Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementPhysical SecurityCybersecurity News

The rise of phygital attacks on critical infrastructure — and how to stop them

By Will Plummer
riskmanagement-fp1170x658v57.jpg

Image by user16766420 via Freepik

August 5, 2022

Certain industries and infrastructure are absolutely critical to the way we live life. For example, utilities, health care, emergency services, and supply chains all fall under the heading of critical infrastructure. Unfortunately, that means these sectors are at the greatest risk of being targeted by cyberterrorists. 


One relatively new form of cyberattack is the “phygital” attack, which bridges “physical” and “digital” access points. Often these phygital attacks come in the form of an innocuous-looking USB drive or a microcomputer sent through the mail. Once the packages are on site, the devices concealed inside them attempt to access the local networks and collect sensitive data. Or, once an employee plugs in that innocent-looking USB device, it can start to spread malware through a company’s critical information systems. 


Phygital attacks are becoming more common, and they’re a serious threat to critical infrastructure. What do these phygital attacks entail? And what can chief security officers (CSOs), chief information security officers (CISOs), and other security personnel do to protect companies against them? 


The Rising Phygital Threat

Phygital attacks are so effective because, although everyone is aware of the need to prioritize cybersecurity for critical infrastructure, the physical aspects of security remain under-addressed. When was the last time you worried about the contents of the packages lying on your employees’ desks while they’re out of the office? Or have you ever given a second thought to that pile of mail near your servers? Both of these situations could increase your risk of a devastating phygital attack. 


Phygital attacks come in many different forms. The FBI recently warned about the risk of phygital attacks that come through malicious USB drives disguised as official communications. And there’s been a lot more awareness about the phygital threat as physical Internet of Things (IoT) devices like smartwatches and even smart cars abound, increasing the number of entry points into your network. 


The mailroom provides a major entry point for phygital attacks. Phygital threats that come through the mail are often called “warshipping” attacks, a term coined by IBM in 2019. These attacks can employ any internet-enabled physical device, from a smartwatch to a miniature computer like a Raspberry Pi. These devices attach themselves to your network to eavesdrop on communications, sniff out sensitive packets of data, and discover vulnerable access points. The risk of warshipping is aggravated in a remote or hybrid work environment, when many employees have their packages shipped directly to their workplace, only to have them sit on desks and in mailrooms for days or weeks before employees come in to pick them up. 


What’s worse, you may not even know you’ve fallen victim to such an attack. In some cases, warshipping devices end up in your mailroom marked with the wrong address, sit there gathering data for a while until they’re finally processed, then get returned to the original sender who now has access to all the information they could want. And all this can happen without you ever discovering the device exists. 


It’s time to increase awareness about phygital risks so these threats don’t slip by your security measures. As part of moving in that direction, Cybersecurity and Infrastructure Security Agency (CISA) recently recommended that businesses that are any part of critical infrastructure develop measures to combat phygital security breaches. 


Cyberthreats have already targeted major utility systems. In May of 2021, the Colonial Pipeline ransomware attack resulted in increased awareness of the danger when a major American oil pipeline had to shut down for days, causing a national state of emergency. This attack earned the dubious status of being the largest ever of its kind. But it’s far from the only such attack. Today, 40% of critical infrastructure suppliers have experienced attempted shutdowns. There needs to be a comprehensive strategy to respond. 


What Can You Do in Response? 

Stopping phygital attacks isn’t something you can do overnight. It requires a strategy. Here are some steps you can consider: 

  • Process mail upon arrival. Prioritize catching up with your backlog of mail so you can weed out potential threats as soon as they arrive. Any mail with incorrect addresses should be immediately processed and returned, and used packing material and boxes should be removed from the facility and discarded. 
  • Educate employees about the danger. There are major gaps in most employees’ awareness when it comes to phygital threats. Consider requesting that your employees ship personal packages to their homes instead of their offices. And be sure that they know not to insert any unfamiliar USB drive. 
  • Screen all mail for threats. You can start by simply visually inspecting mail for anything that looks unusual or suspicious. You can feel envelopes to see if they might contain USB drives or small warshipping hacking devices. You can also use a metal detector or mail scanner to check for electronics without opening packages. 
  • Monitor networks for unusual activity. With network monitoring and intrusion detection software, you can often detect phygital attacks through any abnormal activity. Telltale signs to look for include the sudden appearance of suspicious or unknown files or the sudden lockdown of user accounts. The sooner you can spot a phygital attack, the more you can mitigate any damage.


Cybersecurity threats, and phygital attacks in particular, will only become more common. In fact, from 2020 to 2021, the number of breaches increased by 10% in the U.S. alone. It would be a mistake to focus all of your attention on cybersecurity without addressing physical security as well. And in the case of critical infrastructure, that mistake could endanger whole economies and countries. It’s not a risk that should be taken lightly.


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: critical infrastructure cyber security Mail screening physical security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

William plummer

Will Plummer, is military veteran and Chief Security Officer at mail screening technology provider RaySecur.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • identity-security

    The top identity-based attacks and how to stop them: Part 1

    See More
  • phishing-fp1170x658v90.png

    The top identity-based attacks and how to stop them: Part 2

    See More
  • cybersecurity breach

    The election’s over, but threats to government and critical infrastructure don’t stop

    See More

Events

View AllSubmit An Event
  • September 25, 2024

    How to Incorporate Security Into Your Company Culture

    ON DEMAND: From this webinar, you will learn how to promote collaboration between IT and physical security teams to streamline corporate security initiatives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!