Interview

‘Operational disruption’ the main cybersecurity threat in mining

John Price, CEO of infrastructure cybersecurity firm SubRosa, discusses the main threats in the mining sector with Alex Blair.

John Price, CEO, SubRosa.

M​​​​​​​ining companies may not be an obvious target for cyberattacks, but the results of a successful hack can be disastrous. 

From operational shutdowns to health and safety risks, a rising number of mining firms are placing higher priority on cybersecurity systems as the sector becomes increasingly digitised. 

We spoke to John Price, CEO of infrastructural cybersecurity firm SubRosa, whose background lies in both the military and corporate sectors. From Price's roles as a counterintelligence agent and signals intelligence analyst in the British Army to managing cyber risks for PNC Financial Services Group, he has overseen robust security protocols and navigated varied threats for decades.

Alex Bair: What are the most pressing concerns around cybersecurity in the mining industry?

John Price:​​​​​​​ Among the most pressing concerns around cybersecurity in the mining industry is operational disruption. Many mining operations depend on interconnected systems and automation. A cyberattack can disrupt these systems, leading to costly downtimes and safety hazards.  

There's also the theft of sensitive data – mining companies possess sensitive data including exploration data, financial records, and personal information of employees. Cyber threats aim to steal such valuable data. 

Ransomware attacks are increasingly common in the mining industry, with attackers locking access to critical data or systems and demanding a ransom to release them – as are supply chain vulnerabilities, due to the mining industry's reliance on a global supply chain which makes it susceptible to cybersecurity threats that target less secure parts of the supply chain. 

Finally, compliance risks. Regulatory compliance related to data protection and privacy, such as GDPR, requires mining companies to safeguard certain types of data, adding complexity to cybersecurity efforts.

Alex Bair: How do cybergangs cause operational disruption in mining processes?

John Price:​​​​​​​ Cybergangs cause operational disruptions in mining processes primarily through ransomware and malware attacks, infecting industrial control systems with malicious software that can shut down operational technologies.  

There are also DDoS attacks, which overload the network with traffic, causing systems managing operational processes to slow down or crash. Then there's system infiltration: gaining unauthorised access to control systems to maliciously alter processes, leading to unsafe mining conditions or complete operational shutdown.

Alex Bair: Can you provide an example of a major cyberattack in the mining industry?

John Price: A notable example occurred in 2020 when Goldcorp, a major gold mining company, suffered a data breach where hackers stole around 14.8GB of private employee data and other sensitive company information. This incident exposed personal details of thousands of employees, underscoring the cybersecurity vulnerabilities in the mining industry.

Alex Bair: What vector form do these cyberattacks take?

John Price:​​​​​​​ Cyberattacks in the mining industry typically take one of four forms. Firstly, phishing – sending fraudulent communications that appear to come from a reputable source to steal sensitive data like login credentials. There's also spear phishing, when targeted phishing attacks aimed at specific individuals with access to critical systems or sensitive information. 

A third vector is network penetration: exploiting vulnerabilities in the software used by mining companies to gain unauthorised access. Finally, insider threats: employees or contractors misusing their access to systems for malicious purposes or unintentionally causing a security breach.

Alex Bair: Which mining companies are ahead of the curve when it comes to cybersecurity?

John Price: Leading mining companies in cybersecurity often include those who invest heavily in securing their IT and operational technology (OT) environments. Companies like BHP and Rio Tinto have been recognized for their proactive steps in cybersecurity. They implement comprehensive cybersecurity strategies that include risk management, regular security assessments, advanced threat detection systems, and robust incident response plans.

Go to article: Home | Smart monitoringGo to article: Editor's letterGo to article: ContentsGo to article: HINDSITE Company InsightGo to article: myosh Company InsightGo to article: BriefingGo to article: News in NumbersGo to article: Latest NewsGo to article: Latest DealsGo to article: Pirtek Fluid Systems Company InsightGo to article: Dotmar Engineering Company InsightGo to article: KSB Australia Company InsightGo to article: In DepthGo to article: Digital tools for tailings monitoringGo to article: Supporting a miner's family after a work-related fatalityGo to article: Water management in the Pilbara - time for a strategic approach?Go to article: QME 2024 Wrap Up: Uniting Minds and Machines in MiningGo to article: The future of Australia's iron ore industryGo to article: Discovery of sulphur on Mars could boost the space economyGo to article: Bellridge Company InsightGo to article: URSYS Company InsightGo to article: Steuler KCH Australia Company InsightGo to article: Thematic Take: CybersecurityGo to article: Thematic Take: contentsGo to article: Foreword: Cybersecurity in the age of AI Go to article: Navigating the AI-driven cybersecurity landscapeGo to article: Key trends impacting cybersecurity Go to article: Timeline: a history of cybersecurity Go to article: Explainer: The most common types of cyberattacks Go to article: The impact of cybersecurity on miningGo to article: Case studies: cybersecurity in miningGo to article: Leading cybersecurity adopters and vendors in miningGo to article: AI attacks now ‘the main cybersecurity concern’ for businesses across sectors Go to article: The state of cybersecurity: AI and geopolitics mean a bigger threat than ever Go to article: Companies’ own AI applications are ‘a huge cybersecurity problem’ Go to article: Proactive approach to cybersecurity key for minesGo to article: ‘Operational disruption’ the main cybersecurity threat in miningGo to article: Why the mining sector should prioritise investment in cybersecurityGo to article: Will the Northern Sea Route become commercially viable in the near future?Go to article: Deal activity related to cybersecurity in the mining industry since 2021Go to article: Regulators must protect the cybersecurity market from a private equity takeover Go to article: GlobalData Thematic IntelligenceGo to article: Sponsored SupplementsGo to article: ListingsGo to article: EventsGo to article: Introducing the Mining Technology Excellence Awards 2024Go to article: Innovation RankingsGo to article: Buyer's GuidesGo to article: Next issue