok=FGaZjjlU\" type=\"image\/webp\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/security-alert-change-in-packaging-settings-1.jpg?itok=FGaZjjlU\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><article class=\"align-center media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/security-alert-change-in-packaging-settings-2.jpg?itok=VLIPqIS8\" data-lg-id=\"60553b9b-fcf3-4e7d-bdb4-5b08db7ce9e0\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/security-alert-change-in-packaging-settings-2.webp?itok=VLIPqIS8\" type=\"image\/webp\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/security-alert-change-in-packaging-settings-2.jpg?itok=VLIPqIS8\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><p>Mendel alerted the analysts to these changes because the default values for the oven were set to 200 degrees Celsius and ten pieces for a\u00a0single package. Thus, Mendel is capable of detecting any changes that occur in the <span class=\"caps\">OT<\/span> network.<\/p><h3>Empower Your <span class=\"caps\">IT<\/span> and <span class=\"caps\">OT<\/span> Security<\/h3><p>Industrial networks need to operate continuously without unscheduled interruption, making security a\u00a0secondary concern. However, failing to secure industrial networks can lead to devastating consequences, including production downtime, equipment damage, and even physical harm.\u00a0The reason why cyber attacks can happen in the first place is that <strong><span class=\"caps\">OT<\/span> protocols are not designed with security in mind<\/strong>, making them vulnerable to cyberattacks.<\/p><p>We have described just two examples of what potential attackers could do, but they could take multiple actions, such as infiltrating the system and testing their abilities to make minor changes in the configuration. Such changes may be unnoticeable for analysts and <span class=\"caps\">OT<\/span> professionals. The attackers could then wait until the right moment, such as the launch of a\u00a0new product, to cause significant damage.<\/p><p>Thanks to the <a title=\"GREYCORTEX Mendel in OT\" href=\"\/en\/greycortex-mendel-ot-environment\/\" data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"2e82fdfa-710e-4a00-9005-664cef6792ea\"><span class=\"caps\">ICS<\/span> module<\/a>, the advanced industrial intrusion detection system (<span class=\"caps\">IDS<\/span>), <strong><span class=\"caps\">GREYCORTEX<\/span> Mendel is able to detect such an attack<\/strong>. Mendel alerts manufacturers to potential security threats in the early stages, providing valuable time to prevent attacks. <strong>To narrow the gap between <span class=\"caps\">IT<\/span> and <span class=\"caps\">OT<\/span> worlds<\/strong>, the detection dashboard based on the <span class=\"caps\">MITRE<\/span> <span class=\"caps\">ATT<\/span><span class=\"amp\">&amp;<\/span><span class=\"caps\">CK<\/span>\u00ae framework was created, which <strong>uses unified terminology understandable for both <span class=\"caps\">IT<\/span> and <span class=\"caps\">OT<\/span> professionals<\/strong>.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ead54a5 elementor-widget elementor-widget-shortcode\" data-id=\"ead54a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18179\" class=\"elementor elementor-18179\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>About GREYCORTEX<br \/><\/strong>GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.<\/p>\n<p>MENDEL, GREYCORTEX\u2019s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.<\/p>\n<p>MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The integration of IT and OT networks has brought signi [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1075,24,61],"tags":[1076,23,435],"class_list":["post-68232","post","type-post","status-publish","format-standard","hentry","category-year2023","category-greycortex","category-press-release","tag-1076","tag-greycortex","tag-mendel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting Industrial Networks: Analyzing a Cyber Attack on a Factory - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Industrial Networks: Analyzing a Cyber Attack on a Factory - Version 2\" \/>\n<meta property=\"og:description\" content=\"The integration of IT and OT networks has brought signi [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-19T03:35:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-19T03:36:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/about-factory.png?itok=dFfHUAew\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/protecting-industrial-networks#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/protecting-industrial-networks-analyzing-a-cyber-attack-on-a-factory\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Protecting Industrial Networks: Analyzing a Cyber Attack on a Factory\",\"datePublished\":\"2023-06-19T03:35:21+00:00\",\"dateModified\":\"2023-06-19T03:36:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/protecting-industrial-networks-analyzing-a-cyber-attack-on-a-factory\\\/\"},\"wordCount\":914,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/protecting-industrial-networks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/article_image\\\/public\\\/perm\\\/image\\\/about-factory.png?itok=dFfHUAew\",\"keywords\":[\"2023\",\"Greycortex\",\"MENDEL\"],\"articleSection\":[\"2023\",\"Greycortex\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/protecting-industrial-networks-analyzing-a-cyber-attack-on-a-factory\\\/\",\"url\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/protecting-industrial-networks\",\"name\":\"Protecting Industrial Networks: Analyzing a Cyber Attack on a Factory - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/protecting-industrial-networks#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/protecting-industrial-networks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/article_image\\\/public\\\/perm\\\/image\\\/about-factory.png?itok=dFfHUAew\",\"datePublished\":\"2023-06-19T03:35:21+00:00\",\"dateModified\":\"2023-06-19T03:36:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/protecting-industrial-networks#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/protecting-industrial-networks\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/protecting-industrial-networks#primaryimage\",\"url\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/article_image\\\/public\\\/perm\\\/image\\\/about-factory.png?itok=dFfHUAew\",\"contentUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/article_image\\\/public\\\/perm\\\/image\\\/about-factory.png?itok=dFfHUAew\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/protecting-industrial-networks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Industrial Networks: Analyzing a Cyber Attack on a Factory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Industrial Networks: Analyzing a Cyber Attack on a Factory - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks","og_locale":"en_US","og_type":"article","og_title":"Protecting Industrial Networks: Analyzing a Cyber Attack on a Factory - Version 2","og_description":"The integration of IT and OT networks has brought signi [&hellip;]","og_url":"https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks","og_site_name":"Version 2","article_published_time":"2023-06-19T03:35:21+00:00","article_modified_time":"2023-06-19T03:36:59+00:00","og_image":[{"url":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/about-factory.png?itok=dFfHUAew","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/06\/protecting-industrial-networks-analyzing-a-cyber-attack-on-a-factory\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Protecting Industrial Networks: Analyzing a Cyber Attack on a Factory","datePublished":"2023-06-19T03:35:21+00:00","dateModified":"2023-06-19T03:36:59+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/06\/protecting-industrial-networks-analyzing-a-cyber-attack-on-a-factory\/"},"wordCount":914,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/about-factory.png?itok=dFfHUAew","keywords":["2023","Greycortex","MENDEL"],"articleSection":["2023","Greycortex","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/06\/protecting-industrial-networks-analyzing-a-cyber-attack-on-a-factory\/","url":"https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks","name":"Protecting Industrial Networks: Analyzing a Cyber Attack on a Factory - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks#primaryimage"},"image":{"@id":"https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/about-factory.png?itok=dFfHUAew","datePublished":"2023-06-19T03:35:21+00:00","dateModified":"2023-06-19T03:36:59+00:00","breadcrumb":{"@id":"https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks#primaryimage","url":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/about-factory.png?itok=dFfHUAew","contentUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/article_image\/public\/perm\/image\/about-factory.png?itok=dFfHUAew"},{"@type":"BreadcrumbList","@id":"https:\/\/www.greycortex.com\/blog\/protecting-industrial-networks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Protecting Industrial Networks: Analyzing a Cyber Attack on a Factory"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hKw","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/68232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=68232"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/68232\/revisions"}],"predecessor-version":[{"id":68236,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/68232\/revisions\/68236"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=68232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=68232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=68232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}