Latest News

How cyber hackers can shut down a process without leaving tracks

Cyber attacks are not just about stealing lists of credit card numbers. There are plenty of examples of direct attacks on process control systems, showing that hackers understand them thoroughly. 

Here is an example of how a cyber criminal can shut down a process using a published sensor vulnerability, in a way that will be very difficult for a company to figure out. So difficult, that the attacker may be able to do it multiple times.

In December 2015, ICS-CERT published vulnerability # ICSA-15-309-02 on Honeywell Midas ambient gas detectors. Per ICS-CERT, the vulnerability ‘could allow a remote attacker (with ‘low skill’) to gain unauthenticated access to the device, potentially allowing configuration changes, as well as the initiation of calibration or test processes.’

Such devices detect ambient release of small amounts of toxic or flammable gas. It is common to locate many such detectors in a processing area, and to configure both alarms and automatic process shutdowns on multiple simultaneous detection signals.

Imagine yourself as the attacker. Possessing at least the ‘low skill’ mentioned by ICS-CERT, you have gained access and are looking at a dozen such devices. You can see their configuration, descriptions, IDs and detection ranges. You can alter these and even generate calibration or scale checks.

In other words, attackers can generate alarms at will. A good strategy would not set off all the alarms at once – instead they select four or five that seem associated by their names (West Side First Level, West Side Second Level), and initiate a 4-20ma scale check. Alarms indicating the presence of gas will result. Note that several other options involving sensitivity and other settings can be used to create false alarms.

An operator sees these alarms. It looks like a serious leak. The response could vary, but a lowering of production rate, pressure, or even shutdown of that part of the process may be their quite reasonable response.

Evacuation of operations or maintenance personnel in that area will be ordered. Responders may have to suit up and verify the signals using hand-held gas detectors. Of course, they will find nothing. But the physical process examination will be thorough and time consuming. After all, this was a simultaneous set of alarms from different detectors, not some single-sensor failure.

In the meantime, the hacker covers his/her tracks, restoring any detector to its prior values. By the time the investigation gets around to looking at the configuration of the detectors, there is nothing amiss. The alteration may not have produced a change event into the record system.

After a thorough yet futile leak search, the process is restarted, but perhaps with additional personnel stationed with leak detectors, and likely with extra operator coverage at first – both expensive and disruptive.

But the hacker is patient. Two weeks later, the attack is repeated, choosing different sensors. The attacker might even be smart enough to coordinate the attack and the detectors chosen with wind direction – easy to determine from weatherzone.com.au – this time on the South side.

The response to a second such incident might involve a much more detailed plant inspection, involving hundreds of man-hours and a significant process outage – all to find a leak that isn’t there. This costs a lot of money and even more in lost production.

How does industry protect against an attack like this? The ICS-CERT advisory says that a patch via firmware upgrade to the device is needed to remediate the vulnerability. Do you monitor all such vulnerability notifications? Do you have an inventory of ICS-level devices (not just your level-2 ‘PC’ devices) to match them against? And hopefully an inventory that was created with automated means not involving hundreds of manhours of manual effort?

Do you have an automated patch management and reporting system that keeps track of progress on all relevant vulnerabilities? Have you saved configuration baselines against which your devices are periodically and automatically checked for unauthorised change?

If these questions make us uneasy, we are not alone. In our industry, the endpoints that really matter are the elements deep in our control systems, elements that are neither detected nor tracked in most cyber security solutions. They are the ones where unauthorised change can have the worst outcomes.

A true ICS cyber security solution is one that has a deep understanding of the inner workings and configurations of the many different control systems we use.

Send this to a friend