• Contact
Is Our Reliance on Digital Technology Creating Hidden Safety Vulnerabilities?

Is Our Reliance on Digital Technology Creating Hidden Safety Vulnerabilities?

As industries embrace automation, AI, and digital transformation, they must also navigate hidden safety risks, including cybersecurity threats and reliability challenges.

Jon Wiseman
By
Jon Wiseman

As high-hazard industries like oil and gas, petrochemicals, hydrogen production, and carbon capture increasingly embrace digital technology, automation, and AI, they face a paradox. On one hand, digital systems can enhance safety by reducing human error and enabling real-time monitoring. On the other hand, greater reliance on interconnected software and automated controls is exposing these industries to hidden safety risks that were previously inconceivable.

This article explores how cybersecurity threats and reliability challenges arising from digitalisation could undermine safety, examines notable incidents, and outlines mitigations to strengthen resilience.

Hacker

Cybersecurity Risks in High-Hazard Industries

Hacking and Malware

Digitally controlled industrial operations are increasingly targeted by cyber adversaries. Attacks on industrial control systems (ICS) and operational technology (OT) can result in equipment damage, process upsets, or safety system failures. ICS components—designed for isolated operation—often lack modern security protections, making them vulnerable to malware and cyber intrusions.

A key example is the Stuxnet worm (2010), which disrupted centrifuges in a nuclear facility, physically destroying equipment. More recently, the Triton malware (2017) targeted safety instrumented systems (SIS) at a Saudi petrochemical plant, attempting to disable emergency shutdown controllers. These cases illustrate how digital automation can be weaponized against itself.

Ransomware and Extortion

Ransomware attacks on industrial facilities have surged, with cybercriminals targeting critical infrastructure for financial gain. The Colonial Pipeline attack (2021) resulted in a pre-emptive pipeline shutdown, triggering fuel shortages across the U.S. east coast. A separate incident at a Florida water treatment plant saw an intruder attempt to manipulate chemical dosing, demonstrating the real-world hazards of cyber vulnerabilities.

Anonymous hacker
Cybercriminals target critical infrastructure for financial gain, but they're playing with safety

Insider Threats

Cyber threats are not always external. Disgruntled employees or contractors with system access can manipulate automated systems, override safety interlocks, or disable alarms. A striking example is the Maroochy Shire sewage attack (2000), where a former contractor hacked a sewage SCADA system, causing 265,000 gallons of raw sewage to flood local parks and rivers. This case highlights the need for strict access controls and insider threat mitigation.

Reliability Concerns from Automation and AI

Over-reliance on Automation

Digital systems are designed to enhance safety, but over-dependence can lead to complacency. Operators may place blind trust in automation, failing to notice warning signs or intervene when necessary. This was a factor in the Texas City refinery explosion (2005), where faulty instrumentation and reliance on automated safety systems contributed to a catastrophic incident.

Single Points of Failure

Many industrial facilities centralize control logic within AI-driven or highly automated systems. A software bug, hardware crash, or cyberattack could trigger a widespread failure. Distributed Control Systems (DCS) offer a solution by spreading control functions across multiple units, reducing single points of failure.

Software and Data Integrity

Unlike mechanical components that degrade gradually, software failures can be instantaneous and catastrophic. Bugs, data corruption, or sensor drift can lead to incorrect automated actions. The 1986 Chernobyl disaster was partially caused by operators disabling automated safety systems, demonstrating the critical need for well-calibrated, redundant safety measures.

Case Studies: When Digital Systems Fail Safety

Triton Malware (2017) – Safety System Sabotage

Triton targeted emergency shutdown PLCs at a Saudi petrochemical plant, attempting to disable safety interlocks. Fortunately, a fault triggered a fail-safe shutdown before a catastrophe occurred.

German Steel Mill Attack (2014) – Cyber-Induced Physical Damage

Attackers infiltrated a steel mill’s control systems, causing an uncontrolled shutdown of a blast furnace, leading to massive physical damage.

Colonial Pipeline (2021) – Ransomware Crisis

A ransomware attack led to the shutdown of a major fuel pipeline, affecting supply chains across the U.S. and prompting new cybersecurity regulations.

Strengthening Safety in the Digital Age: Mitigations

Defence-in-Depth Cybersecurity

  • Implement network segmentation to isolate critical ICS from external threats.
  • Adopt IEC 62443 cybersecurity standards to secure OT environments.
  • Regularly update asset inventories and apply security patches where feasible.

Robust Access and Monitoring

  • Enforce multi-factor authentication and role-based access controls.
  • Monitor ICS traffic for anomalies using OT-specific intrusion detection.
  • Conduct cybersecurity incident response drills to ensure rapid threat containment.

System Resilience and Redundancy

  • Ensure fail-safe mechanisms exist in case of control system failures.
  • Implement redundant controllers and safety layers to prevent single points of failure.
  • Use data validation and anomaly detection to flag sensor malfunctions.

Human-in-the-Loop and Training

  • Train operators on manual control procedures in case of automation failures.
  • Conduct simulator-based drills to maintain response readiness.
  • Design intuitive human-machine interfaces (HMIs) that highlight anomalies clearly.

Safety Culture and Regulatory Compliance

  • Integrate cyber risk assessments into process hazard analysis (PHA, HAZOP, LOPA).
  • Align with NIST, ISO 27001, and API cybersecurity frameworks.
  • Establish emergency shutdown protocols for cyber incidents.

Conclusion

The digital transformation of high-hazard industries presents both opportunities and challenges. While automation, AI, and connectivity improve efficiency and safety, they also introduce new vulnerabilities. Cybersecurity and reliability must be integral components of process safety. By learning from past incidents and implementing robust mitigations, industrial operators can harness digital technology without compromising safety.

References: Case studies on cyber-physical threats, best practices from IEC 62443, NIST Cybersecurity Framework, and regulatory actions post-Colonial Pipeline attack.

Sign-up for our newsletter