Pwn2Own Adds Industrial Control Systems to Hacking Contest

  /     /     /  
Publicated : 23/11/2024   Category : security


Pwn2Own Adds Industrial Control Systems to Hacking Contest


The Zero Day Initiative will bring its first ICS Pwn2Own competition to the S4x20 conference in January.



Vulnerability research competition Pwn2Own is expanding to include industrial control system (ICS), giving researchers an opportunity to hunt for bugs in popular ICS software and protocols.
This is the first time Trend Micros Pwn2Own, now in its twelfth year, has added ICS tech to its lineup. The Vancouver-based contest started out challenging ethical hackers to find flaws in Web browsers; since then, it has expanded to include virtualization software and enterprise applications. This past March, PWn2Own participants
hacked
into a Tesla Model 3s infotainment system.
Its first ICS security competition will take place at the January S4 conference in Miami Beach. The decision to have ICS Pwn2Own at S4 was mutual, says Dale Petersen, founder of S4 Events and Digital Bond. When he approached Trend Micros Zero-Day Initiative (ZDI) back in the spring to propose bringing ICS Pwn2Own to S4x20, they had already been thinking about it. In 2018, ZDI purchased 224% more zero-day vulnerabilities in ICS software compared with the previous year, demonstrating a growing need to research bugs in industrial control software.
One challenge has been finding the right time to introduce a hacking contest for ICS technology, which as Peterson points out, has long lagged behind in terms of security. The industry wasnt ready for it, he says. Pwn2Own could have held an offensive security contest, but it would have been relatively easy for researchers to break into systems. Now, systems protections are stronger, he explains. Todays ICS technology, while not perfect, gives researchers a challenge.
Brian Gorenc, director of Zero-Day Initiative, says S4 is the perfect location to launch an ICS-focused Pwn2Own. Those products control many pieces of critical infrastructure but are often overlooked by researchers, he explains. The goal of Pwn2Own Miami is to build on the security of existing ICS technology by discovering vulnerabilities and providing the research to vendors.
This kind of competition presents a host of logistical challenges, he continues. Are products easily available for organizers and researchers? How are they configured? Can all the necessary equipment be shipped to the conference location?
With ICS, we obviously cant ship a centrifuge to a hotel, and researchers are unlikely to have pump controllers sitting around for them to test, Gorenc adds. However, we were able to work with our industry contacts to find readily available, software-based ICS products that make sense to include in the contest.
Organizers reached out to several people and firms in the ICS sector, says Peterson, and technologies were considered with two key factors in mind. First was the footprint, or how widely used the system is. Second was its relevance to researchers and the ICS community. Rockwell Automation, for one, is providing virtual machines with their products for the contest.
ICS Pwn2Own will be broken down into five categories: Control Server, OPC Unified Architecture (OPC UA) Server, DNP3 Gateway, Human Machine Interface (HMI)/Operator Workstation, and Engineering Workstation Software (EWS).
We chose these categories based on the conversations we had with those in the ICS sector and based on what we could logistically accomplish, he continues. These five categories provide a broad look at different aspects of ICS and provide a wide set of targets for researchers.
EWS is a hot target for attackers as it directly communicates and can configure primary control equipment like PLCs, Gorenc says. The HMI category is similar: attackers target the HMI as it often has Web server components and can definitely be affected by Web-based exploits. Highly deployed ICS software is often locked behind a paywall and not easily accessible to researchers, he says. Pwn2Own aims to remove these barriers to let researchers evaluate security.
The Contest
How it works: targets will be announced three months before the competition, giving Pwn2Own contestants a window of time to develop an exploit, Peterson
explains
. At the show, they have three five-minute attempts to exploit the target. If a denial of service, information disclosure, or remote code execution exploit works, the successful researcher, Pwn2Own team, and ICS vendor (if they choose to participate) will meet to discuss the details. The vendor will verify if its a true zero-day; if so, it follows ZDIs disclosure policy allowing the vendor 120 days to fix it.
Pwn2Own has allocated more than $250,000 in cash and prizes for eight targets across these five categories, Gorenc writes in a
blog post
on the news. The contest will usually buy many successful exploits for a target, a tactic meant to encourage participation from more researchers.
Is the ICS community ready for a competition like this? There will be people who dont like it, Peterson says, though he believes its a positive step forward for the industry. In his view, the organizations that dont update their systems put the industry at greater risk than researchers looking for vulnerabilities in them. Gorenc notes the overall reaction has been positive.
There is definitely some trepidation, but Pwn2Own has a history of working with vendors to get bugs fixed before they are used in active attacks, he says.
Related Content:
8 Tips for More Secure Mobile Computing
State of SMB Insecurity by the Numbers
Microsoft Office Bug Remains Top Malware Delivery Vector
4 Security Lessons Federal IT Pros Can Teach the Private Sector
This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for 
more information
 and, to register, 
here
.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Pwn2Own Adds Industrial Control Systems to Hacking Contest