The cyber risks of RF remote controllers

1 April 2019 Industrial (Industry)

Industrial manufacturers have come to rely a great deal on radio frequency (RF) protocols in their day-to-day functioning. From simple operations such as turning on a motor to more intricate functions like manoeuvring a heavy-duty vehicle, RF forms an integral part of the smooth running of industry.

Signals are sent over the air, which provides an opportunity for cyber criminals and attackers who are equipped with the right RF tools to possibly intercept or commandeer industrial machines and systems. This is a particularly frightening thought when considering that among others, radio frequencies can be used to control cranes, drills and even help miners navigate where they are.

“Trend Micro has done some extensive research into the threats that could compromise RF remote controllers and compiled a research report titled A Security Analysis of Radio Remote Controllers for Industrial Applications. The research has found that it is quite possible to launch a cyber-attack both within and out of RF range. Considering the extensive use of machinery using RF remote controllers, the consequences of such breaches are horrifying,” says Indi Sirinwasa, vice president of Trend Micro, Sub-Saharan Africa.

RF devices are not generally designed with cybersecurity in mind, which is precisely what makes them fair game for malicious actors if they are not properly patched. Industrial machinery tends to have long lifespans and the cost of replacement can be prohibitive. Patching the systems can also be intricate, making it difficult for equipment to be properly secured from attack.

“Industry 4.0 is on the horizon and it will bring us greater connectivity across a multitude of platforms and equipment. This security gap with RF remote controllers poses a massive security risk for a great number of businesses and government institutions. And, it’s often an area that is grossly overlooked when it comes to cybersecurity,” Siriniwasa explains.

System integrators can begin by making their clients aware of the weak points in RF and encourage them to adopt virtual fencing features, which effectively switches off the devices once they are out of range. This cuts down the possibility of remote attack, however, a hacker on site or in range could still gain access through a transmitter and launch an attack.

Increasing security means most likely turning away from proprietary RF protocols and adopting open and standard protocols. It is also important to make sure that configurable pairing in one form another is also available before purchasing any device.

“Changing the fixed ID code every now and again is also a good idea. If possible it’s best to keep the programming computer off the network and failing that, securing it in the same way you would a critical end point. Bluetooth Low Energy is something else to adopt and tamper proof mechanisms also go a long way to prevent reverse engineering. As we fast approach the future of digital industry, security needs to be a foremost concern,” concludes Siriniwasa.

The full report can be downloaded at https://documents.trendmicro.com/assets/white_papers/wp-a-security-analysis-of-radio-remote-controllers.pdf





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Schneider Electric appoints Steven Santini as VP
Power Management Industrial (Industry)
Schneider Electric has appointed Steven Santini as vice president of Secure Power for sub-Saharan Africa. The division acts as the architect of digital resilience, delivering intelligent operational technologies and ecosystems that safeguard critical infrastructure.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Layered security for complex spaces
Regal Security Distributors SA Integrated Solutions Industrial (Industry) Commercial (Industry)
The positive impact of loss prevention and risk management on the bottom line is far more than just a number; it means that assets are physically secure, insurance premiums remain low, and people are protected.

Read more...
Can AI improve operational challenges?
AI & Data Analytics Industrial (Industry)
AI offers local manufacturers an answer to a growing list of operational challenges. The increasing sophistication of AI solutions could not come at a better time for South African manufacturers, who are grappling with declining sales and the uncertainty of global trade.

Read more...
Cybersecurity a challenge in digitalising OT
Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Security and privacy: Is one without the other possible?
IoT & Automation Industrial (Industry)
OEMs have a duty to protect privacy as much as security. If security protection is about keeping people out of an embedded device, privacy protection safeguards the data inside the device.

Read more...
How intrusion protection helps secure O&G operations
Axis Communications SA Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
How intrusion protection helps secure O&G operations
Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
New AI advisor for robot selection
News & Events Industrial (Industry) AI & Data Analytics
Igus’ new AI chatbot has been added to its online platform to enable companies with little previous experience and technological expertise to quickly and reliably put together Low-Cost Automation (LCA) solutions to become more competitive.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.