Expert: Hackers penetrating industrial control systems
Digging out from infrastructure attacks could take months, Joseph Weiss says
IDG News Service - The networks powering industrial control systems have been breached more than 125 times in the past decade, with one resulting in U.S. deaths, a control systems expert said Thursday.
Joseph Weiss, managing partner of control systems security consultancy Applied Control Solutions, didn't detail the breach that caused deaths during his testimony before a U.S. Senate committee, but he said he's been able to find evidence of more than 125 control systems breaches involving systems in nuclear power plants, hydroelectric plants, water utilities, the oil industry and agribusiness.
"The impacts have ranged from trivial to significant environmental damage to significant equipment damage to deaths," he told the Senate Commerce, Science and Transportation Committee. "We've already had a cyber incident in the United States that has killed people."
At other times, Weiss has talked about a June 1999 gasoline pipeline rupture near Bellingham, Wash. That rupture spilled more than 200,000 gallons of gasoline into two creeks, which ignited and killed three people. Investigators found several problems that contributed to the rupture, but Weiss has identified a computer failure in the pipeline's central control room as part of the problem.
It could take the U.S. a long time to dig out from coordinated attacks on infrastructure using control systems, Weiss told the senators. Damaged equipment could take several weeks to replace, he said. A coordinated attack "could be devastating to the U.S. economy and security," he said. "We're talking months to recover. We're not talking days."
The industrial control system industry is years behind the IT industry in protecting cybersecurity, and some of the techniques used in IT security would damage control systems, Weiss added. "If you penetration-test a legacy industrial control system, you will shut it down or kill it," he said. "You will be your own hacker."
Part of the problem is that there are only a handful of control systems suppliers, and their architectures and default passwords are common to each vendor, Weiss said. In addition, there are probably fewer than 100 experts in control system cybersecurity worldwide, and U.S. universities don't have curriculums focused on control system cybersecurity, he added.
Attacks are coming from outsiders, but also from employees or former employees, Weiss said. "I believe the threat is increasing not only because of nation states ... but because the economic downturn has created many disgruntled but knowledgeable antagonists," he said.
Weiss gave three examples of cases involving disgruntled employees, including a recent case in California, where an employee disabled the leak detection systems in three oil derricks off the coast.
Senators called for an increased focus on cybersecurity in the U.S. government and private industry. "It's very important for people to know that cybersecurity is not just about protecting our government networks from countries with terrorists or hackers who want our secrets," said Sen. Jay Rockefeller, a West Virginia Democrat and committee chairman. "It's about protecting our nation's critical infrastructure from cyberattacks that could severely impact commerce and the economy, that are absolutely devastating."
Too many U.S. residents don't think or know about the ongoing cyberattacks, Rockefeller added.
However, James Lewis, director of the Technology and Public Policy Program at the Center for Strategic and International Studies, also called on Congress to focus on traditional IT security in addition to control systems. Right now, intellectual property in the U.S. is being compromised, and those losses will hurt the long-term competitiveness of the nation, he said.
While control systems represent a potential for attack, "we're under attack right now," Lewis said. "I worry more about the loss of information. Right now, we are being robbed by foreign entities of our most valuable technology, and we have to stop that."
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!