Quantcast
Channel: MinnPost
Viewing all articles
Browse latest Browse all 32716

America's Stuxnet? Weakness found in systems used by Pentagon, power grid

$
0
0

An amateur cybersecurity researcher who bought industrial computer networking equipment on e-Bay for fun has discovered a critical weakness in equipment that helps run railroads, power grids, and even military installations nationwide.

The vulnerability means that hackers or other nations could potentially take control of elements within crucial American infrastructure — from refineries to power plants to missile systems — sabotaging their ability to operate from within. 

Analysts say the problem is likely fixable, but the enthusiast says he has gone public only because the company that manufactures the equipment, RuggedCom of Concord, Ontario, has declined to address the issue since he made it known to them a year ago. 

"It's clearly a huge risk," says Dale Peterson, CEO of Digital Bond, a control systems security firm in Sunrise, Fla. "Anytime someone can take down your network infrastructure, essentially cause a loss of control of the process — or your ability to monitor it, very dangerous things can happen."

The vulnerability has to do with what is known as a digital “back door.” The back door is a secret login that allows the manufacturer to get into the equipment’s control systems without anyone knowing about it — even the purchaser. In theory, manufacturers could use their back doors to send updates to the equipment, but since they are secret, their use is not well known.

The discovery of back doors built into digital industrial control systems is not unprecedented. In fact, RuggedCom was recently acquired by a subsidiary of Siemens AG, the giant German industrial engineering company that has been criticized for using hidden, yet vulnerable, back doors in its control systems.

 What is unusual is that RuggedCom’s equipment is often used as a digital fortress, protecting from hackers far more vulnerable systems that throw mechanical switches or close and open valves. Also surprising, experts say, is that the password needed to enter through this back door appears to be relatively easy to hack. 

If hackers can get through the back door of RuggedCom’s routers and digital switches, the entire system that they are a part of becomes vulnerable. For example, Stuxnet, the world's first publicly identified cyber super weapon, in 2009 wreaked havoc on Iran's nuclear centrifuge refining system by exploiting a password hidden inside a Siemen's operating system.

"It is a very serious threat," says Robert Radvanovsky, a cybersecurity researcher and cofounder of Infracritical, a think tank focused on shoring up cyber weaknesses in critical infrastructure. "The big concern is that these devices are what connect to the control systems that run the substations where power gets routed."

RuggedCom sells “hardened” equipment designed to run around the clock in any temperature or weather condition. So it has a variety of clients seeking such robust machinery. Defense-industry customers mentioned on the RuggedCom website include big names like Boeing and Lockheed Martin, while power-industry customers include several of the nation's largest utilities – American Electric Power, National Grid, Pepco, and others. The systems are also used by transportation authorities in the cities of Houston, Lakeland, Fla., and in Washington State and Wisconsin.

Pipelines, refineries, traffic lights, trains, military systems — all are at greater risk, especially to adept hackers belonging to nation-state intelligence agencies. The "good news," Peterson says, is that even though the vulnerable systems are widespread, the problem is likely fixable, unless the RuggedCom operating system is too reliant on the back door login and its weak password-encryption system.

"In and of itself, this vulnerability is probably not the worst thing in the world, but in conjunction with other attacks this thing could be deadly," says another industrial control system expert who spoke on condition of anonymity because of his affiliation with a large utility company.

A RuggedCom spokesman, responding to an e-mail query, wrote that the company would be unable to respond Wednesday to Monitor queries about the vulnerability.

Feeling the company was dragging its heels and might never fix the problem was a key motivator for Justin Clarke, the San Francisco-based researcher who finally decided to reveal the threat a year after he first informed RuggedCom managers about it. RuggedCom said in mid-April that it would need three more weeks to notify customers but did not say whether it planned to fix the back door access with a firmware upgrade, Mr. Clarke says.

"I didn't do this for money — I didn't get paid for this," he says. "I just wanted the problem fixed and nothing I heard from the company ever indicated that would happen."

Everywhere he went during his day, he says, he saw the systems he knew how to hack sitting there vulnerable — from traffic light control boxes to power substations.           

He learned about the vulnerabilities after buying the company’s devices off e-Bay “when they showed up cheap," says Clarke in an interview. "This is something I do in my spare time with own money. I'm just this guy on street who knows how to do very bad things to important equipment, and I couldn't stand that feeling so many systems — even in our military — were so vulnerable."

He hopes a fix will come out now that the US-Computer Emergency Readiness Team, a federal cyberwatchdog, issued a vulnerability warning Tuesday, and its sister agency focused on industrial computerized control systems put out its own warning Wednesday.

Testimonials on the RuggedCom website show how deeply embedded its equipment is inside some of the most important US systems. Located at the end of the Alaska’s Aleutian island chain, about 300 miles from the coast of Siberia, the Shemya Island power plant provides power to National Missile Defense Authority facilities on the island.

"Ruggedcom switches were selected for use in the US Air Force Shemya Power Plant," wrote Ted Creedon, chief engineer for Creedon Engineering in one testimonial for the company. "All electronics provided to the USAF were disassembled, quality inspected and burned in at the Chief Engineers office in Anchorage. Reliability was not an option."


Viewing all articles
Browse latest Browse all 32716

Trending Articles