text
stringlengths 4
429
|
---|
has a high potential for critical disruption through sabotage attacks. Any interruption to the power grid would
|
cause substantial chaos and cascading effects resulting in financial loss.
|
In the past there have been quite a few attacks that included targets in the energy sector. Some of these were
|
more focused, like Stuxnet, Duqu, Shamoon/Disttrack and Night Dragon. Others saw power companies targeted
|
among many other sectors, such as Hidden Lynx, Nitro, Flamer, Net Traveler and Elderwood to name a few.
|
One of the biggest examples, and a game changer for many organizations, was Stuxnet. This targeted sabotage
|
attack, which is believed to have been aimed against uranium enrichment facilities in Iran, made clear what
|
could be done through cyberattacks.
|
It is also clear that the energy sector is not exempt from the generic attacks that every company faces, such
|
as ransomware that locks PCs or financial Trojans that attempt to steal passwords and credit card details. For
|
example, such a case happened in May 2013, when a small fuel distribution company in North Carolina fell
|
victim to a cyberheist that transferred US$800,000 from the company
|
s bank account. Such threats spread
|
broadly and might impact any person, regardless of their employer. These attackers aim at infecting as many
|
computers as possible in order to maximize their chances of profits. These attacks can include nonspecific data
|
breaches where employee or customer records get stolen, as happened to the US Department of Energy in July
|
2013.
|
For this paper we focused on email data from targeted attacks between July 2012 and June 2013. Even though
|
watering holes are becoming more frequently used in targeted attacks, it is unfortunately quite difficult to
|
reliably map these to individual campaigns. A blocked drive-by download attempt does not give any indication
|
if it was a targeted attack or just general noise. In quite a few cases we see the same common malware, like
|
Poison Ivy, being used by generic attackers and by targeted attacks. In such cases the sole difference between a
|
sophisticated targeted attack and a generic one lies in the person commanding the malware.
|
Page 5
|
EXPOSED SYSTEMS:
|
ONLINE AND OFFLINE
|
Experts predict
|
that billions of
|
smart meters
|
and sensors
|
will be installed
|
worldwide over the
|
next ten years.
|
Targeted Attacks Against the Energy Sector
|
Exposed systems: Online and offline
|
Historically most industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems
|
were in separated networks not connected to the Internet or any other network. Unfortunately this security
|
through segregation approach does not fully protect against cyberattacks. In reality, networks are rarely
|
completely isolated. Often some configuration updates are periodically installed or log files are transferred. If
|
systems are not directly connected, the method of choice for these types of interactions is usually through a USB
|
stick or a non-permanent modem connection, which provides a way into the restricted networks. This allows
|
malware to spread into such isolated networks as demonstrated many times by threats such as Stuxnet.
|
If networks are truly segregated, this would mean that there would be no software updates installed, leaving
|
old vulnerabilities open. There are also issues around processes. For example, the revocation lists for digital
|
certificates are seldom updated and therefore certificates which are no longer valid cannot be checked properly
|
and would still be accepted.
|
With the increasing desire for connectivity now reaching industrial plants, many operators have started to
|
connect their ICS to the Internet. New adapters can bridge to older technology which was never intended to be
|
controlled over the Internet, allowing it to be connected easily. This allows for efficient centralized monitoring
|
and, to some extent, remote control of equipment.
|
Depending on the type of machinery controlled through the human-machine interface (HMI) of the ICS, not all
|
modifications are possible. Some systems are physically connected in a pure read-only mode for monitoring.
|
And even if they are fully connected, some turbines have physical limitations or emergency systems based on
|
physical effects that cannot be overridden by the digital controller. Thus, not all Hollywood scenarios of open
|
flood gates or turbines that fly through the air are possible. However, sabotage attacks that damage equipment
|
are definitely possible, as has already been demonstrated. In the future, more systems are going to implement
|
the failsafe switches in software, opening up the vector for malware attacks.
|
An additional source of concern is that some countries have started to open the energy market for smaller
|
private contributors. This means that almost anyone can use mini power plants like water, wind or photovoltaic
|
sites to feed energy back into the power grid. Often these operators do not have a full IT staff supporting
|
the facilities at hand, which might lead to more vulnerable installations. Furthermore they may deploy new
|
technology which might be untested and contain some unknown vulnerabilities. While these smaller sites make
|
up only a small portion of the grid, new decentralized power input feeds are a challenge for the balance of the
|
power grid as well and need to be carefully monitored. Small outages or changes can have a domino effect for
|
the whole power grid.
|
To increase the exposure of energy firms even further, sites like SHODAN, which is essentially a search engine
|
for devices, enable anyone to easily find exposed controllers on the Internet. Of course not all of the industrial
|
control systems connected to the Internet are critical systems or even real ones. Some researchers have started
|
to create honey pot systems in order to study the attackers, which have apparently already attracted attackers
|
like the Comment Crew/APT1 group, who have broken into these decoy systems.
|
Page 7
|
Targeted Attacks Against the Energy Sector
|
Smart grid: A new potential avenue of attack
|
Smart grids and smart metering are
|
bringing significant change to
|
the world
|
s power systems.
|
Experts predict that
|
billions of smart meters
|
and sensors will be
|
installed worldwide
|
over the next ten
|
years. They enable
|
utility companies
|
to measure energy
|
consumption at a
|
more granular
|
level, creating
|
better flow
|
patterns and
|
enabling
|
different
|
prices for
|
consumption
|
based on
|
the time of day and
|
location. This development
|
brings new opportunities, as well
|
as new challenges.
|
As with any connected infrastructure, it is important to
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.