Researchers Hack Industrial Robot

  /     /     /  
Publicated : 22/11/2024   Category : security


Researchers Hack Industrial Robot


New research finds more than 80,000 industrial routers exposed on the public Internet.



It was a miniscule change in parameters – just 2mm – but that tiny deviation delivered to a real robot in a recent hacking experiment could result in a massive product recall or even a major defect in an aircraft design in a real manufacturing scenario.
Researchers at Trend Micro and Italy-based Politecnico di Milano today detailed the proof-of-concept attack they conducted on an ABB Robotics IRB140 industrial robot, exploiting a remote code vulnerability they found in the robots controller software. They fed the robot a phony configuration file that modified its parameters for drawing a straight line. Instead of a perfectly straight line, the robot drew a slightly skewed one, following the 2mm change in instructions.
The code was working as expected, but with the wrong configuration, says Mark Nunnikhoven, Trend Micros vice president of cloud research. We were getting the robot to change what it thought a straight line was.
Two millimeters doesnt sound significant, but it made a defect in manufacturing. If that was an airplane … it can be a catastrophic event, he says.
The ABB robot hack was part of a larger study published today by Trend Micro on cybersecurity flaws and vulnerabilities in todays industrial robots, Rogue Robots: Testing the Limits of an Industrial Robots Security.
The researchers discovered more than 80,000 industrial routers exposed on the public Internet via their FTP servers and industrial routers in a two-week scan for connected robots from major vendors such as ABB Robotics, FANUC FTP, Kawasaki E Controller, Mitsubishi FTP, and Yaskawa. The scan, using Shodan, ZoomEuye, and Censys search engines, revealed that some of the exposed devices didnt require any authentication to access them.
Industrial robots are commonplace in the manufacturing operations of aerospace, automotive, packaging and logistics, and pharmaceutical companies and increasingly are showing up in office and home environments. IDC estimates that in 2020, worldwide spending on robotics will be at $188 billion. Meantime, robots and their control software are basically as security-challenged as any other Internet of Things devices, containing critical and painfully obvious security flaws that make them relatively easy to manipulate and hack.
Security vulnerabilities in robots can be exploited to take control of a robots movements and operations for spying, sabotage, or damaging the manufacturing process on the plant floor. They even could be used in such a way that poses a physical danger to humans that work alongside this systems, according to
recent research from IOActive
that studied popular robots and robot-control software used in businesses, homes, and industrial plants.
IOActive discovered some 50 flaws in that could allow a hacker to remotely manipulate a robot moving about the office, plant floor, or home, to infiltrate other networks there, spy and steal information, and even wreak physical destruction.  Compared with IoT, the cybersecurity threat is a lot bigger with robots. They can move around … and could hurt people or damage property if hacked, says Cesar Cerrudo, CTO at IOActive.
Even before IOActive and
Trend Micro and Politecnico di Milano s work
, the academic community was studying robot hacking: In 2015, researchers at the
University of Washington hacked a surgical robot
 to demonstrate how an attacker could hijack and wrest control of a robot during surgery.
Trend Micros Nunnikhoven says that like many industrial systems, robots are designed with physical safety in mind, but not cybersecurity. Their controls also are increasingly software-based, and many robots now come embedded with routers for remote-access monitoring and maintenance by the vendor. Lo and behold we found a ridiculous amount of these [devices] connected to the Internet, some purposely and some unbeknownst to their owners, he says. They were never designed to be connected to the Internet.
Researchers at Trend Micro and Politecnico di Milano pinpointed five classes of attacks that could be waged against industrial robots by exploiting certain combinations of software vulnerabilities. They reported vulnerabilities they discovered to the respective robot vendors, including ABB, which since has updated its robot with security fixes. Trend Micro reverse-engineered ABBs RobotWare control program as well as the RobotStudio software as part of the PoC hack.
Testing is a critical process to stay ahead of new cyber security threats. ABB has fixed the concerns in the Trend Micro tests, which helps us provide greater security for equipment in the market. The results also emphasize the importance of using a secure network, since the testing used an unsecured network connection, ABB said in a statement provided to Dark Reading.
Performing a robot hack isnt cheap, however: the researchers say a similar configuration used in their hack could be purchased online for tens of thousands of dollars.
According to Nunnikhoven, the flaws Trend found in various vendors robots included authentication weaknesses and a lack of end-to-end encryption, as well as other common bugs weaknesses found in IoT and ICS/SCADA systems. 
Robot technical information is often available online, firmware images are unprotected, Web interfaces are left exposed, and their software components are rarely patched, according to Trends findings. The security firm didnt publish specific vulnerabilites in specific products.
They found that an attacker could alter the control system to influence how the robot moves; change the calibration, like in their PoC; manipulate production logic to quietly sabotage the workflow; manipulate the robots status information so operators dont detect any hacks; and manipulate the robots status so the attacker gains full control from the legitimate operator.
The manufacturing sector is a juicy target for hackers. According to the new
Verizon Data Breach Investigations Report
, last year Verizon investigated 115 cyber espionage incidents at manufacturing firms, 108 of which included a data breach. And manufacturing is one of the most frequently hacked industries, according to IBM X-Force Researchs
2016 Cyber Security Intelligence Index
.
When it comes to robots on the plant floor, the security challenges are similar to that of any other industrial network. The devices are in place for many years and rarely get software updates for design and operational reasons. These are multi-year investments, similar to SCADA controllers, Nunnikhoven says of industrial robots. He recommends that manufacturing firms conduct network monitoring to watch for nefarious activity, for example.  That way you can see whats going in and out of the robot.
And [robot] vendors have to do a lot of work to build more secure systems from day one, he says.
Related Content:
Hacked Robots Present a New Insider Threat
Security Experts Call For Regulation On IoT Cybersecurity
The Hidden Dangers of Component Vulnerabilities
3,000 Industrial Plants Per Year Infected with Malware
 

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Researchers Hack Industrial Robot