Keyword: scada
-
Every single day our electrical grid remains vulnerable, we are in grave danger. Almost 50,000 Duke Power customers in Moore County, N.C. were left in the dark on Sunday night in what has been called a domestic act of terrorism. A curfew is running from 9 P.M. to 5 A.M. as schools close and crime spikes. Most customers remain without heat, refrigeration, and water. Duke Energy spokesman Jeff Brooks said, "We are looking at a pretty sophisticated repair with some fairly large equipment and so we do want citizens of the town to be prepared that this will be a...
-
Internet-connected industrial devices could be accessible to anyone, with no password, thanks to a coding error by a gateway manufacturer. Taiwanese firm Advantech patched the firmware in some of its serial-to-IP gateway devices in October to remove a hard-coded SSH (Secure Shell) key that would have allowed unauthorized access by remote attackers. But it overlooked an even bigger problem: Any password will unlock the gateways, which are used to connect legacy serial devices to TCP/IP and cellular networks in industrial environments around the world. Researchers from security firm Rapid7 discovered the vulnerability in the revised firmware, version 1.98, released for...
-
German-owned Patriot missiles stationed in Turkey were briefly taken over by hackers, according to media reports on Tuesday.The attack took place on anti-aircraft ‘Patriot’ missiles on the Syrian border. The American-made weapons had been stationed there by the Bundeswehr (German army) to protect Nato ally Turkey. According to the civil service magazine, the missile system carried out “unexplained” orders. It was not immediately clear when these orders were carried out and what they were. The magazine speculates about two weak spots in the missile system which could be exploited by hackers. One such weakness is the Sensor-Shooter-Interoperability (SSI) which exchanges...
-
Nearly four years since Stuxnet broke onto the scene, F-Secure has discovered another series of attacks against industrial control systems -- this time aiming at mostly European organizations. The attackers' ultimate motives are unclear. Researchers suspect they are simply gathering intelligence in preparation for a more serious attack. The attackers are infecting SCADA and ICS systems with the HAVEX remote access tool (mostly used for information gathering), using a unique infection vector. Once HAVEX is installed, it calls back to its command-and-control servers -- which are mostly unrelated third-party websites and blogs that the attackers have compromised -- and receives...
-
Over the past few months, the discoveries of two engineers have led to a steady trickle of alarms from the Department of Homeland Security concerning a threat to the nation’s power grid. Yet hardly anyone has noticed. The advisories concern vulnerabilities in the communication protocol used by power and water utilities to remotely monitor control stations around the country. Using those vulnerabilities, an attacker at a single, unmanned power substation could inflict a widespread power outage. Still, the two engineers who discovered the vulnerability say little is being done. Adam Crain and Chris Sistrunk do not specialize in security. The...
-
WASHINGTON – The United States now is facing two serious national security challenges, but they aren’t expected to be addressed effectively because of the serious budgetary headaches Congress has created, and a virtually deadlocked legislature on just about every issue pending, according to report from Joseph Farah’s G2 Bulletin. And the White House apparently isn’t paying attention. The first is the growing concern of the impact that an electromagnetic pulse, or EMP, event – either natural or manmade – could have on the national grid system, on which the Department of Defense has a 99 percent dependency. The other concern...
-
Foreign hackers broke into a water plant control system in Illinois last week and damaged a water pump in what appears to be the first reported case of a malicious cyber attack damaging a critical computer system in the United States, according to an industry expert. On Nov. 8, a municipal water district employee in Illinois noticed problems with the city’s water pump control system, and a technician determined the system had been remotely hacked into from a computer located in Russia, said Joe Weiss, an industry security expert who obtained a copy of an Illinois state fusion center report...
-
SNIPPET: "In July, the British government warned that Al Qaeda’s exploitation of social networking websites is on the rise." SNIPPET: "The massive and multifarious network of websites and social media has presented a challenge to authorities in trying to combat it. Additionally, civil liberty concerns have conflicted with government efforts to spy on communications. Reducing terrorist activity on social media sites has been particularly difficult because users have adopted new forms of communication to conform with the new formats. Many Arabic speakers on Facebook, Twitter, MySpace and other sites use Arabizi, a form of colloquial Arabic written in the Latin...
-
Amid the mass of published analysis of the Stuxnet virus, Iran's most obvious vulnerability to cyber-war has drawn little comment: much of the Islamic Republic runs on pirated software. The programmers who apparently cracked Siemens' industrial control code to plant malware in Iran's nuclear facilities needed a high degree of sophistication. Most Iranian computers, though, run on stolen software obtained from public servers sponsored by the Iranian government. It would require far less effort to bring about a virtual shutdown of computation in Iran, and the collapse of the Iranian economy. The information technology apocalypse that the West feared on...
-
TEHRAN, Iran – Iran acknowledged Saturday that some personnel at the country's nuclear facilities were lured by promises of money to pass secrets to the West but insisted increased security and worker privileges have put a stop to the spying. The stunning admission by Vice President Ali Akbar Salehi provides the clearest government confirmation that Iran has been fighting espionage at its nuclear facilities. In recent weeks, Iran has announced the arrest of several nuclear spies and battled a computer worm that it says is part of a covert Western plot to derail its nuclear program. And in July, a...
-
The Stuxnet worm has taken the computer security world by storm, inspiring talk of a top secret, government-sponsored cyberwar, and of a software program laden with obscure biblical references that call to mind not computer code, but "The Da Vinci Code." Stuxnet, which first made headlines in July, (CNET FAQ here) is believed to be the first known malware that targets the controls at industrial facilities such as power plants. At the time of its discovery, the assumption was that espionage lay behind the effort, but subsequent analysis by Symantec uncovered the ability of the malware to control plant operations...
-
Stuxnet is a Windows-specific computer worm first discovered in June 2010 by VirusBlokAda, a security firm based in Belarus. It is the first discovered worm that spies on and reprograms industrial systems. It was specifically written to attack Supervisory Control And Data Acquisition (SCADA) systems of the type used to control and monitor industrial processes.
-
(Sept. 30) -- The intrigue surrounding the mysterious, highly sophisticated computer worm Stuxnet got a little more Dan Brownish today with the revelation that there may be hidden messages embedded in the malware's code. The New York Times reported this morning that one of the files in the worm was called "Myrtus," which may be a reference to the Old Testament Book of Esther, in which Jews thwart a Persian plot against them. Along with mysterious Myrtus were two numbers that might be additional clues to who is behind the worm. Or, as the Times points out, they could mean...
-
There is little doubt that the fine gradations of history will give cyber war an earlier start. But just as television news was transformed by technology before the Iranian Revolution in 1979, and politics was transformed by social networking before it appeared that Twitter would bring about a second Iranian Revolution, process and progress need crystallizing events, where the political and cultural significance of technological innovation becomes indisputable. Such a moment came in July with the discovery of a worm known as Stuxnet, which sought out a particular version of the Siemens’ SCADA (supervisory control and data acquisition) systems that...
-
"Project Grey Goose and University at Albany SUNY to investigate major Power Grid blackouts caused by hackers" SNIPPET: "This is an open call for volunteers who wish to participate in a joint Project Grey Goose / University at Albany SUNY open source intelligence investigation into power grid blackouts caused by hacker attacks. The scope is global and includes the U.S. Interested parties should contact me from their work email address with an expression of interest, a brief bio, and your experience, if any, in SCADA systems in general or the power grid in particular. All respondents will be kept confidential....
-
The Terror Question No Signs of Deliberate Attack in Blackout, But Possibility Not Ruled Out Aug. 15— Despite official assurances to the contrary, could terrorists have exploited a vulnerable power grid to cause Thursday's massive blackout? The cause of the failure remains a mystery, as power was gradually returning from the largest-ever blackout in the nation's history, affecting some 50 million people in areas from Michigan to New York. And while there is no indication the power grid was sabotaged, some experts caution it is too soon to rule out any possible explanation — including cyber-terror. "Anybody who says that...
-
My global recommendations are currently being reviewed by Dartmouth College in a project "taking a cross section of US political commentators on current events and evaluating their respective recommendations." I asked one of the Professor's via email this question last week: "I was wondering if you wouldn't mind briefly answering a question I have on a potential technology vulnerability related to Electronic System Control and Data Acquisition systems for me? Apparently the power is broken into six grids across the US and a vulnerability exists with the black e-SCADA boxes. What are your thoughts on that?" His response: "I must...
-
As far as we know, no one has ever deliberately hacked into the U.S. electrical grid and pulled the plug on millions or even thousands of people. Just as on Sept. 10, 2001, no one had ever deliberately crashed a jet airliner into a skyscraper. Is the power grid vulnerable to cyberattack? What about natural gas pipelines, nuclear plants, and water systems? Or refineries and other industrial facilities that run on similar Internet-enabled digital control systems? Could a terrorist or disgruntled employee cause lethal accidents and millions of dollars of damage? What about a bored 14-year-old? "Are we vulnerable?" asked...
|
|
|