The "No Network is 100% Secure" series
- The Aurora Power Grid Vulnerability -
Including Stuxnet
A White Paper
All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants
Contact Us
Visit the
Easyrider LAN Pro Security Blog.
The generator room at the Idaho National Laboratory was remote accessed by a hacker and
a $1 Million diesel-electric generator was destroyed.
(U.S. Homeland Security photo)
VIEW THE VIDEO
What is the Aurora vulnerability?: Aurora is a vulnerablity to cyber attacks
that could sabotage critical systems that provide electricity including the nationwide
power grid. This vulnerability effects control systems that operate rotating
machinery such as pumps, turbines and so on. The vulnerability of the nation's
electrical grid to computer attack is due in part to steps taken by power companies
to transfer control of generation and distribution equipment from internal networks
to supervisory control and data acquisition, or SCADA, systems that can be accessed
through the Internet or by phone lines.
The move to SCADA systems boosts efficiency at utilities because it allows workers to
operate equipment remotely. But this access to the Internet exposes these once-closed
systems to cyber attacks. So far, incidents of hackers breaking into control systems
to cause damage or outages have been scarce although there have been a few. However,
the threat of such damage makes
control systems an alluring target for extortionists, terrorists, unfriendly
governments and others.
Electric utilities, pipelines, railroads and oil companies use remotely controlled
and monitored valves, switches and other mechanisms that are vulnerable to attack.
In a dramatic video-taped demonstration of the Aurora vulnerability recorded in 2006,
engineers at Idaho National Labs showed how the weakness could be exploited to cause
any spinning machine connected to the power grid -- such as a generator, pump or
turbine -- to self-destruct. These attacks could easily be carried out on
vulnerable equipment using the Internet.
Costs and time are frequently given as the reasons for not locking down these complex
networks. Many plant operators consider it unlikely that an attacker would be able
manipulate or damage control systems, as most of these systems run on obscure hardware
powered by highly specialized communications standards. However, this
"security-by-obscurity" defense is gradually eroding, as a number of utilities are
upgrading from older, legacy systems to operating systems more familiar to the
average hacker, such as Microsoft Windows and Linux.
The GAO issued a vulnerability report on May 21, 2008 regarding the Tennessee Valley
Authority, the nation's largest public utility company. The GAO found that TVA's
Internet-connected corporate network was linked with systems used to control power
production, and that security weaknesses pervasive in the corporate side could be
used by attackers to manipulate or destroy vital control systems. As a wholly owned
federal corporation, TVA must meet the same computer security standards that govern
computer practices and safeguards at federal agencies. As of 5/21/2008 it apparently
did not. The GAO also warned that computers on TVA's corporate network lacked
security software updates and anti-virus protection, and that firewalls and intrusion
detection systems on the network were easily bypassed and failed to record suspicious
activity.
The task of gauging the electric sector's true progress in mitigating the Aurora
vulnerability has fallen to the Federal Energy Regulatory Commission. In January 2008,
FERC approved eight mandatory reliability standards to protect bulk power systems
against disruptions from cyber-security breaches. The agency has the authority to fine
plants up to $1 million a day for violations of those standards, but the industry has
until 2010 to demonstrate compliance with the new rules.
Security experts contend that existing standards contain loopholes and don't
adequately protect critical power systems. For example, telecommunications equipment
is excluded, even though there are documented cases of computer worms shutting off
service from control systems to substations. There are security experts in the power
industry who recognize the threat from cyber vulnerabilities like Aurora, but who
claim they don't have the funding or the authority to do much about it.
FAA Air Traffic Control system vulnerability: While not an aurora vulnerability
per se, a recent USDOT report stated that the nation's air traffic
control systems are vulnerable to cyber attacks. Support systems have been breached
in recent months allowing hackers access to personnel records and network servers,
according to a government audit.
The Transportation Department's inspector general concluded that although most of the
attacks disrupted only support systems, they could spread to the operational systems
that control communications, surveillance and flight information used to separate
aircraft. The report noted several recent cyber attacks, including a February
incident when hackers gained access to personal information on about 48,000 current
and former Federal Aviation Administration employees, and an attack in 2008 when
hackers took control of some FAA network servers.
Auditors said the FAA is not able to adequately detect potential cyber security
attacks, and it must better secure its systems against hackers and other intruders.
"In our opinion, unless effective action is taken quickly, it is likely to be a matter
of when, not if, ATC (air traffic control) systems encounter attacks that do serious
harm to ATC operations," the auditors said.
According to the report, the FAA received 800 cyber incident alerts during the fiscal
year that ended Sept. 30, 2008, and more than 150 were not resolved before the year
finished. Fifty of those, the auditors said, had been open for more than three months,
"including critical incidents in which hackers may have taken over control" of some
computers. Officials tested Internet-based systems that are used to provide
information to the public. The tests found nearly 4,000 "vulnerabilities,"
including 763 viewed as "high risk." The vulnerabilities including weak passwords,
unprotected file folders, and other software problems.
These weaknesses could allow hackers or internal FAA workers to gain access to air
traffic systems, and possibly compromise computers there or infect them with malicious
codes or viruses.
BIOS is also vulnerable to modern malware attacks:
Basic Input/Output System (BIOS), a firmware run by a computer at the time of boot-up, is
increasingly targeted by malware attacks as modern hackers having administrative OS
rights are effectively conducting BIOS updates or BIOS on the Internet to load
customized low-level firmware. Recently, experts have shown how BIOS malware could be
used to attack multiple operating systems and infect different kinds of motherboards.
According to them, BIOS-based malicious software can disseminate not just on various
OSs, but also by a number of hardware. These attacks are hard to identify and block.
Earlier during March 2009 at the Vancouver CanSecWest security conference, researchers
Anibal Sacco and Alfredo Ortega of Core Security Technologies Inc. performed a general
BIOS attack that could push malware inside various BIOS types, as reported by search
security on June 18, 2009.
Terrorist attacks:
Terrorists groups could soon use the internet to help set off a devastating nuclear
attack, according to research done by the International Commission on Nuclear
Non-proliferation and Disarmament (ICNND). Their study suggests that under the right
circumstances, terrorists could break into computer systems and launch an attack on a
nuclear state triggering a catastrophic chain of events that would have a global
impact. Without better protection of computer and information systems, the paper
states, governments around the world are leaving open the possibility that a
well-coordinated cyberwar could quickly elevate to nuclear levels. In fact, this may
be an easier alternative for terrorist groups than building or acquiring a nuclear
weapon or dirty bomb themselves. Though the paper admits that the media and
entertainment industries often confuse and exaggerate the risk of cyberterrorism, it
also outlines a number of potential threats and situations in which dedicated hackers
could use information warfare techniques to make a nuclear attack more likely. While
the possibility of a radical group gaining access to actual launch systems is remote,
the study suggests that hackers could focus on feeding in false information further
down the chain or spreading fake information to officials in a carefully orchestrated
strike. "Despite claims that nuclear launch orders can only come from the highest
authorities, numerous examples point towards an ability to sidestep the chain of
command and insert orders at lower levels," said Jason Fritz, the author of the paper.
"Cyber-terrorists could also provoke a nuclear launch by spoofing early warning and
identification systems or by degrading communications networks." Since these systems
are not as well-protected as those used to launch an attack, they may prove more
vulnerable to attackers who wish to tempt another nation into a nuclear response.
Cyberspace is real, and so is the risk that comes with it. Online attacks are one of
the most serious economic and national security challenges we face. However, the study
suggests that although governments are increasingly aware of the threat of cyberwar
with other nations, action to bolster those defenses does not alleviate the threat of
a rogue group that circumvented the expected strategies for online warfare. "Just as
the 9/11 attacks were an unprecedented attack with unconventional weapons, so too could
a major cyber attack," it says.
Hacking the 'smart grid': The race to build a "smarter" electrical grid could
have a dark side. Security experts are starting to show the dangers of equipping homes
and businesses with new meters that enable two-way communication with utilities.
There are many benefits to upgrading the nation's electricity networks, which is why a
smart-grid movement was already revving up before the recent economic recovery package
included $4.5 billion for the technology. Smarter grids could help conserve energy by
giving utilities more control over and insight into how power flows. But there are
potential problems with moving too fast.
The risks are similar to what happens when computers are linked over the Internet. By
exploiting weaknesses in the way computers talk to each other, hackers can seize control
of innocent people's machines. In the case of the power grid, better communication
between utilities and the meters at individual homes and businesses raises the
possibility that someone could control the power supply for a single building, an entire
neighborhood, or worse. For example, a computer worm could give miscreants remote
control of the meters, which would let them take advantage of a utility's ability to,
for example, disconnect someone's power for not paying his bill. A key vulnerability
has been found in devices made by an unnamed manufacturer. But once infected, a worm
could spread to other manufacturers' products that use the same communications
technologies and can be used to remotely disconnect people's power.
To get the computer worm going, a hacker might have to get physical access to one of
the meters in order to program it with malicious code. That could start a chain reaction
in which the worm spreads meter to meter over the grid's communication network. This
hack might also be done remotely, if the traffic on the network isn't encrypted.
More than 50 million smart meters are expected to be deployed by U.S. electric utilities
by 2015, according to a list of publicly announced projects kept by The Edison
Foundation. More than 8 million have already been deployed.
How a Phishing Attack Exposed an Energy Company to Hackers: The following is an
unsubstantiated report that was published on the Internet. The report declines to
identify the energy company involved so I will take these "facts" with a grain of salt.
However, the described attack and it's aftermath is certainly plausible so I will
include it here as a potential attack vector that needs to be defended against.
Using a Microsoft zero-day vulnerability and a bit of social engineering, hackers
compromised a workstation and threatened critical SCADA systems. It began with an
e-mail sent to an employee at an energy company, and ended with a security breach that
exposed critical systems to outside control. The attack began to unravel April 3, 2007.
That's when a fraudulent user account, complete with administrative privileges, was
detected by the energy company. Tracing backwards, it turned out that random
administrative accounts were being added in the internal network because another machine
inside their corporate network had been compromised due to a successful phishing attack.
The reason why I am repeating this story is to underscore that fact that the number one
security risk to networks is people.... in some cases, employees can be fooled into
going to a web site that has been infected with malware and once that happens, it's all
over but the crying. But in this example, the attack was even less sophisticated than
that.
The employee machine sat on the same segment where the SCADA (Supervisory Control And
Data Acquisition) controllers were. This, of course, was a fundamental network
security gaffe. Soon, evidence appeared that the attackers had
leapfrogged off this network and broken into the domain controller. The source of the
breach? A relatively simple phishing attack. The phishing e-mail contained a pitch for
a new health care plan, something that caught an employee's eye. The e-mail claimed to
be about benefits for a family with two or more children, and the employee had three.
The message also contained a malicious .chm file attachment. When the employee opened
the attachment, it reached out to a server in the Asia-Pacific region and pulled out a
malicious executable that gave the attackers a foothold on the employee's machine.
This particular attack took advantage of MS07-029, a Windows DNS (Domain Name System)
vulnerability that at the time was unpatched. This, of course, is also a fundamental
network security gaffe. Strike three! You're out... Using the vulnerability as an entry
point, the attackers ended up with control of the employee's account. With the level of
access they gained, the attackers could potentially control, view and modify everything
related to the business.
Our advice? Put a proxy in place for Web browsing, obviously. But more critical is the
subject of segregation. No workstation sharing a critical network segment such as
SCADA should be connected to the Internet. Patch management, employee security training
and the other preventative measures described in this series of white papers are also
vital to protecting your network. HTH....
August, 2010 UPDATE: From the first smart grid security summit, San Jose,
California - The smart grid is still vulnerable to cyber attack!
The current grid, with its hodgepodge industrial control system (ICS) technologies,
is highly vulnerable to a cyber attack that could destroy critical generation and T&D
assets. Resulting outages could last for weeks, causing economic devastation. Smart
grid integration could make it worse. Utility IT staffs with some security knowledge
don't understand ICS, and operations groups that do don't trust, or even like, the
IT groups.
Nationally, very few experts (perhaps tens to low hundreds) understand enough ICS and
IT to be useful. Most industry executives have their heads in the sand. The few that
don't are thwarted by clueless regulators that deny rate cases for even modest
security improvements. The recently discovered Stuxnet infestation targeting Siemens
SCADA systems
(see: http://www.symantec.com/connect/blogs/stuxnet-introduces-first-known-rootkit-scada-devices) provides the first hard evidence that the power grid is still seriously
vulnerable.
One has to wonder why the message is apparently not getting through. One completely
unscientific (and probably unfair) observation is the security messengers appear to
be culturally worlds apart from their utility audiences. They are more likely to be
in tee shirts than ties, have longer hair and beards, have body piercings and tattoos,
and are proud to have been fired more than once for "telling the truth" to their
management. Many have chosen to live in rural locations, have backup generators, and
own more than one gun. It is hard to imagine a starker contrast to the
buttoned-down-white-shirt-and-tie utility executive. Could this be a major impediment
to grid security?
Stuxnet: The Stuxnet worm is included here because, like Aurora, it is used
to penetrate and infect SCADA PLC systems. However Aurora is an opportunistic,
"all purpose" worm which attacks motors, motor generators and Programmable Logic
Controllers generally. Stuxnet is far more specialized and was designed specifically
to attack Iran's nuclear capability. The creator(s) of Stuxnet are
currently unknown. But given how complicated, selective and sophisticated this worm
is, one can make some logical guesses. The short list would most likely include
any International Government with the technical wherewithall and desire to
shut down Iran's nuclear weapons program.
Stuxnet is the first [suspected] Government [sponsored] attack on
another Government that does not involve Military action, bombs, death, a
declaration of war and so on. I
suspect that Stuxnet is the first salvo in a Global trend towards Cyber Warfare
that will continue, grow and escalate for decades (at least) to come. IMHO, it's
just a question of when, not if, Terrorists deploy some sort of Aurora/Stuxnet
attack against the USA and other free Nations around the World. These attacks
can, and probably will eclipse the 9/11 World Trade Center attacks in terms of
disruption and destruction to infrastructures that we depend on for our daily
existence. The emergence of cyber warfare is more significant, in my opinion,
than the creation of the atomic bomb in 1945. The Planet is on the cusp of the
greatest "arms race" ever known.
The worm's target seems to be high value infrastructures in Iran that use Siemens
control systems and specific hardware components. Stuxnet has also infected other
SCADA systems (an estimated 6 million computers in China, for example) but seems to be
disinterested in anything that does not use the narrow band
of equipment found in Iran's nuclear facilities. According to news reports the
infestation by this worm might has significantly damaged Iran's nuclear facilities
in Natanz and has delayed the start up of Iran's Bushehr Nuclear Power Plant.
Although Siemens has stated that the worm has not caused any damage, on
November 29, 2010, Iran confirmed that its nuclear program had indeed been damaged
by Stuxnet.
The Stuxnet worm was first reported by the security company VirusBlokAda in mid-June
2010, and roots of it have been traced back to June 2009. Stuxnet contains a component
with a build time stamp from 3 February 2010. In the United Kingdom on 25 November
2010, Sky News reported that it had received information that the Stuxnet worm, or a
variation of the virus, had been traded on the black market. The name is derived from
some keywords discovered in the software.
The complexity of Stuxnet is very unusual for malware, and consists of attacks
against three different systems: The Windows operating system, an industrial software
application that runs on Windows, and a Siemens programmable logic controller (PLC).
This type of attack required in-depth knowledge of industrial processes and an
interest in attacking industrial infrastructure. Developing the capabilities
in Stuxnet would have required a team of people to program, as well as check that
the malware would not crash the PLCs.
Stuxnet attacked Windows systems using four zero-day attacks (plus the CPLINK
vulnerability and a vulnerability used by the Conficker worm. It initially spread
using infected removable drives such as USB flash drives, and then used other
exploits and techniques such as peer-to-peer RPC to infect and update other computers
inside private networks that are not directly connected to the Internet. The number
of zero-day Windows exploits used is unusual, as zero-day Windows exploits are valued,
and hackers do not normally waste the use of four different ones in the same worm.
Stuxnet is unusually large at half a megabyte in size, and written in different
programming languages (including C and C++) which is also irregular for malware.
The Windows component of the malware is promiscuous in that it spreads relatively
quickly and indiscriminately.
The malware has both user-mode and kernel-mode rootkit capability under Windows, and
its device drivers have been digitally signed with the private keys of two certificates
that were stolen from separate companies, JMicron and Realtek, that are both located
at Hsinchu Science Park in Taiwan. The driver signing helped it install kernel-mode
drivers successfully and remain undetected for a relatively long period of time. Both
compromised certificates have since been revoked by VeriSign.
Two websites were configured as command and control servers for the malware, allowing
it to be updated, and for industrial espionage to be conducted by uploading
information. Both of these websites have subsequently been taken down as part of a
global effort to disable the malware.
Once installed on a Windows system, Stuxnet infects project files belonging to
Siemens' WinCC/PCS 7 SCADA control software, and subverts a key communication library
of WinCC called s7otbxbx.dll. The purpose of this subversion is to intercept
communications between the WinCC software running under Windows and the target Siemens
PLC devices that the software is able to configure and program when the two are
connected via a data cable. In this way, the malware is able to install itself on
PLC devices unnoticed, and subsequently to mask its presence from WinCC if the
control software attempts to read an infected block of memory from the PLC system.
The malware furthermore used a zero-day exploit in the WinCC/SCADA database software
in the form of a hard-coded database password.
The complete Stuxnet code has not yet been decrypted, but among its peculiar
capabilities is a fingerprinting technology which allows it to precisely identify
the systems it infects. Stuxnet requires specific slave variable-frequency drives
(frequency converter drives) to be attached to the targeted Siemens S7-300 system
and its associated modules. It only attacks those PLC systems with variable-frequency
drives from two specific vendors: Vacon based in Finland and Fararo Paya based in
Iran. Furthermore, it monitors the frequency of the attached motors, and only attacks
systems that spin between 807Hz and 1210 Hz. The industrial applications of motors
with these parameters are diverse, and may include pumps or centrifuges. Stuxnet
installs malware into memory block DB890 of the PLC that monitors the Profibus
messaging bus of the system. When certain criteria are met, it periodically modifies
the frequency to 1410 Hz and then to 2 Hz and then to 1064 Hz, and thus affects the
operation of the connected motors by changing their rotational speed. It also installs
a rootkit that hides the malware on the system - the first such documented case on
this platform.
Stuxnet removal: As stated earlier, you don't have to be running a nuclear
facility in Iran to become infected with Stuxnet! Siemens has released a detection
and removal tool for Stuxnet. Siemens recommends contacting customer support if an
infection is detected and advises installing Microsoft patches for security
vulnerabilities and prohibiting the use of third-party USB flash drives. Siemens
also advises immediately upgrading password access codes. The worm's ability to
reprogram external programmable logic controllers (PLCs) may complicate the removal
procedure. Fixing Windows systems may not completely solve the infection; a thorough
audit of PLCs is recommended. Despite speculation that incorrect removal of the worm
could cause further damage, Siemens reports that in the first four months since
discovery, the malware was successfully removed from the systems of twenty-two
customers without any adverse impact.
As predicted, Aurora and Stuxnet would eventally morph into an "all purpose" power
generating sytem virus. And so it has. Enter the "Duqu virus". More on this later
but suffice it to say that Duqu is designed to penetrate pretty much any SCADA system,
collecting passwords and probing for vulnerabilities that would allow it to shut
down power generation facilities, among other things. Prepare for blackouts and
Government excuses as to why this was allowed to happen.
About the Author
Frank Saxton is a computer network security engineer and
Easyrider LAN Pro principle.
Home-based in Portland, Oregon, Frank has been designing remote diagnostic and
network enterprise monitoring centers since the late 1970s. Prior to becoming a
professional systems engineering consultant in 1990, Frank had a 20 year career
in computer systems field engineering and field engineering management. Frank
has a BSEE from Northeastern University and holds several certifications including
Network General's Certified Network Expert (CNX). As a NOC design engineer and
architect, Frank works regularly with enterprise-class monitoring tools such as
HP Openview Operations, BMC Patrol and others. In his enterprise security
audit work, Frank uses sniffers and other professional grade monitoring tools on a
daily basis.
Next in the security white paper series:
How Cyber Criminals will mature over the next ten years
Are you vulnerable to drive-by exploits?
High value sites recent hacks
More 2009 hacks in the news
Still more 2009 hacks in the news
IT employment challenges of the 21st century
Employment reference checking white paper
Competency Certifications White Paper
Firewall White Paper
Virus White Paper
GhostNet White Paper
Password White Paper
Digital Identification Certificates White Paper
Cryptography White Paper
OpenID White Paper
Intrusion Detection Systems IDS White Paper
Rootkit White Paper
Unnecessary Windows XP Services White Paper
Scareware White Paper
Exaflood Internet Brownout White Paper
Cloud Computing White Paper
Proxy Server White Paper
Personal Computer PC Security White Paper
Conficker White Paper
Phishing White Paper
DNS Poisoning White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Trojan Virus Attacks White Paper
Port Scanning White Paper
Monitoring Basics 101 White Paper
Monitoring Basics 102 White Paper
Monitoring Basics 103 White Paper
Virtual Machine Security White Paper
Shelfware White Paper
Outsourced IT White Paper
Easyrider LAN Pro Consulting services:
Network Security Audit and PC Tune-up service
- Proxy server installation and configuration
- Enterprise security consultations
- Disaster recovery planning
- Disaster recovery services
- Capacity, migration and upgrade planning
- Build and deploy central syslog server
- Build trouble ticket systems
- Design and build monitoring environments
- Design and build Network Operations Centers (NOC)
- HP Openview, BMC Patrol consulting
Last modified March 25, 2009
Copyright 1990-2010 Easyrider LAN Pro