Air Gap FAILs, Configuration Mistakes Causing ICS/SCADA Cyberattacks

  /     /     /  
Publicated : 22/11/2024   Category : security


Air Gap FAILs, Configuration Mistakes Causing ICS/SCADA Cyberattacks


A utilitys cautionary tale, and how a popular ICS/SCADA network protocol failed a fuzzing test miserably.



It had the markings of a possible sabotage operation. Stealthy, patient cyber attackers had wrested control of an ICS/SCADA controller in a power plant and were rooting around in what appeared to be a reconnaissance effort to map out the plants infrastructure. The attackers were scanning for a specific type of PLM (product lifecycle management) controller when they unknowingly pinged a deception trap in place at the plant that blew their cover and ultimately alerted the security team.
Turns out the attackers point of entry had been an open port in the compromised controller that inadvertently had been left open after a vendor-maintenance engagement. The attackers used that hole to to gain a foothold in the process control network and to tap the PLM controllers in order to map out the plants operations.
They took hold of a single device … and they were scanning for a specific kind of controller, says Ori Bach, vice president of products at TrapX, whose firm revealed the attack of its utility customer in a
new report published today
.
The report by TrapX, a security firm that specializes in so-called deception technology akin to advanced honeypots that act as lures for attackers, provides a glimpse of some real-world cyberattacks hitting ICS/SCADA networks in manufacturing and utility plant floors.
The utility – which TrapX declined to name – had installed the security vendors deception product, which creates emulated servers, workstations, PLMs, and other devices as a way to detect attacks. The attackers had been gathering intel that could be used to help them disrupt the plants operations or even damage it. The utility initially added the deception traps due to ransomware concerns.
The attackers gained access because of a failure to close the controller from outside access: It was supposed to be shut down, but third-party maintenance for some reason left it open and the attackers were able to exploit that, Bach notes.
Configuration mistakes are one of the most common ways attackers are infiltrating ICS/SCADA networks today, he says. Other common entry points for attackers are spear-phishing and bridging so-called air gapped systems, where an industrial network is isolated from other internal networks for security reasons but ends up either infected or open to the entire network via a a maintenance workers laptop joining the plant floor network, or via an infected USB stick with maintenance software.
Security experts point to the aftermath of the 2003 power blackout in the Northeastern US that affected eight states, parts of Canada, and took two days to restore power to some 50 million people, as the turning point for ICS/SCADA vulnerability. The power industry went all out on resiliency and continuity to prevent another mass outage, adding remote monitoring and control of plants, basically exposing them to the Internet. Unfortunately, by solving one problem, manufacturers have in fact exposed themselves to another. Critical infrastructure which was historically shielded due to isolation from the Internet is now at significant risk for cyber-attack, TrapX wrote in its report.
Tom Kellermann, CEO of Strategic Cyber Ventures, says this created a massive attack surface for ICS/SCADA systems. They were told to overlay fiber optic networks with wireless, for example, he says. The wide distribution of the smart grid is compounded by the tremendous amount of remote access allowed.
In the case of the power plant, the attackers had been inside for several weeks, but not long enough to do any actual damage to the plant. Even so, they gathered some information about the plants layout and operations before they were spotted and removed.
The power company is now moving from a perimeter security approach to a defense-in-depth approach. Now they have people and technology in the process that assume they will be breached and [that the breach] needs to be detected, Bach says. They also added a lot more security people and instituted more oversight of third-party vendor security and operations, he says, to prevent another misconfiguration misstep.
While human error-instigated security weaknesses are often the attackers way in, many older ICS/SCADA systems and protocols come with their own set of vulnerabilities that an attacker can exploit.
ICS/SCADA network protocols didnt fare so well in a recent global fuzzing experiment by Synopsys: the IEC-61850 MMS network protocol used in ICS and Internet of Things networks crashed within an average of 6.6 seconds of the fuzzing test.
ICS protocols havent been as exposed to the Internet as much and not tested as much … But what we found was IEC within the first six seconds.
Robert Vamosi, security strategist with Synopsys, which yesterday published a fuzzing report of some 4.8 billion fuzz tests it conducted on customer sites in 2016.
Fuzzing is a longtime method of rooting out unknown security vulnerabilities that basically sends random inputs to the targeted software or protocol to see how it reacts. Its mostly used in conjunction with penetration testing. Synopsys found that MMS crashed within seconds of its fuzzer input, which was based on a template rather than random inputs. We build our fuzzing around the RFCs and iterate off that, he says.
But just because a network protocol crashes in the fuzzing test doesnt necessarily confirm that theres an exploitable bug in the code. Why it behaves badly requires additional investigating: not every vulnerability can be exploited. In some cases, you need a chain of them to make an active exploit, he says.
An attacker could wage a denial-of-service attack against MMSs vulnerability, he says, or insert malware when the software reboots after crashing, for example. This could impact a SCADA system dramatically, he says.
Other network protocols in Synopsys testing fared much better: TLS, the secure HTTPS protocol typically used for ecommerce and online banking, took on average nine hours to fall to the fuzzer.
Overall, the various network protocols fuzzed by Synopsys on average crashed within 1.4 hours. Interestingly, medical equipment and automobile network protocols landed in the middle of the pack in terms of most fuzzable. ICS is the least mature of the protocols, Vamosi says.
Related Content:
Researchers Release Free Tool to Analyze ICS Malware
Microsoft Rolls Out AI-based Security Risk Detection Tool
Look, But Dont Touch: One Key to Better ICS Security
Latest Ukraine Blackout Tied To 2015 Cyberattackers

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Air Gap FAILs, Configuration Mistakes Causing ICS/SCADA Cyberattacks