text
stringlengths 4
429
|
---|
secure the network and its endpoint on multiple levels. There have |
already been proof of concept attacks that demonstrate how smart meters could be manipulated to send |
back false information or report incorrect billing IDs, leading to power theft. |
In addition to the issue of securing these devices, smart grids will produce a huge amount of data which, |
depending on regulations, will need to be kept for audits. Some of this data may be sensitive and could raise |
privacy concerns if not properly protected. This could easily grow to petabytes of data that needs to be safely |
stored and managed. |
It is beyond the scope of this paper to address all the challenges associated with smart grids and smart meters. |
Symantec has created a dedicated whitepaper for this topic: How to protect critical infrastructure, mitigate fraud |
and guarantee privacy. As a member of the CRISALIS project, Symantec is following these developments closely |
and is helping to secure critical infrastructure together with partners from academia and different industry |
sectors. |
Page 8 |
HISTORY OF DISCOVERED ATTACKS |
There have |
been numerous |
cyberattacks |
against the energy |
sector over the |
past few years. |
Targeted Attacks Against the Energy Sector |
History of discovered attacks |
There have been numerous cyberattacks against the energy sector over the past few years. Not all of them were |
the work of sophisticated attackers; some incidents were just collateral damage caused by malware infections or |
bad configuration issues. These incidents highlight the fact that such attacks can happen and that they can have |
real life consequences. |
2013 |
In 2013 part of the Austrian and German power grid nearly broke down after a control command was |
accidentally misdirected. It is believed that a status request command packet, which was broadcast from a |
German gas company as a test for their newly installed network branch, found its way into the systems of the |
Austrian energy power control and monitoring network. Once there, the message generated thousands of reply |
messages, which generated even more data packages, which in turn flooded the control network. To stop this |
self-inflicted DDoS attack, part of the monitoring and control network had to be isolated and disconnected. |
Fortunately the situation was resolved without any power outages. |
2008 |
In 2008, Tom Donahue, a senior Central Intelligence Agency (CIA) official told a meeting of utility company |
representatives that cyberattacks had taken out power equipment in multiple cities outside the United States. |
In some cases the attacker tried to extort money from the energy companies, threatening them with further |
blackouts. |
2003 |
In 2003 the safety monitoring system of the Ohio nuclear power plant apparently went offline for several hours |
due to a Slammer worm infection. Fortunately the power plant was already offline due to maintenance and the |
installed secondary backup monitoring system was unaffected by the worm. Nevertheless the incident raised |
safety concerns. |
At the beginning of 2003 a marine terminal in Venezuela was targeted by a sabotage attack. Details of this attack |
are scarce and vague, but it seems that during a strike an attacking group managed to get access to the SCADA |
network of the oil tanker loading machinery and overwrote programmable logic controllers (PLCs) with an empty |
program module. This halted machinery, preventing oil tankers from loading for eight hour till the unaffected |
backup code was reinstalled on the PLCs. The attack was not too sophisticated as it was easily spotted. A small |
modification of the PLC code instead would probably have gone unnoticed for a long time. |
2001 |
In 2001 an attack took place against California |
s power distribution center, which controls the flow of electricity |
across California. Due to apparently poor security configuration, the attacker was able to compromise two Web |
servers that were part of a developer network and penetrate further from there. Fortunately the attackers were |
stopped before they managed to attack any systems which were tied into the transmission grid for the Western |
United States. |
2000 |
According to Russian officials, the largest natural gas extraction company in the country was successfully |
attacked in 2000. The attackers used a Trojan to gain access to the control for the gas pipelines. Through this |
switchboard, the flow for individual gas pipelines could have been modified, which would easily have caused |
widespread disruption. |
Page 10 |
Targeted Attacks Against the Energy Sector |
Aside from these incidents, there have also been a number of more serious and well-documented targeted |
attacks against the energy sector: |
Stuxnet |
The Stuxnet incident and its relatives Duqu, Flamer and Gauss are some of the most talked-about cases of |
targeted attacks. As far as we know today, the Stuxnet operation began in November 2005 with the registration |
of the command and control (C&C) servers used in the attacks. The first recorded appearance of what we now |
call Stuxnet version 0.5 was in November 2007. Since then, a handful of different versions have been found and |
analyzed. Stuxnet 1.x is based on what is now known as the |
tilded |
platform; whereas Stuxnet 0.5 is based |
on the Flamer framework. The code segments and programming style differ, which indicates that two different |
programming teams were most likely responsible for the different branches of Stuxnet. Thorough investigation |
into the mechanism and functions of this threat started in July 2010. Stuxnet is the first known autonomous |
threat to target and sabotage industrial control systems to such an extent. |
Stuxnet is a sophisticated piece of malware, which uses seven vulnerabilities to spread and infect its targets. |
The most notable vulnerability is the Microsoft Windows Shortcut |
LNK/PIF |
Files Automatic File Execution |
Vulnerability (CVE-2010-2568), which allows it to auto-execute on USB drives. Spreading through infected |
portable media drives allowed it to also infect networks isolated by air gaps that are unreachable from the |
Internet. This was most likely the first infection vector used by Stuxnet. In addition, it is able to infect Step7 |
project files, which are used to control Programmable Logic Controllers (PLCs). This allowed the worm to infect |
computers whenever the engineer exchanged the project files. Besides this, it also spread through network |
shares, a printer spooler vulnerability, an old Windows RPC (remote procedure calls) vulnerability and a known |
password in the WinCC database. In the end, Stuxnet propagated further than its authors probably intended. We |
have monitored more than 40,000 infected IP addresses in 155 countries. Many of those systems are most likely |
just collateral damage and were not intended to be infected by the attackers. For example multiple computers at |
Chevron were infected by Stuxnet, without any damage being done. |
Part of the malware code was signed with stolen digital certificates making it harder to detect by security tools. |
To hide its activity even further, Stuxnet executed slightly different infection routines depending on the security |
software installed on the target. On the USB drive itself, the malware would hide its own files and even delete |
itself from it after three successful propagations. Tricks like these, to make the detection of the malware more |
difficult, are now frequently used in modern targeted attacks. |
Stuxnet |
s payload focused on PLCs, which are used to control different industrial components. The target of the |
Stuxnet operation is believed to be a uranium enrichment facility in Iran. The sabotage payload disrupted and |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.