Forget Stuxnet: Banking Trojans Attacking Power Plants 34
New submitter PLAR writes: Everyone's worried about the next Stuxnet sabotaging the power grid, but a security researcher says there's been a spike in traditional banking Trojan attacks against plant floor networks. The malware poses as legitimate ICS/SCADA software updates from Siemens, GE and Advantech. Kyle Wilhoit, the researcher who discovered the attacks, says the attackers appear to be after credentials and other financial information, so it looks like pure cybercrime, not nation-state activity.
pure cybercrime, not nation-state (Score:4, Interesting)
How do you distinguish the two?
Re: (Score:2)
Never mind, I forgot... One uses a computer
Re: (Score:2)
Well, that difference would make it patentable...
Re: (Score:3, Insightful)
The cybercriminals target your wallet, while the nation-state targets you.
Re: (Score:2)
The cybercriminals target your wallet, while the nation-state targets you.
I am my wallet, you insensitive clod.
Re: (Score:2)
The cybercriminals target your wallet, while the nation-state targets you.
And in Soviet Russia????
Re: (Score:1)
Are they after Diebold? (Score:4, Informative)
There are lots of stories of how bad Diebold is in upgrades and that most ATMs are running on WinXP and how they can be made to dispense cash with remote exploits. Though it all requires physical access to the usb ports inside the machine first.
Re:Are they after Diebold? (Score:5, Insightful)
Though it all requires physical access to the usb ports inside the machine first.
The ones protected by armor plate? That's a bit like complaining that safes aren't safe because they can be drilled.
Not only do you need to know how to do the hack, you have to know where to drill and how far.
If they're showing up with that much invested in it they're getting the money out of the ATM/Safe no matter what.
Re: (Score:2, Interesting)
Re: (Score:1)
Or you bring it back to your house and break it open with a sledgehammer. If all else fails, try to find the weak spot on the bottom; just don't call your girlfriend a skank while you're under there looking for it.
Tommy Westphall says "hi" (Score:2)
Re:Are they after Diebold? (Score:5, Informative)
Re: (Score:2)
Complete with giving said mules a one time code over the phone before the cash comes out.
This way they don't get any fancy ideas.
Why aren't these networks air gapped? (Score:4, Interesting)
SCADA and the like are the worst things to have available on an accessible network. Vendors never update their software, everything's insecure by default, etc.
I've worked in environments like this, and some of the equipment is just not possible to secure without leaving it on its own network. It makes maintenance a nightmare -- sneakernetting patches, software updates, AV signatures, etc. I know an air gap isn't a guarantee of security, but it at least prevents dumb things like drive by downloads on someone's computer affecting production equipment.
Working with vendors of some of this stuff is equally bad...most of them deny a problem exists. And even if they acknowledge a problem, they won't lift a finger to fix it because they just have to say it's secure if installed as per our instructions. I've seen lots of software for control systems, etc. with 15 or 20 year old software libraries gluing everything together. (Using the 15 year old version now, I mean.) The vendor knows they're one of a handful of firms providing stuff like this, and they know that companies don't care about information security anyway. (One example of this from outside of the manufacturing industry -- I was integrating a very specific peripheral for a customer, and the vendor absolutely refused to digitally sign the Windows drivers, rendering it nearly impossible to install on 64-bit Windows. A lot of people might say "that's what you get with closed source," but open source libraries and other code have their problems as well.
Re: (Score:2)
A company sends out staff to help install a system and then offers ongoing help for educational engineering courses. As soon as the expert company staff are gone its back to a secret mil or gov project.
Networking might allow work on some very exotic materials
The vendors staff know that are not at a n
Re: (Score:2)
valid software updates? (Score:3)
The malware poses as legitimate ICS/SCADA software updates from Siemens, GE and Advantech.
Okay, but considering we're dealing with control systems, why the hell isn't somebody verifying the updates are valid? The distribution channel and validation apparently is the cause here. I still advocate air gaps between Intranet and Internet connectivity in SCADA environments and the controls on updates of any software should be verified as to authenticity prior to deployment. It should be easy for somebody to contact GE and ask for the MD5 for the update or check it out on their portal first.
Not surprised (Score:3)
SCADA was rarely required to run outside the building. Most SCADA systems I've seen are isolated just because there's no need for them to be given access to anything else than the content it will run. For this reason SCADA systems have not been exposed and their team most probably lacks the security experience. MS, Apple and Linux all suffered when they first got hooked up to the internet. Today these company have tones of experience and react fairly quickly to security holes.
As for power plants, most of them (if not all) are still operated manually using hard buttons. The only connection there is to the plant is connection to the monitoring of sensors.
Re: (Score:2)
As for power plants, most of them (if not all) are still operated manually using hard buttons. The only connection there is to the plant is connection to the monitoring of sensors.
That is becoming less and less true as hardware and software evolves and possibly as industry's comfort level increases. I'm not sure that is a good thing, but I've worked with some systems that have software that could potentially trigger plant trip if the software determines that a dangerous enough condition exists. That is probably a good thing -- unless someone is dumb enough to connect that software to a network and allow it to automatically update.
After all, none of us have ever has an operating sys
Re: (Score:2)
I have a family member that works high up at the biggest electricity provider in Canada and he told me when I had the same argument with him that there is no plan to automate this. It will remain hard buttons for a long time.
Inconceivable! (Score:5, Insightful)
Any company that has a SCADA system that is allowed to automatically install any sort of update needs new management. I write software for industrial SCADA systems (many of them nuclear, but some not) and absolutely NONE of them have any form of automatic update enabled. That goes for the operating system platform, even anti-virus packages (when they are used) must be manually updated after the update has been tested in a sandbox lab system. Even a well intentioned update may disrupt a SCADA system's operation, so why would anyone in their right mind allow a SCADA system or the operating system it runs on, or any other software running on the same machine automatically update itself? Sorry, but that's just insane.. At best, SCADA systems should have a one-way data flow (preferably on a serial link with the receive line physically CUT) but none of them should accept input from outside their physically controlled environments.
Except for toys and things like that.
Re: (Score:2)
Not everyone who uses a SCADA/Siemens system has internal staff to maintain the system levels. I was asked this week to connect a SIEMENS /SCADA system for Rail delivery to be connected for remote access for support/trouble shooting. The saddest part was the lack of network and security knowledge that the deploying entity had in their possession. It was uncomfortable to discuss networking with them. We were paying them to listen to why their solution was insecure, and would not be set up in the manner they
SCADA is a good attack vector? (Score:1)