Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceFire & Life SafetyInfrastructure:Electric,Gas & Water

Defending against killware: The cyber threat with physical consequences

By Dennis Lanahan
hacker codes killware
January 28, 2022

Even though data breaches, ransomware attacks and other cyber threats have become part of daily life, many organizations still get caught by surprise. Some, perhaps believing it won’t happen to them, still refuse to put money in the budget for cybersecurity. Others put their trust in outdated technology or rely on cybersecurity insurance policies to bail them out after a breach.

No matter what missteps leave a company vulnerable, the results are predictable: a struggle to pick up the pieces after an attack, with financial and operational costs that can linger for years. And hopefully, the organization learns its lesson and implements effective cybersecurity going forward.

But when the impacts of an attack become life and death, there are no second chances. 

“Killware” attacks — cyberattacks that aim to cause direct physical damage and bodily harm — are a serious concern for critical infrastructure operators such as oil and gas pipelines, water systems, power generators and medical facilities. Protecting against these threats requires a different mindset, one that focuses on preventing the attack in the first place, rather than mitigating the damage afterward.

What is killware?

A killware attack is fundamentally different from other types of cyberattack. Rather than attempting to steal information, disrupt computer networks, or encrypt data for ransom, killware attacks attempt to cause real-world damage by manipulating operational technology (OT) — the valves, pumps, turbines and other equipment that keeps our world running. 

The 2021 attack against the Oldsmar, Florida’s water system is an example of this kind of attack, though fortunately no one was harmed in that case. The Oldsmar attacker gained access to the water treatment plant’s control systems and increased the amount of sodium hydroxide being added to the water by a factor of 100 — an amount that would have been hazardous if the attack had not been detected in time.

In the past, attacks against industrial control systems required physical access to a facility because few OT devices were connected to external networks. But with the rise of smart, cloud-enabled OT devices, the landscape has changed. Threat actors have millions of new devices to target and new pathways to reach them. 

We can’t simply hope that someone will detect the next killware attack before the damage is done. OT devices need cybersecurity that is strong enough to prevent threat actors from gaining access in the first place.  

Industry standards provide valuable guidance

There are several standards that provide direction on how to protect critical infrastructure. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) regularly updates its guidance on protecting critical systems, including its publication Seven Steps to Effectively Defend Industrial Control Systems. The North American Electric Reliability Corporation’s (NERC) Critical Infrastructure Protections for balancing physical security and cybersecurity have been used extensively within the electrical industry and can be used as a cybersecurity framework in other sectors like transportation and pipeline security.

There is a huge body of evidence around the implementation of these controls and the mitigations they provide that are beneficial for other industries to consider. Two concepts are particularly important:  limiting external routable communication and limiting interactive remote access.

Hardware-enforced security makes killware ineffectual

Along with these well-established best practices, technology plays a major role in stopping killware attacks.

The open nature of software firewalls, which can be frequently hacked or with rules accidentally left open, unfortunately enables vulnerabilities and introduces new threat vectors. Monitoring and threat detection tools remain important, but many only reveal attacks after the fact.

With hardware-enforced network segmentation, often achieved through one-way-only data flow technology known as data diodes, data can securely flow out of a source network to an external destination without introducing risk. Organizations employing an air-gapped architecture can connect externally through hardware-enforced technology that prevents threats from entering back into the network. In fact, the Department of Homeland Security (DHS) recommends eliminating as many connections as possible in critical infrastructure networks and, if connections are needed, converting them to a one-way out only architecture. That means hardware-enforce data diodes can lock down critical infrastructure devices and networks to prevent successful killware attacks.

It takes an ecosystem

Safety is the number one principle at all critical infrastructure facilities, and cybersecurity is a major component of that safety. With deadly new threats proliferating, operators simply must harden their cyber posture to protect their most important assets and data flows. Cybersecurity is a team sport: entities large and small throughout the supply chain are also vulnerable as potential conduits to the operator target. Everyone needs to understand their role and embrace prevention in earnest.

The good news is that by leveraging available standards and integrating proven hardware-enforced technologies as part of a defense-in-depth strategy, killware can be stopped.

KEYWORDS: critical infrastructure cybersecurity cyber attack cyber defense cyber security threat malware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dennis Lanahan is the Vice President for Critical Infrastructure Markets at Owl Cyber Defense.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber Liability Insurance: Moving from Insurance to Assurance; cyber security news

    How to protect businesses against the threat of ransomware attacks and the role of cyber insurance

    See More
  • insider threats freepik

    Defending against insider threats in a remote world

    See More
  • SEC1119-awareness-Feat-slide1_900px

    Defending Against Ransomware: The Growth of Targeted Attacks

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing