Hacking Critical Infrastructure: How-To Guide

Cyber-aided physical attacks on power plants and the like are a growing concern. A pair of experts is set to reveal how to pull them off — and how to defend against them. 

US Cyber Command officials say this is the threat that most deeply concerns them, according to a recent Government Accountability Office report. “This is because a cyber-physical incident could result in a loss of utility service or the catastrophic destruction of utility infrastructure, such as an explosion,” the report said. They’ve happened before.

The most famous such attack is the 2010 Stuxnet worm, which damaged centrifuges at Iran’s Natanz nuclear enrichment plant. It’s never been positively attributed to anyone, but common suspicion holds that it was the United States, possibly with Israel.

Scheduled to speak at the Las Vegas conferences are Jason Larsen, a principal security consultant with the firm IOActive, and Marina Krotofil, a security consultant at the European Network for Cyber Security. Larsen and Krotofil didn’t necessarily hack power plants to prove the exploits work; instead Krotofil has developed a model that can be used to simulate power plant attacks. It’s so credible that NIST uses it to find weakness in systems.

The idea is to help cybersecurity professionals understand what to look for and design intrusion detection software to prevent attacks from taking place. You can’t guard an asset until you know what weak spots your enemy will use to grab your prize. And when it comes to online attack, the weak spots in US infrastructure are many. But Larsen hopes he doesn’t get “crucified” for his presentation.
When asked if there was a single error or issue that was common across the various installations accounted for in the model, perhaps a single unlocked back door that made power plants, chemical plants, and other pieces of infrastructure vulnerable, Larsen replied, “The answer to that is, which one?”

A hacker bent on destruction might try various methods. There are “water hammers,” a method of destroying piping structures by closing valves too fast. There are three-phase attacks that cause gears to spin too quickly, too slowly, or out of sync with other vital pieces of equipment. (The so-called Aurora vulnerability is one of these.) And there are collapse attacks, where the hacker fills a round tube or container with hot liquid, rapidly closes the lid and waits for the liquid to cool to create a vacuum. “A lot of the round stuff we build doesn’t hold up to vacuums very well. Whole valves that you can drive trucks through can collapse like a beer can,” Larsen told Defense One.

It remains far easier to get online access to a computer or network than it is to cause physical damage to infrastructure. Such attacks a very specific understanding of a physical event playing out — creating a vacuum, turning a valve, rotating a piston, etc. — and specific knowledge of a particular plant or facility.

The attack on the Natanz enrichment plant is illustrative. “When Stuxnet came out, the very first version had a payload. It went over there and the effective process broke a whole bunch of stuff. But the actual creation of the payload…a lot of people had to work hard behind the scenes trying to figure out, ‘Oh, there’s a spinning apparatus. I can go damage the spinning apparatus. What information do I need to know to do that?’” asked Larsen. In general, he said, “We don’t have the roadmap for an attacker once he gets in, where he gets to the final payload” that does the damage.Still, it’s time to start beefing up cyber defense, he said. Defenders need a comprehensive overview of plant cyber security, better sensors inside the facility, better control processes, and much better sensitivity to small abnormalities. This is what Krotofil calls process security — protecting the overall plant. Traditional IT security is insufficient, she said.

This sort of research can reveal the most likely vulnerabilities in a target — but turning keystrokes into physical damage requires more, says Larsen. “If you’re hitting a nuclear reactor, you really have to know what the estimates they’re using for flux and fluids are. That might not be really obvious. One of the ways to do that is tweak the process a little bit and see how it responds. If you can figure out how people would normally go about doing these little tweaks and responses to tune their cyber weapon, we can actually go look for those and develop signatures for them. We can say, ‘Oh, someone might be tweaking a process’ before someone launches a full-blown attack.”

For policymakers, Larsen offers this advice: create a place for engineers to share data, and then butt out so they can do it. “There’s been a lot of information-sharing things that have sprung up,” including the Cybersecurity Framework the White House put out last year, he said.  “What we need is information sharing between engineers at various facilities in order to improve. But sharing information is dangerous because eventually you are going to share the information for how to attack somebody else. So the programs for information sharing have started off with lofty ideas and ended up with a very conservative, to the point of not being useful, implementation because no one wants to be the guy who leaked the information that somebody used to go attack something,” he said. “On the policy decision, I would say that the government’s role should be to mandate and facilitate the information sharing, but not be a member of the information sharing.”

Of course, there also some vulnerabilities that are easy to fix. “Putting in a pressure relief valve in place is actually way cheaper than all the cyber work you have to do,” he said.

DefenseOne

 

 

« Artificial Intelligence: Myths, Facts and Future
Sun Tzu 2.0: Is CyberWar the new Warfare? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

Atempo

Atempo

Atempo is a leading independent European-based software vendor with a global presence. We provide solutions to protect, store, move and recover all your data.

Learning Tree International

Learning Tree International

Learning Tree's comprehensive cyber security training curriculum includes specialised IT security training and general cyber security courses for all levels of your organisation including the C-suite.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

Acreto

Acreto

Acreto is an end-to-end security infrastructure that protects all your technologies with a single, simple cloud service.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.