PDA

View Full Version : New threat: Hackers look to take over power plants



MNeagle
4th August 2010, 06:00 AM
WASHINGTON – Computer hackers have begun targeting power plants and other critical operations around the world in bold new efforts to seize control of them, setting off a scramble to shore up aging, vulnerable systems.

Cyber criminals have long tried, at times successfully, to break into vital networks and power systems. But last month, experts for the first time discovered a malicious computer code — called a worm — specifically created to take over systems that control the inner workings of industrial plants.

In response to the growing threat, the Department of Homeland Security has begun building specialized teams that can respond quickly to cyber emergencies at industrial facilities across the country.

As much as 85 percent of the nation's critical infrastructure is owned and operated by private companies, ranging from nuclear and electric power plants to transportation and manufacturing systems. Many of the new attacks have occurred overseas, but the latest episode magnified worries about the security of plants in the U.S.

"This type of malicious code and others we've seen recently are actually attacking the physical components, the devices that open doors, close doors, build cars and open gates," said Sean McGurk, director of control systems security for Homeland Security. "They're not just going after the ones and zeros (of a computer code), they're going after the devices that actually produce or conduct physical processes."

Officials have yet to point to any operating system that has been compromised by the latest computer worm. But cyber experts are concerned that attacks on industrial systems are evolving.

In the past, it was not unusual to see hackers infiltrate corporate networks, breaking in through gaps and stealing or manipulating data. The intrusions, at times, could trigger plant shutdowns. The threat began to escalate last year, with cyber criminals exploiting weaknesses in systems that control what the industries do.

The latest computer worm, dubbed Stuxnet, was an even more alarming progression. Now hackers are creating codes to actually take over the critical systems.

In many cases, operating systems at power plants and other critical infrastructure are decades old. Sometimes they are not completely separated from other computer networks used by companies to run administrative systems or even access the Internet.

Those links between the administrative networks and the control systems provide gateways for hackers to insert malicious codes, viruses or worms into the programs that operate the plants.

Sitting in his office not far from Homeland Security's new state-of-the-art cyber operations center, McGurk recently held out a small blue computer flash drive containing the destructive Stuxnet worm.

Experts in Germany discovered the worm, which has since shown up in a number of attacks — primarily in Iran, Indonesia, India, and the U.S., according to Microsoft. Stuxnet had tried to infect as many as 6,000 computers, as of July 15, according to Microsoft data.

German officials transmitted the malware to the U.S. through a secure network, and experts at the Energy Department's Idaho National Laboratory began to analyze it.

In plain terms, the worm was able to burrow into some operating systems that included software designed by Siemens AG, by exploiting a vulnerability in several versions of Microsoft Windows.

On Monday, Microsoft released another update to address the problem, and Siemens has taken similar steps.

Annual reports issued by Homeland Security and the Department of Energy have detailed weaknesses in the industrial computer systems, and have repeatedly pressed companies to improve security practices. Reports as recently as this May urged companies to routinely download patches to update software, change and improve passwords, carefully restrict access to critical systems and use firewalls to separate commonly used networks from those that control key systems.

A successful attack against a critical control systems, the Energy Department warned in its May report, "may result in catastrophic physical or property damage and loss."

Over the past year, Homeland Security has quietly been deploying teams of experts around the country to assess weaknesses in industrial control systems. The agency has created four teams and — with a budget scheduled to increase from $10 million this year to $15 million next year — has plans to grow to 10 teams in 2011.

The teams are armed with a $5,000 kit: a black, suitcase-sized bag crammed with cables, converters, data storage and high-tech computer forensic tools. With that equipment, they can download the problem malware, analyze it and work with the companies to correct or clean their systems.

So far, said McGurk, the teams have done 50 assessments and have been dispatched 13 times to investigate and help correct cyber incidents and attacks. Nine of those cases involved some type of deliberate cyber intrusion, while the other four were the unintended result of an operator's action.

In one of the nine intrusion cases, a company representative had gone to a conference and had the presentation documents downloaded onto a computer flash drive.

One of the files was infected with the Mariposa botnet, a malicious software code that has infected 12 million computers worldwide, including hundreds of companies and at least 40 major banks in 190 countries since appearing in December 2008.

When the man returned to his office and connected his laptop to the company's network, the botnet spread, eventually affecting nearly 100 computers.

A Homeland Security team was called in and helped the company evaluate the problem and begin to clear up the system.

http://news.yahoo.com/s/ap/20100803/ap_on_bi_ge/us_cyber_threats_power_plants

DMac
4th August 2010, 06:24 AM
WASHINGTON – Computer hackers have begun targeting power plants and other critical operations around the world in bold new efforts to seize control of them, setting off a scramble to shore up aging, vulnerable systems.

Cyber criminals have long tried, at times successfully, to break into vital networks and power systems. But last month, experts for the first time discovered a malicious computer code — called a worm — specifically created to take over systems that control the inner workings of industrial plants.

In response to the growing threat, the Department of Homeland Security has begun building specialized teams that can respond quickly to cyber emergencies at industrial facilities across the country.

As much as 85 percent of the nation's critical infrastructure is owned and operated by private companies, ranging from nuclear and electric power plants to transportation and manufacturing systems. Many of the new attacks have occurred overseas, but the latest episode magnified worries about the security of plants in the U.S.

"This type of malicious code and others we've seen recently are actually attacking the physical components, the devices that open doors, close doors, build cars and open gates," said Sean McGurk, director of control systems security for Homeland Security. "They're not just going after the ones and zeros (of a computer code), they're going after the devices that actually produce or conduct physical processes."

Officials have yet to point to any operating system that has been compromised by the latest computer worm. But cyber experts are concerned that attacks on industrial systems are evolving.

In the past, it was not unusual to see hackers infiltrate corporate networks, breaking in through gaps and stealing or manipulating data. The intrusions, at times, could trigger plant shutdowns. The threat began to escalate last year, with cyber criminals exploiting weaknesses in systems that control what the industries do.

The latest computer worm, dubbed Stuxnet, was an even more alarming progression. Now hackers are creating codes to actually take over the critical systems.

In many cases, operating systems at power plants and other critical infrastructure are decades old. Sometimes they are not completely separated from other computer networks used by companies to run administrative systems or even access the Internet.

Those links between the administrative networks and the control systems provide gateways for hackers to insert malicious codes, viruses or worms into the programs that operate the plants.

Sitting in his office not far from Homeland Security's new state-of-the-art cyber operations center, McGurk recently held out a small blue computer flash drive containing the destructive Stuxnet worm.

Experts in Germany discovered the worm, which has since shown up in a number of attacks — primarily in Iran, Indonesia, India, and the U.S., according to Microsoft. Stuxnet had tried to infect as many as 6,000 computers, as of July 15, according to Microsoft data.

German officials transmitted the malware to the U.S. through a secure network, and experts at the Energy Department's Idaho National Laboratory began to analyze it.

In plain terms, the worm was able to burrow into some operating systems that included software designed by Siemens AG, by exploiting a vulnerability in several versions of Microsoft Windows.

On Monday, Microsoft released another update to address the problem, and Siemens has taken similar steps.

Annual reports issued by Homeland Security and the Department of Energy have detailed weaknesses in the industrial computer systems, and have repeatedly pressed companies to improve security practices. Reports as recently as this May urged companies to routinely download patches to update software, change and improve passwords, carefully restrict access to critical systems and use firewalls to separate commonly used networks from those that control key systems.

A successful attack against a critical control systems, the Energy Department warned in its May report, "may result in catastrophic physical or property damage and loss."

Over the past year, Homeland Security has quietly been deploying teams of experts around the country to assess weaknesses in industrial control systems. The agency has created four teams and — with a budget scheduled to increase from $10 million this year to $15 million next year — has plans to grow to 10 teams in 2011.

The teams are armed with a $5,000 kit: a black, suitcase-sized bag crammed with cables, converters, data storage and high-tech computer forensic tools. With that equipment, they can download the problem malware, analyze it and work with the companies to correct or clean their systems.

So far, said McGurk, the teams have done 50 assessments and have been dispatched 13 times to investigate and help correct cyber incidents and attacks. Nine of those cases involved some type of deliberate cyber intrusion, while the other four were the unintended result of an operator's action.

In one of the nine intrusion cases, a company representative had gone to a conference and had the presentation documents downloaded onto a computer flash drive.

One of the files was infected with the Mariposa botnet, a malicious software code that has infected 12 million computers worldwide, including hundreds of companies and at least 40 major banks in 190 countries since appearing in December 2008.

When the man returned to his office and connected his laptop to the company's network, the botnet spread, eventually affecting nearly 100 computers.

A Homeland Security team was called in and helped the company evaluate the problem and begin to clear up the system.

http://news.yahoo.com/s/ap/20100803/ap_on_bi_ge/us_cyber_threats_power_plants


1. The first line made me LOL. "hackers have begun targeting" begun? Welcome to 10 years ago. New threat? This was a problem that should have been addressed a decade ago.

2. Gratuitous use of the word cyber. I don't think there is an IT professional worth his/her salt that doesn't shudder every time that word is uttered. No one in the security biz actually says cyber. Welcome to AOL 3.0

3. Idiot sys admins left key components of the power grid accessible to the internet. Let me repeat IDIOT MORON OVER PAID SYS ADMINS left key....you get the point. You all would be amazed how dumb most admins were 10 years ago when designing these key infrastructures. Also remember that you cannot cure stupid. These folks are still around.

4. "They're not just going after the ones and zeros (of a computer code), they're going after the devices that actually produce or conduct physical processes." They are not going after the ones and zeros? Tell me Ms. Baldor, how exactly are they going after devices without using flawed code? Go go gadget telekenesis?

5. "Stuxnet had tried to infect as many as 6,000 computers" There are kids that can infect 10 times that many machines in short order. There are several, million++ botnet armies across the world waiting for orders from their masters right now, where the computer owners are unaware their machine is compromised..

6. "Don't worry, daddy gov is on it and we are increasing funding!" :oo-->

7. Author seems to have seen Die Hard 4 too many times. Gov fear mongering IMO, more fodder for the internet false flag.

Glass
4th August 2010, 07:44 AM
wasn't it a cyber attack that caused that cascading power failure across North America... as Dmac says, about 10 years ago? Remember that? They said one failure caused overloads on other grid interchanges because the load was automatically diverted through other links. That simply doesn't just "happen". Man these guys are really getting piss weak.

Ironfield
4th August 2010, 10:29 PM
DMac aptly sums up the article. It just goes to show how bad an idea it is to have all your eggs in one basket. especially one as flawed as the current utility systems network infrastructure.

Regarding hackers, a website that I like to frequent, among others on the subject matter is http://www.defcon.org/ they recently finished hosting Defcon 18 this year and i would recommend to all to visit the site and see what the threats are and countermeasures used to protect your data.

the most important one at the moment in my opinion is the issue of RFID chips and just how easily the data they transmit is captured. With $50 one could build themselves a compact device to pull the data.

-Ironfield

MNeagle
5th August 2010, 06:51 PM
DMac aptly sums up the article. It just goes to show how bad an idea it is to have all your eggs in one basket. especially one as flawed as the current utility systems network infrastructure.

Regarding hackers, a website that I like to frequent, among others on the subject matter is http://www.defcon.org/ they recently finished hosting Defcon 18 this year and i would recommend to all to visit the site and see what the threats are and countermeasures used to protect your data.

the most important one at the moment in my opinion is the issue of RFID chips and just how easily the data they transmit is captured. With $50 one could build themselves a compact device to pull the data.
-Ironfield




That would be a great thread idea once those RFID chips are closer to implementation!! (hint, hint)

Phoenix
5th August 2010, 10:02 PM
wasn't it a cyber attack that caused that cascading power failure across North America... as Dmac says, about 10 years ago? Remember that? They said one failure caused overloads on other grid interchanges because the load was automatically diverted through other links. That simply doesn't just "happen". Man these guys are really getting piss weak.


July 1996.

I told people then it was "engineered."