MARKETS

Beware of cyber hacking: EY

CYBER hacking may become a top 10 strategic risk for companies, global advisory firm EY has warned the mining sector.

Kristie Batten

The EY paper, Cyber hacking and information security: mining and metals, released today, highlighted the increasing risks for companies.

EY Oceania Mining & Metals advisory leader Nathan Roost said the increased importance of the sector in global supply chains made it a target, while the increasing reliance of companies on technology made it more exposed.

“Cyber hacking targets are no longer just the big names, many more companies across the sector are now vulnerable,” he said.

“Mining companies are becoming far more reliant on integrated IT systems in their drive to improve productivity and bring down costs, and this makes them more exposed and vulnerable to cyber- attacks.

“At the same time, the relative importance these commodities play in global, regional and local supply chains means the companies have become priority targets and this is exacerbated by the extreme price volatility we expect to continue for the next 2-3 years.”

In EY’s recent Global Information Security Survey 2013-2014, 41% of mining and metals sector respondents reported an increase in external cyber threats in the past 12 months, while a further 28% identified internal vulnerabilities.

EY identifies three types of groups likely to target mining and metals companies – criminals, national governments and hacktivists.

“This means many companies who previously thought they would not be targets are now vulnerable,” he said.

Roost said it was not just an IT issue.

“The risk is heightened by the centralised nature of many business functions across supply chains now and the dependence of operations on sophisticated IT systems,” he said.

“A top down approach from the board and executive is needed to ensure the issues and threats are understood and addressed.”

EY cited an example of a mining company which used a SCADA system to control the operations of certain assets involved in the logistics and product chain.

After an equipment reliability issue, the company undertook an exercise to compare the current system source code with an unedited version to check if changes made were impacting reliability and found unauthorised malicious changes had been unintentionally uploaded into the source code from a maintenance contractor’s laptop.

The changes were designed to disable the auto-shutdown protections of the equipment and thereby allow the destruction of the equipment, with a date trigger embedded in the code.

“The increasing prevalence of cyber-hacking means companies need to identify and assess the likely threat to their organisation and mitigate accordingly,” said Roost.

TOPICS:

A growing series of reports, each focused on a key discussion point for the mining sector, brought to you by the Mining Monthly Intelligence team.

A growing series of reports, each focused on a key discussion point for the mining sector, brought to you by the Mining Monthly Intelligence team.

editions

Mining Magazine Intelligence Future Fleets Report 2024

The report paints a picture of the equipment landscape and includes detailed profiles of mines that are employing these fleets

editions

Mining Magazine Intelligence Digitalisation Report 2023

An in-depth review of operations that use digitalisation technology to drive improvements across all areas of mining production

editions

Mining Magazine Intelligence Automation Report 2023

An in-depth review of operations using autonomous solutions in every region and sector, including analysis of the factors driving investment decisions

editions

Mining Magazine Intelligence Exploration Report 2023 (feat. Opaxe data)

A comprehensive review of current exploration rates, trending exploration technologies, a ranking of top drill intercepts and a catalogue of 2022 Initial Resource Estimates and recent discovery successes.