Support Forums Reveal SCADA Infections 66
chicksdaddy writes "We hear a lot about vulnerabilities in industrial control system (ICS) software. But what about real evidence of compromised SCADA and industrial control systems? According to security researcher Michael Toecker, a consultant at the firm Digital Bond, the evidence for infected systems with links to industrial automation and control systems is right under our eyes: buried in public support forums. Toecker audited support sites like bleepingcomputer.com, picking through data dumps from free malware scanning tools like HijackThis and DDS. He found scans of infected systems that were running specialized ICS software like Schweitzer Engineering Labs (SEL) AcSELerator Software and GE Power's EnerVista Software (used to configure GE electric power protection products). The infected end user systems could be the pathway to compromising critical infrastructure, including electrical infrastructure. 'With access to a protection relay through a laptop, a malicious program could alter settings in the configuration file, inject bad data designed to halt the relay, or even send commands directly to the relay when a connection was made,' Toecker wrote."
wtf... (Score:3, Insightful)
Why are you people posting about your nuclear power plant problems online?
Re:wtf... (Score:5, Funny)
Re: (Score:2)
Re: (Score:2, Insightful)
What do all the blinking red light mean?
Nothing, unless you've tried turning it off and then back on again. In which case, it means I have to refer you to second level support.
Re: (Score:2)
Just reboot three times.
If that doesn't help, reinstall the operating system.
Where did you say you were calling from again?
Re: (Score:1)
Oh, you've hooked our hardware up to somebody else's hardware? That light means there is a problem with the other hardware.
We'll have to charge you for this support call and recommend you call the other manufacturer.
Re: (Score:3)
Second level support here. It means the Radiation Beam has been erroneously set to full power.
(Unfortunately if you think this is a joke, google the Therac 25 accident. This should be compulsory study for all programmers and software engineers.)
Re: (Score:2)
Re: (Score:2)
do they still blink even after you've given the box a fonzie?
Re: (Score:2)
"man, oh man, I got it made in the shade"
you recite that after striking the juk^H^H^Hbox on the side.
Re: (Score:2)
Core Meltdown Simulation in progress Mr. Simpson.
Re: (Score:2, Insightful)
ICS controls more then just Nuclear Plants. They control a wide range of industry machinery. Think how windows is to desktop, ICS is to the "professional" industry that involves complex machines.
Is this one of these support groups ... (Score:2)
Will we have to go up in front of a group and say, "Hi. My name is PPH and I plugged a thumb drive into my SCADA controller. I've been doing Windows for years and I guess it just caught up with me one day."
Re: (Score:1)
"Hi. My name is PPH and I plugged a thumb drive into my SCADA controller. I've been doing Windows for years and I guess it just caught up with me one day."
"Hi, PPH. This is the support group for information security professionals." (lights go out) "Alright guys, group therapy time has been rescheduled in favor of physical therapy. GET HIM!"
it will never heal.. (Score:5, Funny)
if you keep picking on the SCADA, it will never heal!
of course it gets infected.
Re:I'm confused.. (Score:5, Insightful)
Why would anyone responsible for these computers (running devices whose operation is dangerous to human life) ever connect them to the internet?? Are they complete morons? Why would they be able to keep their jobs? Are they all idiot sons of rich people and therefore can't be fired or something? I don't get it? What am I missing?
How many millions of dollars a year do you want to spend to maintain that isolation? You can do it, it's just really expensive.
1. Lock down/destroy all wireless comm on all hardware
2. Make entire network visible - all cable runs visible in clear conduits.
3. No software installs without full audit (sorry, no commercial installs allowed, no audit software allowed on the gold network)
4. Destroy all hardware leaving the building (and yes, that includes guests' cellphones.)
5. No windows, line of sight, radio leakage, etc.
6. Fab your own chips. Even a 555 timer can hold a rogue 8086.
7. No interns. Assume every Chinese grad is a malware vector (and everyone else, too.)
8. Assume you still have a 1 bit per second channel to the outside world (power draw, sound, etc.)
Re: (Score:2)
... ...
6. Fab your own chips. Even a 555 timer can hold a rogue 8086.
Unless you provide proof, I call bullshit.
Re:I'm confused.. (Score:4, Interesting)
I was not completely clear, but even if you opt for even a simple DIP-8 555, current tech lets us embed a side-saddle microprocessor (4004, 6502, 8086) easily. Unless you pry the top off and scan it, you can't be sure you don't have a trojan horse. It's only a few thousand lines of code for the chip to decide it's in the right place for its payload (running a centrifuge, controlling a missile fin, etc) and then to fail nastily.
We've been doing targeted component sabotage for decades (Russian gas pipelines, Stuxnet, xerox tricks.) Don't trust integrated circuits to be what they claim to be.
Use a PIC (Score:2)
If it weren't for the fact that Vdd and Vss are reversed, a properly programmed PIC 12f675 could be a pin-for-pin replacement for a 555. As a matter of fact, I've stopped using 555s entirely, since a 12f675 provides the same functionality, and more, with NO external parts.
Installing a trojan would be as easy as inverting the 1 and 8 pins inside the package.
Re: (Score:2)
What the fuck did I just read?
Re:I'm confused.. (Score:4, Insightful)
What the fuck did I just read?
Something about actual security issues (like what the article was about,) rather than "system ok, internet link bad, idiot sons of rich people" post.
Re: (Score:2)
Re: (Score:2)
You appear to have a problem with the concept of direction. The problem being addressed was that of stuff with the evil bit set coming *in* from the internet. Moving a PC relative to the windows does not change that at all, for example. Most of your defences seem to *presume* there's a man on the inside, but if you've got a man on the inside, there's no defence if there are *any* input devices at all. And a computer with no input devices can not receive or process any information. And therefore isn't a computer any more. You're just trying to show off that you can think of lots of ways of getting data off a supposedly secure system, which is pointless willy waving, anyone can do that. Why did you mention destroying guests' phones, but not the pad of paper they had in their pocket? Or their memories?
Its a lot easier to physically secure hardware -- and, more importantly, to know when a physical compromise has happened. These organizations, by and large, already have those provisions in place. I can't speak for the GP, but I would assume that's why he didn't get into those issues. People understand (to some extent) physical security. They don't understand "technical" security.
Re: (Score:2)
It's still utterly nonsensical in response to what it's a response to -- so yeah, take your sophistry to someone who falls for it because I surely don't. Clown.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Also, from my own experience working with scada systems most organizations mirror the data over to a decision support service that lacks the control modules. So some of these infections may simply be on the historian not the control system.
Re:I'm confused.. (Score:5, Insightful)
My impression is that there are two basic schools of problem:
1. The SCADA-related stuff is, in fact, properly air-gapped. Then the contractor who has to update the firmware on widget Z shows up and plugs in or a stupid and/or malicious insider manages to find a working USB port.
2. You install a fancy Supervisory Control and Data Acquisition system. Your Boss says "WTF, why can't I supervise and manage from the comfort of my iPad like in the vendor demo?" You proceed to punch one or more holes in your precious security.
Re: (Score:3)
Re:I'm confused.. (Score:4, Informative)
Almost all situations fall into the first category. The SEL relays have rear ports for permanent connections and a front port for service. Usually they are set up so programming can't be changed over the serial or Ethernet network, but the front port has no ability for lock-down. SEL even has a cute little "data transporter" that has a serial port on it, so you don't have to bring your laptop to the relay.
The attack alluded to should be able to bypass the sneakernet use of the data transporter. Conceivably, if the service tech's laptop is compromised all relays would allow for remote settings change despite the visible settings on the laptop.
But, unless you could crack the relay firmware downloading the settings to another device or viewing from the built-in screen (which is extremely tedious), you would easily identify the problem.
I'm torn on how serious to take this. It isn't like settings are changed often, so practical implications are limited.
Re: (Score:3)
You're actually missing quite a lot.
1. Many of these systems are remote and need to be managed remotely. The ability to do this via leased lines through telecoms is greatly diminishing and the result is often even if you do get some kind of leased line it still gets routed through the internet.
2. These systems need to be constantly visible and accessed by a wide variety of non control software to help optimise a process.
3. Legal requirements often force you to physically connect this to some kind of remote
Re: (Score:2)
First-hand experience (Score:5, Informative)
I'm a sysadmin for a small municipal office with a SCADA system. I manage every computer except the one used for SCADA, which is the responsibility of the vendor. Their only concern is that the computer stays unmodified from their "standard" set up, but it still requires unrestricted Internet access. This means:
*Windows XP SP2
*Automatic Updates turned off
*No third-party software (ex: antivirus)
*No domain/group policy
*Symantec pcAnywhere 11 host (this is the version Symantec admited to being breached and to stop using)
As the sysadmin I can stick it on a VLAN to keep it away from the computers I'm responsible for, but other than that, my hands are tied.
Similar situation. (Score:4, Insightful)
The only thing I could do was to log all the traffic to/from those boxes and save it in case anything happened in the future.
I blame whomever negotiated those contracts. There is no reason why those machines cannot be firewalled at the very least.
Re: (Score:2)
Agree. Bad contract setup and irresponsible vendor. You can have it done better, although that doesn't provide much for guarantees. At least a certificate-based VPN...
Re: (Score:2)
How retarded promotional videos like this [youtube.com] geared towards PHBs. The marketing and sales people do not want certificates and security as it would make their products look bad and hard to setup.
Easy access and PHB approved so the IT is ordered to do it or find another job. When shit hits the fan you just fire the IT guy.
Re: (Score:2)
I think if government (ie: DHS in the US) really wants to secure SCADA without overhauling it, they should require and provide site-to-site VPN routers with Internet traffic blocked minus a few things. Just plug them into a modem or switch and 99% of the problem is taken care of. I think it would cost pennies compared to things like the backscatter scanners.
Re: (Score:3, Informative)
As the sysadmin I can stick it on a VLAN to keep it away from the computers I'm responsible for, but other than that, my hands are tied.
Until your boss calls and asks why can't he view setup on his phone from the internet like was shown in the promotion video? Please unblock internet access. ... then an employee who is trying to get around the facebook firewalling software uses it to browse the internet. Oh, yeah fun times.
Re: (Score:1)
Re: (Score:1)
Not to surprising. BTW it worse than that.
These systems were *never* designed with security in mind. They were designed to talk to each other and quickly and then get out of the way. The protocols used do not even have a concept of it. In many cases you are lucky they talk to each other at all.
Then you had a handful of manufactures trying to corner the 'security' (which was a pathetic joke). Which means at a time when it should have been getting traction on 'how to talk to each other securely'. You ha
Re: (Score:2)
We had a company with those requirements and we refused point blank to allow it Internet access. We allowed them a one day trial to prove it was secure and of course it was riddled with viruses within hours. We then forced them to wipe and reinstall it, and plugged it in to our isolated production network.
The guys designing and working with these systems haven't the first clue about IT, let alone security.
Re: (Score:2)
SEL 5030 AcSELerator Quickset (Score:1)
I, along with many others at my company, have Quickset loaded on our laptops. It's just configuration software that you use to prepare protective relays (and could use to communicate with them). I suppose the database on it could be hacked (it's a secured pgsql database, but that security can easily be overridden if you know what you're doing). It is *not* a SCADA package. It's on every relay tech's laptop, along with many engineers. I'd not be surprised to see virii on computers with Quickset on it at all,
As someone who installs lots of protective relays (Score:3, Informative)
I can tell you that none of the protective relays I've installed, the engineers involved didn't care one bit for security and all the SEL relays, Square D SEPAM relays, GE Relays, they are all installed with the default password with full access to anyone that has a RS-232 or Modbus cable. None of these relays are set correctly and barely anyone knows what setups to use on them. If someone really wanted to create a disaster, these relays are wide open, and someone with a laptop can easily just make a quick script to upload malicious settings and code to these relays very easily and quickly. The ones that are networked via status updates are even worse. As for SCADA systems, the majority of them are running Windows XP with no updates on, no antivirus, no anything and have full unrestricted access to the internet with full access to the PLC's on machines. These vulnerabilities have been known for YEARS by many installers, so I really don't find this article that surprising.
Re: (Score:1)
If someone has access to the RS232 port on the relay, you have MUCH bigger problems. Heck, they can remove the six screws and set the 'no password' jumper on an SEL relay and not worry about passwords at all.
Once physical security is compromised, electronic security is worthless. Hit the bus diff lockout switch and the station will clear anyway...
Re: (Score:2)
I currently take care of one the largest SCADA/DCS/PLC systems. I have had numberous discussions about security but our policy seems to be security through obscurity.
Later
Re: (Score:2)
Modbus cable? What kind of security are you dealing with here? From what I can gather the only time someone will be able to start messing with this stuff is if they are there, standing right in front of the relay. At this point all bets are off. There are many thousands of things someone could do at a plant to wreak havoc even once you have passworded your modbus interface, and many of them are far less technical than modifying a protective scheme so why bother.
If this is your only remaining concern I would
Good Grief ! (Score:2)
Unfortunately in the real world... (Score:2)
Organizations that use SCADA and/or distributed controls, typically the manufacturing and raw materials sectors but also public utilities, very seldom maintain complete on-site in-house support for said systems or their industrial sub-components (proprietary machine programs, frequently written in Step 7 or ControlLogix but locked down by the machine vendor). Neither are most maintenance budgets able to afford frequent on-site vendor visits.
That means off-site tech support, and therefore internet access.
Air