It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Fractured.Facade
If they can damage a water pump in this case, imagine what they could do if they could hack into critical control systems in a nuclear power plant.
For those who do not know, 747's are big flying Unix hosts. At the time, the engine management system on this particular airline was Solaris based. The patching was well behind and they used telnet as SSH broke the menus and the budget did not extend to fixing this. The engineers could actually access the engine management system of a 747 in route. If issues are noted, they can re-tune the engine in air.
In 2000 I contracted to the Sydney Olympic authority. To make the Olympics run smoothly, they NSW government officials decided to connect control systems into a central head-quarters. We linked: Traffic systems
Rail systems
Water systems
Power systems
Emergency response systems / Police
Sewerage systems
That was only the tip of the iceberg. The rail systems had been connected to report on rail movements. They used a Java class file that was set to read the signals devices. The class was not protected, but the read only status was considered sufficient (despite protests to the contrary).
Once the Olympics ended, so did any funds to maintain the system. Nothing was done to remove the inter-connectivity, it was considered valuable, but like all systems that are not maintained, it has slowly become less and less secure.
These network remain connected even now, though many of the people involved in setting them up have left. In fact, many of these networks are not even documented and known by the current people in the various departments.
Some of the systems are running on Windows 98, not XP, 98.
Nearly all SCADA systems are online. The addition of a simple NAT device is NOT a control. Most of these systems are horribly patches and some run DOS, Win 95, Win 98 and even old Unixs. Some are on outdated versions of VMS. One I know of is on a Cray and another is on a PDP-11. The last of these has an issue as they do not believe it will ever restart if it goes down. So that PDP-11 is not touched. We scanned a system at that network a couple years back and it crashed, the answer was that we could not ever ping the PDP-11 as it was thought it could also crash.
The attackers obtained access to the network of a water utility in a rural community west of the state capital Springfield with credentials stolen from a company that makes software used to control industrial systems, according to the account obtained by Weiss. It did not explain the motive of the attackers.
"Many (SCADA systems) are old and vulnerable," said Kass. "There are no financial incentives for the utility owners to replace and secure these systems and the costs would be high."
U.S. Rep Jim Lanvevin, a Democrat from Rhode Island,said that the report of the attack highlighted the need to pass legislation to improve cyber security of the U.S. critical infrastructure.
"The stakes are too high for us to fail, and our citizens will be the ones to suffer the consequences of our inaction," he said in a statement.
"This is arguably the first case where we have had a hack of critical infrastructure from outside the United States that caused damage," Applied Control Solutions managing partner Joseph Weiss told AFP.
"That is what is so big about this," he continued. "They could have done anything because they had access to the master station."
The Illinois Statewide Terrorism and Intelligence Center disclosed the cyber assault on a public water facility outside the city of Springfield last week but attackers gained access to the system months earlier, Weiss said.
The network breach was exposed after cyber intruders burned out a pump.
"No one realized the hackers were in there until they started turning on and off the pump," according to Weiss.
"We don't know how many other SCADA systems have been compromised because they don't really have cyber forensics," said Weiss, who is based in California.
Word also circulated on Friday that a water supply network in Texas might have been breached in a cyber attack, according to McAfee Labs security research director David Marcus.
"My gut tells me that there is greater targeting and wider compromise than we know about," Marcus said in a blog post.
Meanwhile, a hacker has told the tech website CNET he hacked into a South Houston water utility to show it can easily be done, after officials downplayed the Illinois cyber attack.
The hacker, using the alias ''pr0f'', said he has hacked other SCADA systems, too.
Then he provided screenshots of what looked like diagrams of water and waste water treatment facilities in South Houston, Texas.
Asked how he broke into systems, pr0f said: ''As for how I did it, it's usually a combination of poor configuration of services, bad password choice and no restrictions on who can access the interfaces.''
Originally posted by jcord
reply to post by Corruption Exposed
There is no good reason for having SCADA or industrial control systems accessible through the Internet. This has happened way more than the public knows and has cost billions.
.edit on 18-11-2011 by jcord because: (no reason given)
Word also circulated on Friday that a water supply network in Texas might have been breached in a cyber attack, according to McAfee Labs security research director David Marcus.
"My gut tells me that there is greater targeting and wider compromise than we know about," Marcus said in a blog post.
"Does this mean that I think it is cyber-Armageddon time?" Marcus continued. "No, but it is certainly prudent to evaluate our systems and ask some questions."
The Department of Homeland Security confirmed that a water plant in Springfield, Illinois, had been damaged.
However spokesman Peter Boogaard said officials had yet to confirm that the pump failure was the result of a cyber-attack.
He said: 'DHS and the FBI are gathering facts surrounding the report of a water pump failure in Springfield, Illinois.
'At this time there is no credible corroborated data that indicates a risk to critical infrastructure entities or a threat to public safety.'
A report from the Illinois terrorism and intelligence center said there had been problems with the system in Springfield for two to three months.
The method used, hacking a security company to gain entry to another company, was employed earlier this year by cyber attackers in China.
They stole data from RSA, a division of EMC that provides secure remote computer access to government agencies. They then went on to get into the computer systems of companies, including Lockheed Martin.
Security experts say the attacks show just how vulnerable companies and utilities are.
Gen. Keith Alexander, head of U.S. Cyber Command and director of the National Security Agency, said: 'RSA is the gold standard. If they got hacked, where does that leave the rest?'
Mr Alexander is among senior U.S. officials who have warned of the danger of cyber attacks on critical infrastructure.