Power Plant Hack Talk, Free Tools Pulled From Def Con Lineup

  /     /     /  
Publicated : 22/11/2024   Category : security


Power Plant Hack Talk, Free Tools Pulled From Def Con Lineup


Def Con talk on bugs, tools for hacking power plants replaced with another talk on HMI flaws



DEF CON 20 -- Las Vegas, NV -- A pair of Russian researchers poised to reveal new research and release free tools for breaking into power plants were no-shows here today.
The much-anticipated SCADA Strangelove: How I Learned To Start Worrying And Love The Nuclear Plants talk was quietly replaced a week ago with another presentation by researcher Wesley McGrew on HMI interface vulnerabilities in process control systems, much to the surprise of attendees.
According to the description of their talk in the Def Con program, Sergey Gordeychik and Denis Baranov were scheduled to unleash some 20 new vulnerabilities in popular SCADA systems, including
Siemens Simatic WinCC
. They were also geared up to release three tools: modbuspatrol (mbpatrol), which fingerprints programmable logic controllers; a Simatic WinCC security checklist; and an exploit for a Simatic WinCC-based power plant. Simatic WinCC was one of the products targeted by the infamous Stuxnet worm, which reportedly was launched by the U.S. and Israel.
The researchers, who are with Positive Technologies, were planning to demonstrate how to gain access to power plants via a sniffer and packet generator, FTP and Telnet, Metasploit and oslq, and a Web server and browser.
Its unclear why the talk was cancelled: Neither the researchers nor Siemens were available for comment at the time of this post, and Def Con officials say the speakers pulled their presentation from the lineup about a week ago. McGrew said in a tweet late today that it was nothing sinister.
Both Def Con and Black Hat conferences are no strangers to potentially bombshell presentations getting pulled at the last minute. Given the sensitive nature of the talk, its likely the researchers were pressured by the affected SCADA vendors not to reveal their hacks and unleash their tools for fear they could fall into the wrong hands.
Researchers I know who look into SCADA bugs complain about vendor pressure, and even government pressure, so its a reasonable hypothesis, says Robert Graham, CEO of Errrata Security.
I had the FBI come threaten me to stop a talk that isnt as scary as 20 SCADA bugs, Graham says.
[Firewall, VPN features now embedded in some products as Siemens gradually beefs up its security strategy. See
Siemens Enhances Security In Post-Stuxnet SCADA World
. ]
Meanwhile, the show went on, with research presented on easy-to-find and exploit holes in HMI interfaces of SCADA systems. Wesley McGrew, research associate with Mississippi State University, revealed a handful of reported vulnerabilities in HMI products, including KEP Infilink-HMI 5.00.23, KingView 6.5.3, and Iconics Geensis32 9.2.2 -- all of which come from weak user authentication.
These are not Pwnie Award-winning attacks -- they are not hard to do, McGrew says. But they require some level of access [to the machines] and are part of a larger attack.
With a lot of these, you encrypt the password with the same key for every user and every installation, he says.
These attacks are mostly insider threat ones, including air gap-hopping like Stuxnet was, McGrew says. You could have users doing it intentionally or unintentionally, and basically hopping air gaps, he says. Even if the air is there, nothing in insurmountable. A lot of times the user doesnt know whether there is an air gap.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Power Plant Hack Talk, Free Tools Pulled From Def Con Lineup