Stealthy New PLC Hack Jumps the Air Gap

  /     /     /  
Publicated : 22/11/2024   Category : security


Stealthy New PLC Hack Jumps the Air Gap


Researchers at Black Hat Europe next month will demonstrate a data-exfiltration attack on Siemens PLCs that uses combination of code manipulation and Radio Frequency (RF) emissions.



Once again, a new hack shatters the myth of the air-gapped industrial network.
Researchers have devised a sneaky reconnaissance attack that drops rogue ladder-logic code onto a Siemens programmable logic controller (PLC) to gather sensitive plant data from an industrial network with no Internet connection, and then siphons it remotely via Radio Frequency (RF) transmission. A nation-state or other hacker group could use the stolen information for a future attack that sabotages the plants physical operations.
We know that two-thirds of industrial networks are air gapped, says David Atch, vice president of research for CyberX, who along with CyberX researcher George Lashenko, will demonstrate
their research at Black Hat Europe next month
 in London. We decided to look for a way to [exfiltrate data from] the air-gapped network and we decided to try something more unique and with more of a cover to avoid detection, he says.
Organizations often have a false sense of security if their networks are air-gapped, or isolated from the Internet. But the infamous Stuxnet attack, where a rigged USB stick carried malware into Irans Natanz nuclear facility, demonstrated how it only takes one infected machine or device to get connected to the network to wreak destruction.
The ladder logic code Atch and Lashenko wrote for the Siemens S7-1200 PLC in their hack generates frequency-modulated RF signals that ride just under the AM radio band and encode the stolen data, which could be anything from network topology details to nuclear blueprints. The data gets decoded via a Software Defined Radio and PC connected to the targeted site with an antenna. The researchers say an attacker could either fly a drone over the plant to siphon the stolen recon, or set up the SDR and PC nearby for collection.
The malicious code is written to the storage architecture of the PLC so that it remains on the device even if the PLC gets rebooted. These devices dont have radio transmitters, Atch notes, but the ladder-code logic makes the device generate a radio frequency.
There are no vulnerabilities per se that the researchers exploited, and its an attack that could be waged on any vendors PLC. Their attack basically takes advantage of the architecture and inherent weaknesses in industrial networks, which typically have weak or no authentication, for example. PLCs, which control physical processes such as water and power generation, dont run anti-malware due to their embedded real-time operating systems and limited memory and CPU, so they can be easily infiltrated with malicious logic code, the researchers note.
The attack would first require dropping that code onto the PLC. That could occur via the compromised laptop of a plant engineer performing maintenance, or a USB, for example, Atch explains.
Not the First PLC Breach
PLCs have been the darling of white-hat hackers since the discovery of Stuxnet in 2010. Stuxnet targeted an older model of Siemens S7 PLC to ultimately sabotage centrifuges at Natanz. Since then, researchers have poked around at PLCs to explore other ways they can be abused by the bad guys.
Researchers at last years Black Hat Europe in London, for instance, built
a silent rootkit for PLCs
that like CyberX teams, sat directly on the PLC. But it manipulated the I/O peripherals and PLC process and did not target the PLC logic code like CyberXs attack does.
Ali Abbasi and Majid Hashemis rootkit ran in dynamic memory of the PLC, where they said it was less likely to be detected. In our attack, the PLC logic and PLC runtime remain intact, which kept it hidden, Abbasi explained in an interview with prior to Black Hat Europe 2016. The rootkit can manipulate the I/O and PLC process, such as opening or closing a pressure valve.
And earlier that year at Black Hat USA in Las Vegas, researchers from OpenSource Security demonstrated 
PLC-Blaster, a PLC worm
that spreads on its own among PLCs. Researchers Ralf Spenneberg and Maik Bruggemann used a Siemens S7-1200 PLC for their attack, demonstrating how malicious code can be added to a PLC and go undetected, issuing rogue commands to the operation of connected machinery. PLC-Blaster also searched for and infected other PLCs on the same network.
CyberXs Atch and Lashenko say their hack serves as another wakeup call for industrial network operators who think their systems are untouchable if theyre not connected to the Internet, aka air-gapped. 
They were able to exfiltrate data from the Siemens PLC from a distance of one meter, but Lashenko says that distance could be extended with the right type of antenna and code. With a drone, that distance could be expanded to 10 meters, for example.
The best way to defend against air-gapped network attacks is to employ network monitoring to detect unusual activity in the network, notes Phil Neray, vice president of industrial security at CyberX. If someone tried to download new ladder logic onto a PLC … it would be identified and generate an alert, he notes.
But unlike PCs, PLCs dont have authentication, antivirus, or endpoint detection and response agent tools to catch malware or suspicious activity. Once an attacker gets into the PLC, its easy and he can stay there a long time.
Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity
agenda here
.
Related Content:
8 Older Companies Doing New Things in Security
Stuxnet, The Prequel: Earlier Version Of Cyberweapon Discovered
Siemens Teams Up with Tenable
Stuxnets Earlier Version Much More Powerful And Dangerous, New Analysis Finds

Last News

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Stealthy New PLC Hack Jumps the Air Gap