The adoption of Industry 4.0 and IIoT technologies has brought many benefits to industrial operations but also new risks and challenges.
Cloud-based management platforms of IIoT devices can act as a backdoor for malicious actors, compromising multiple industrial environments. Our research focuses on the vulnerabilities present in these platforms and suggests practical recommendations for asset owners, security architects, and IIoT vendors.
Discover how cloud-based platforms for IIoT gateways can be exploited by malicious actors to bypass security measures and gain access to multiple critical environments at once. This technical whitepaper focuses on three major suppliers – Sierra Wireless, Teltonika Networks, and InHand Networks.
The vulnerabilities discovered in this whitepaper were presented by OTORIO Security Researcher Roni Gavrilov at Black Hat Asia on Friday, May 12th, during the presentation: Cloudy With a Chance of Exploits: Compromising Critical Infrastructure Through IIoT Cloud Solutions.
Ensure safe, resilient, and compliant business operations
Book a Demo
OTORIO empowers operational & security teams to proactively manage digital risks and build resilient operations via a technology-enabled ecosystem.
Platform