SCADA Systems a Target for Hackers? 189
superstick58 writes "As a system integrator, I am often providing control solutions that utilize sophisticated Ethernet networks and as they say in the biz 'link top floor to shop floor.' Forbes has an article about the security issues that exist in SCADA systems. When I look back at some of the systems I have put in which include direct I/O control over ethernet and distributed HMI monitoring, if I can get access from the internet, it would be easy to bring down power for a plant or at the very least make operators in the building very uncomfortable. How vulnerable are the manufacturing centers of the world?"
Hacking SCADA makes sense (Score:4, Funny)
Re:Hacking SCADA makes sense (Score:4, Interesting)
What if you could easily reproduce the East Coast Blackout of 2003 at will?
Hacking SCADA systems can do that for you...
Heh... What I could tell people...
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
Large scale SCADA often uses the internet (Score:3, Informative)
Even smaller systems will often have web interfaces and mechanisms to send alerts via email etc as a way to call out supervisors/engineers/service personnel at night and allow them to fix stuff remotely without having to come in to the plant or make a flight etc.
Re: (Score:2)
Re:Large scale SCADA often uses the internet (Score:4, Insightful)
Such is laziness.
Re:Large scale SCADA often uses the internet (Score:5, Interesting)
Who knows why they thought this was necessary but, they did it anyway without much consultation with the IT department. [red flag #1]
They published their little website where you could check out the air conditioner status and temperature of the various parts of the building and view the webcam. To see the webcam you had to logon with a specific username/password combination which they announced to everybody via email. [red flag #2]
Curious, I checked out the site and looked around. I found that the webcam had a different URL than the rest of the site so, being curious, I shortened the URL down one level at a time and ended up at a system administration logon page. [bad sign #1]
Surely the username/password for the webcam wouldn't work there so I tried it and promptly logged onto the facility controls console. [bad sign #2]
Surely I would only have limited or read only access so I checked out some of the features and areas of the console. I was able to access everything from heating/cooling, water, lighting and the factory waste handling system controls. [very bad sign #3]
Again, surely I had read only access so I tested one of the settings for the air system in our area of the building. I incrimented the value by 1 and clicked "save". It accepted my change. I changed the value back to it's original setting and saved it again. [VERY bad sign #4]
At this point I notified my supervisor that there may be a problem and showed him what I was able to do with the username/password that everybody in the company now had. A hasty meeting was called that day with myself and the head of facility management. I told him what I had found and we had a meeting with the vendor who installed the systems the next day.
In between the meetings, I checked out some more features of the controller system and found that I could ssh into it with the same password and username. The system ran a very stripped down Linux kernel and only had a few applications but I was able to add or remove or edit files from any directory on the system. So basically, the webcam username/password was effectively root on the whole system.
The installer was a typical heating/cooling installer type of guy. [red flag #3]
Computers obviously weren't his area of expertise. I understand that the company has people who "should" know about these sort of security measures, their developers. Why they sent a mechanical type of guy when they were told what our concerns were, I don't know. [red flag #4]
The scary and probably typical reaction I got from the vendor's installer was that there wasn't much of a problem because nobody in the factory would surely think of shortening a URL and find the main systems control login. [big red flag #5]
I finally got my point across and the vendor agreed to work with their developers to figure out a more secure setup. Fortunately the facility manager fully understood the consequences and wouldn't accept the vendors attempts at suggesting that it wasn't an issue.
Most everybody would think that simply changing the password would do the trick but apparently their setup was hard coded to only accept the one username and password for the whole system! At least that's what we were told at our meeting. To access the published webcam that was tied into this mess, you had to use the same credentials, otherwise none of this little setup of theirs would work and the administrative console would loose it's ability to monitor and control the factory systems. Brilliant! Absolutely genious.
Well, at the end of it all, apparently their developers had some sort of actual CLU
systems control by WEBCAM :) (Score:2)
Fair enough
Good Grief
"The system ran a very stripped down Linux kernel and only had a few applications but I was able to add or remove or edit files from any directory on the system. So basically, the webcam username/password was effectively root on the whole system
Re: (Score:2)
Re: (Score:2)
All of your examples are not good enough. Why cant they have Tunneled Secure connections through gateway servers running a secure OS? Power grid? those guys have the cash to buy Point to point T1 lines or fiber, they are simply being cheap and cutting corners.
I worked in SCADA for years, 99.997% of the time when the customer went against our reccomendations for a closed secure network is usually because
My view.. (Score:5, Insightful)
And it shouldn't. They should stay separate. Period.
Re:My view.. (Score:5, Interesting)
SCADA systems often connected to corporate network (Score:3, Informative)
They also describe a Hewlett-Packard/SenSage software package to monitor in real time and also archive network events on SCADA networks -- allowing for real time alerts of ongoing crimes, or at least an ar
Re: (Score:3, Funny)
Removable media and sneaker net?
I bet I could make a virus that could hop that.
Re: (Score:2, Informative)
You'd have to have physical access to the control network and physical security is tighter than ever, at least here on the Gulf coast.
Re: (Score:3, Informative)
Unless there are unpatched vulnerabilities in the login system or vpn gateway, I'd reckon the chance of joe-cracker getting in that far are pretty slim.
That said, a disenfranchised employee with login credentials would be a possible risk.
Re: (Score:3, Informative)
Re: (Score:3, Funny)
Just be sure to confiscate their eyeballs before they leave the company.
Re: (Score:2)
Re:My view.. (Score:4, Insightful)
Some SCADA systems control diverse infrastructure scattered across areas bigger than any US state. As far as comms go, it's PSTN or nothing for places like that. Hard to keep your network scrupulously separated when you have to dial in to the remote sites!
Re: (Score:2)
Re:My view.. (Score:4, Interesting)
Re: (Score:3, Interesting)
For example we deal with ship control systems, which you may think are about as isolated as you can get. But there is a big push to allow remote access for such things as predictive maintenance, per
ship control integration .. (Score:2)
Hopfully not this one
was: Re:My view..
Re: (Score:2)
From your article:
The Yorktown lost control of its propulsion system because its computers were unable to divide by the number zero, the memo said. The Yorktown's Standard Monitoring Control System administrator entered zero into the data field for the Remote Data Base Manager program. That caused the database to overflow and crash all LAN consoles an
Re: (Score:2)
"If you understand computers, you know that a computer normally is immune to the character of the data it processes,"
"Your $2.95 calculator, for example, gives you a zero when you try to divide a number by zero, and does not stop executing the next set of instructions. It seems that the computers on the Yorktown were not designed to tolerate such a simpl
Re: (Score:2)
Forget hackers, the real danger is... (Score:2)
1. Immediately introduce an extra dimesion of complexity in support and debug. A NIC goes nuts in accounts? Someone connects some unauthorised hardware? Someone decides to repatch in the cable cabinet? Bang goes your process, (sometimes literally 'bang')
2. Open the door to the exec. who - in trying to show-off the
Re: (Score:2)
Any way, one day we needed a computer control system for this real complicated HVAC system we were putting in. Needed to be the kind
Are you sure? (Score:2)
Re: (Score:2, Funny)
Of course, you'd have to be any of clueless, foolish, or malicious to do that...
Re: (Score:2)
It also drops it if you try to PPTP tunnel through it. (Heck, sometimes it annoyingly drops for no particular reason at all, especially if I'm doing wireless with a less than 100% signal).
To get to the VLAN which lets me connect to the RILOs (through which I can remotely power off servers, among other things), I VPN to the corporate network, ssh to a dedicated security server, ssh from there to another server whic
Re:My view.. (Score:4, Informative)
But I think what the GP was getting at was the risk of somebody having a workstation in the plant, somewhere, that's connected to both networks. If you have two NICs, and have the process-control network plugged into one, and the regular internet-accessible LAN plugged into the other, it's trivial to "accidentally" bridge them together.
Alternately, they could both just get plugged into one router or switch, and suddenly there's a path between them. A lot of weird things could happen if the two networks run alongside each other and there's not constant vigilance to keep people from doing something stupid.
In my office, we have separate subnets for different work areas. It works pretty well in terms of minimizing broadcast traffic and keeping people from accidentally printing to printers at the other end of the office, etc. But every few months they'll end up getting accidentally bridged by someone in a conference room plugging a wire from each subnet (they have separate jacks in the conference rooms, so that people can access their own area's stuff) into a switch. There's not really any malice involved -- people just see an Ethernet cable running from the wall towards a switch and notice it's unplugged, and they have a tendency to just jam it right in there.
Re: (Score:2)
What happens when they plug a wire between two ports on the same subnet?
In the past, this often was no problem because the wire is straight and would not build a connection between two switchports.
But unfortunately, short-sighted network equipment manufacturers have bowed to some imaginary demand to automatically detect the link direction, and connecting two ports on a switch leads to a nice broadcast storm.
I still don't understand what this stupid "
Re: (Score:2)
what you hate now, you will love in 5 years.
Re: (Score:2)
Re: (Score:2)
But I have read many times about the havoc caused by inadvertently looping a cable between two automatic switchports, and also have seen it happen one time in our own network at work.
Re: (Score:3, Informative)
Then you have the problem of management wanting to view in real time your process data. The scheme to protect your process will depend o
Re: (Score:2)
NT4 On The Plant Floor (Score:3, Informative)
It's kinda scary, really.
Re: (Score:2)
Re: (Score:2)
Re:NT4 On The Plant Floor (Score:4, Informative)
Re: (Score:3, Insightful)
Re:NT4 On The Plant Floor (Score:4, Informative)
Re: (Score:2)
Re:NT4 On The Plant Floor (Score:4, Insightful)
Re: (Score:2)
Hmm, the policy I've seen to restrict the use of executables only looked at the filename. Rename some file netscape.exe and you were in. Windows server 2003 has the much nicer policy (if XP clients are used) to check executables SHA-1 digest (which breaks when an update is applied), or certificate (but then, you might not want updated binaries to automatical
Re: (Score:3, Informative)
mod this up .. (Score:2)
NT security rating only applied to a stand-alone version [windowsitpro.com] on specific hardware and no network support.
'Because of Davis-Besse's widespread use of vulnerable Microsoft software [neohapsis.com], the worm jumped to the plant network and crashed the Safety Parameter Display System, keeping it offline for eight hours," Paller testified'
was: Re:NT4 On The Plant Floor
Re: (Score:2)
http://www.beyondlogic.org/solutions/trust-no-exe
works great, I can limit someone to a very specific set of items. I even tried running a machine with it without Virus scan and let the user try to get it infected.
works great. perfect for el-cheapo kiosks and SCADA systems.
Pretty old news (Score:2)
Re: (Score:3, Informative)
Re:Pretty old news (Score:5, Insightful)
Re: (Score:2)
Security through obscurity (Score:2)
In order to cause any damage, a cracker would need expertise in fields from IRIG-B time codes [irigb.com] to Buchholz relays [indubras.com.br]. If you know that much, you'll get so many million$$$ working legally that you won't bother to do any cracking.
Re:Pretty old news (Score:5, Insightful)
Case in point. Long ago I worked for a supercomputer manufacturer. Our system had a nifty temperature sensing and power control system that was all controlled from a small front end system, a 286 running Microport Unix. We could also do things like boot the system from that console and dial in to do remote diagnostics. I was working with a customer and he needed a patch so I started uploading it to main system via the modem link and a pass-through from the console into the main system (must have been Kermit). Things are moving along and then the main system crashes. For some reason it's overheating. OK, that's weird, we reboot and I start the upload again. System crashes again. About the third time we start putting two and two together and I go off and do some sleuthing around to figure out why that might cause a problem.
Well, it turns out that the hardware guys have the whole temperature and power control system running over an RS-232 line. Using a protocol that they designed that has no checksums, no framing, no resynchronization. And, a 286 running Microport is just not fast enough to handle two 9600 baud streams of data simultaneously and it starts dropping characters. Drop a few characters out of this unframed, unchecksummed data stream and it starts getting fan speed values (or whatever) mixed up with its temperature values and the control software thinks that the machines is melting down and turns it off - fast.
Our hardware guys were not stupid. They just weren't familiar with communications protocols, didn't bother to consult with the folks on the software side who were, and it had always worked in the lab and the field. I'm quite certain there are any number of pieces of software and hardware running around out there that would be very vulnerable to an unexpected change in the environment and the cascading effects would be incalculable.
Even if you do have safety protocols and interlocks in place, just shutting things down has costs. If you shut down a nuclear power plant, how much does it cost to bring it back on line? If you shut down a factory floor, how much does it cost you to not be producing, how much product will be spoiled and how much clean up will you have to do?
The risks are non-trivial and people believe that there networks are secure when in reality, someone probably installed a wireless access point somewhere or has a router bridging things (so that managers can look at "view only" data as one poster mentioned above) that just opens everything up.
Re: (Score:2)
The expensive bit is that when you start shutting down you must complete the shutdown then restart it: if you try to jump in half way and restart then you create all sorts of heat stresses the plant wasn't designed for, heat stresses lead to cracks and cracks in a nuclear plant are a big no-no. So how long does it take to shut down and restart
Re: (Score:2)
while the plant explodes, pipes break everywhere, chlorine cloud covers the city.
Re:Safety systems protect against mistakes not mal (Score:2)
Re: (Score:2)
A neat special case of social engineering, sure, but not "hacking".
Amazing (Score:4, Funny)
I'll answer though ... Just hide away until after Armageddon is over, I'll find you.. don't worry... really, just wait til I say it's safe to come out.
SCADA Systems are designed to be Failsafe (Score:5, Interesting)
Generally, SCADA systems are not trusted. All systems have failsafe hardwired I/O that is designed to shutdown on failure. Unfortunately, the shutdowns can cost money.
I just got through getting a cell working after an extensive blast of repetitive downtime. I never did work out what exactly caused the failure, however high on my list of suspects is a router that may have been dropping packets due to excessive network load. When the router shutdown, the PLCs shutdown too. I'm just not clear on what caused all the excessive error packets on the network ... I have lots of theories, but no evidence.
These SCADA networks are designed to be operated in a fairly secure environment. They can't withstand errors or high network load. Botnet attacks, virus outbreaks, or someone hacking in can cause trouble. However, mostly I worry about much more mundane causes of downtime.
Microsoft Windows updates, particularly XP SP2, are notorious causes of SCADA system problems. Automatic installation of anti-virus software that triggers system reboots causes system to shutdown unexpectedly. Employees installing CPU-intensive screen-savers also cause headaches. Unexpected system changes result in unexpected system shutdowns. These unexpected shutdowns are what cause the economic disruptions.
Personally, I wonder how much longer we can deploy Microsoft Windows as a SCADA platform. Fast, simple and straightforward are key system goals for SCADA applications. Vista, which effectively requires networking, is a step in the wrong direction. Linux is much more secure, and can easily be set up with read-only partitions. Read-only memory seems to make the systems much more stable, as every reboot always reloads a secure, known-correct program image.
Re: (Score:2)
Re: (Score:2)
Your SCADA system shouldn't be accessible via the internet. It should be on its own locked down network, seperate from the other networks. Most of the patches that Microsoft releases are either security related, or product enhancements. If the SCADA system will run just fine on out of the box, unpatched Windows, then why are patches being installed? If the system is so mission critical that it can't be rebooted, then why are automatic updates enabled?
To offer a car ana
I call bullshit -- Die Hard 4 is FICTION!!! (Score:5, Informative)
I have worked in two industries: electric power (both hydro and nuclear) and communication satellites.
Technologies are similar to those used in consumer systems for a purely practical reason, there's cheap hardware available. But the safeguards built into any industrial system are totally unbelievable for anyone used to consumer systems, and possibly also for people in banking or other businesses.
I once counted the redundancy levels in a transformer protection system. There were 63 (yes, sixty three) different levels of protection for a humble transformer costing a mere $5 million. Imagine the protection around a $5 billion power plant.
Possible in theory, but in real life it's more likely that you would be able to drop a helicopter by ramping a car up a toll booth.
Re: (Score:2)
Testing (Score:2)
Funny, I've been testing this stuff for the last 28 years. Well, perhaps I'm a no-one. Anyhow, since no one has been able to get into any of my systems yet, the score is still 1x0
Re: (Score:2)
Re: (Score:2)
Yes, I do. Just this week I signed a revision of an NDA (Non Disclosure Agreement) requested by the US Department of State to conform with a new interpretation of the ITAR (International Trade in Arms Regulation). Any other questions?
Re: (Score:2)
Re: (Score:2)
You could start by looking at some professional systems. Search for "testing" at their site [abb.com].
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Trolls engage in social engineering now? These are dark times.
As for me - from my name I'm really an obsolete piece of database software.
Re: (Score:2)
See, this kinda pisses me off. Someone says "no no, you should listen to me, I do this for a living" and someone else replies "well who the fuck are you? Where do you work? How do I know you're not just speaking shit?" and the original person insists that you should listen to them even though they are not willing to even volunteer their email address let alone their name or where they work.
It's pretty simple, unless you're willing to say who you are,
Re: (Score:2)
You can't test in information security. It has to be done by design and analysis, at all levels of abstraction, from metastable digital latches to number theory.
In a way that you recognized.
Actually...... (Score:2)
How about Martrix? (Score:5, Funny)
63 levels of protection doesn't give me more assurance sorry.
But since your mentioned the plant hires Transformers for protection or something, I do believe these alien robots could stand some chance.
Re: (Score:2)
http://www.securityfocus.com/news/4831
Re: (Score:2)
Air-Gap (Score:2)
Well I build them... (Score:3, Informative)
Every customer my company has has a main site and a backup site. With redundancy in the main site as well (hot and standby servers, sans, etc). But most have remote clients that can connect to view data (corporate users) however maybe only 1 in 50 are actually tied in to the corporate domain. they're usually separate systems.
As far as the industry I've seen this in, oil & gas, as well as the water and waste water systems for a lot of medium size cities in north america. They also have a slew of international customers as well and the designs are pretty universal. How easy is it to break in and damage stuff? The software and protocols are all proprietary, and in fact most of the packets show up as "malformed" in wireshark. My guess is to really do damage they'd have to either be intimately familiar with the product (i.e. an ex-employee) or they'd have to find a way to take down the main site and backup site completely at once. These are always in geographically different locations.
But of course! (Score:4, Insightful)
SO MUCH MORE fun than hanging up an airport for hours, now isn't it?
Though, I'm not sure how far they'd really get...all these devices are different...kinda like Linux boxes. What works on a Vax with a communications network to controllers will be different from site to site...and they'd need to get the nomenclature from the inside. It would still be non-trivial, and the 'testing' to learn the system might tip off the Feds.
It's like the first time someone mentioned blowing up buses/trains; if there are people involved and a spectacular media coverage, it's a target. (Shouldn't be a big surprise, actually)
My experience (Score:2, Insightful)
Re: (Score:2)
Script Kiddies + SCADA... (Score:4, Funny)
I develop scada software... Forbes is FUD (Score:2)
I am not naive enough to suggest that any such situation is 100% perfect, but at the very least, we are not talking about script kiddies. If someone has a real reason or agenda to break into these systems, and enou
I secured SCADA systems - it's NOT all FUD (Score:2)
First, it is 100% true that the backup mechanisms typically don't use IP yet for connectivity, but look at the trend. I would personally advise anyone to avoid IP in failsaf
This has been done for years (Score:3, Interesting)
What kind of line speed does it take to say, control the dijkes. This is not the place to say _exactly_ how its done, but I'm not afraid of a break. Trains are the other extreme, you need a real computer. The embedded boxes that take the measurements are simple in design, a PIC or 1802, a world favourite in payphones.
Going on the net can't be all that bad, but as one writer noted, thoughtlessly designed systems lock out the rightful user. Of course, never run ssh on port 22 and if life is on the line, a telephone backup must be used. "Fuzzing" is over rated, sure it crashes poorly designed systems, but well designed systems would have to be flooded quite fast to prevent a 'distress signal'. (Upstream the networks are well monitored.) I will always remember the first security lesson from a German professor: Rule No.1 NO Microsoft products!
My biggest fear is the possibility (actually quite easy) of spoofing an IP of a rightful owner. These addresses must either be secrets or rotated often, preferably both. Still a dedicated network, where management can only look and then pick up the phone is almost mandatory if human life is at stake. True fast hopping radio can be most secure, stealth and 'unjamable'. Fibre is secure too.
It is rather remarkable with this publicly known for years and even popular music (figure out that yourself) telling how to do it, it hasn't been a problem. Broadcast and cable is totally vulnerable, though breaches rarely occur. It is rather commonplace to control a TV sender through a DTMF telephone: Would you know what to do if you got in? In a real war, things could go from bad to worse. Social engineering would be a primary tool. (Could anything be easier to social engineer than the military?) Loose lips do bad things. Its all about logic to do it right. Its scary to see sysadmins use Windows for stupid reasons like: "It works best on my laptop". Then don't use it for anything else!
It is so often when doing a security audit, you hear: "I let my kids play games and surf the web". On company computers that do important things. Damn. Don't use Windows and keep your computer to yourself.
BillSF
System Integration can kill ... (Score:2, Informative)
For the past 5 years I have been doing research work on SCADA or control system security.
Some of the research findings are astounding. No one can die if a hacker port scans a printer and ruins your print job, but people can die if a hacker port scans some SCADA devices and knocks them offline.
Here's why;
Back in the good-old-days most of the SCADA/Control system networks were isolated, proprietary, and in general a real pain in th
What I like is the 1 packet kill.. (Score:2)
(a) end up in an indeterminate position (i.e. you don't know HOW it's going to fail, only that it will)
(b) is non-recoverable, i.e. it's not just a matter resetting the thing, you have to rebuild it from the ground up.
Shocking stuff. And this kit controls our plants, sewage facilities, oil platforms, power stations
Rule#1 physical separation. (Score:2)
security researchers and amnesia .. (Score:2)
'The Slammer worm penetrated a private computer network at Ohio's Davis-Besse nuclear power plant in January and disabled a safety monitoring system for nearly five hours [theregister.co.uk] '
"Seven months later, another computer virus was widely suspected of preventing the detection of power loss at a plant providing electricity to parts of New York State", Forbes
'TRANSCRIPTS of
Real world experience (Score:2)
Re: (Score:2, Informative)
Re: (Score:2)
They make beer in St. Louis? That's news to me...
Re: (Score:2)