Hacking into and shutting down industrial systems on which the U.S. relies is staggeringly easy, according to recent presentations from the Black Hat hacker conference.
Picture this: A few pump station operators along New York City’s water tunnels fire up their computers to check the status of various water pressure readings.
But their networks have been hacked, and the readings they see on their computers are not the real readings. The adjustments they make cause the water pressure to skyrocket, blowing several mains, and cutting water to various part of the city, if not the entire city. Sure these systems have redundancies, but those redundancies are vulnerable too.
Simultaneously, in other parts of the Northeast U.S., hacked high voltage transformers spin out of control and explode. The blackout could cut as wide as the Tri-State area, and last for months, compounding any attempts to fix the water lines.
No water. No electricity. Pure mayhem.
Tim Simonite of MIT Tech Review recently talked to hackers at Black Hat about a vulnerability in a protocol called “Dbus” which leaves more than 90,000 industrial controls vulnerable.
Another vulnerability, this one in sensors “used to monitor oil, water, nuclear, and natural gas infrastructure” can be hacked into with “a relatively cheap 40-mile-range radio transmitter.” Those sensors could be “spoofed” to show false readings, hackers tell Simonite.
The Obama administration says it takes the threat seriously and has taken several steps — including an executive order — to try and improve network security. As Simonite points out, however, even though the information sharing program alerts companies to vulnerabilities, that doesn’t mean the companies follow through with patches.
BlackHat attendees showed proof that the companies weren’t doing all they could to protect their customers.
All the attacks to be mentioned today require significantly fewer resources and skill than what was required to employ the best-known attack on an industrial system, the U.S.-Israeli-backed Stuxnet operation against the Iranian nuclear program.
Previously, the Defence Science Board released a report that said viruses and exploits with Stuxnet-like results are incredibly complicated and likely require the backing of state-sponsored hacking units to perform. The Black Hat findings paint a completely different picture — it seems the idea of a few people in a basement causing cataclysmic damage is not really that far-fetched.
“We have demonstrated a few scenarios that will cause a catastrophic breakdown — a pipe to burst or tank to overflow — while sending a completely different view to the controller,” Brian Meixell of Texas security company Cimation, told Simonite.
Steve Stone, principle cyber threat intelligence analyst for Mandiant, the company that outed China’s hacking unit to The New York Times told Business Insider that every Chinese hack for espionage includes the potential for kinetic actions — that is actual destruction of property.
“Typically we’re talking about external attacks. An entity or individual from the outside uses a custom piece of code to break into cyber security systems,” explained Stone. “Once you’re a valid user, you’re gaining all the capabilities a valid user can do.”
Right now, China’s hackers are only intent on stealing information, Stone explained. They burrow into a network, increase their permissions, become a “valid user,” and then steal trade secrets.
That “valid user” can also increase or decrease water pressure, or make it look like water pressure has decreased, prompting an operator to try and increase it.
Mandiant’s opinion, though, is that it’s only nation states looking to do this sort of penetration, like Iran’s recent spate of bank attacks — likely prompted by President Barack Obama’s admission that Stuxnet was of American origin.
“I don’t know exactly why the Obama admin started blabbing about that,” said Professor Peter Ludlow, an Internet culture expert and professor of philosophy at Northwestern.
Ludlow said the administration’s big mistake was not making sure the defence was bolstered before first releasing a virus like Stuxnet, and then second going ahead and admitting to kinetic cyber operations.
“I think that this has actually been happening for quite some time now,” said Ludlow. “And basically if you start weaponizing the Internet, even kinetically, it’s not just going to be for people like nation states.”
Ludlow watched the beginning of kinetic cyber operations, long before the U.S. Military was even aware of the possibility, in a massive multiplayer online roleplaying game called 2nd Life.
According to Ludlow, gamers developed code that first altered the game itself, but then eventually would hack into users’ computers. Then kinetic operations came up.
“There was speculation even back then, could you come up with a [software] device that could fry your adversary’s computer,” said Ludlow.
Ludlow says the fault for potential exploits like the industrial systems hack falls on the shoulders of government and private agencies who are pressuring the community to find the exploits.
“Right now you have state actors in a bidding war for zero day exploits. Used to be that security people would get zero day exploits for a Tshirt or something, now it’s a half mil, million dollars for zero days,” said Ludlow.
A zero-day is a software or network hack that the public is not yet aware of. So when a hacker finds one, it’s incredibly lucrative. A state actor or even a private company could use one to conduct espionage, or worse yet, real damage.
The way Ludlow looks at it, the more government takes interest in hacker conventions like Black Hat, the more capable individuals are going to be at levelling potentially destructive cyber weapons.
The previous assertion of the Defence Science Board was that only state-sponsored hackers are capable of shutting down an electrical grid. In response, the Board’s recommendation was to protect the nukes, both from network hacks and as a potential response to hacks that would disable the U.S. grid or water system — like a sort of nuclear deterrent akin to the mutually assured destruction of the Cold War.
Stone is sceptical of this approach.
“Equating it to an atomic bomb and mutually assured destruction doesn’t match what we see. It’s already happened,” said Stone.
He’s talking about attacks like the one in Korea, which was timed to destroy massive amounts of data, or like Stuxnet, which destroyed pieces of Iran’s nuclear facilities.
Ludlow seems to think there’s no end to the rabbit hole, that the exploits will continue to get easier to execute and more destructive as time goes on, turning the Internet into a “Afghanistan-like war zone,” he said.
Worse yet, as these exploits evolve, the need for state-sponsorship to launch attacks dwindles because the technology ceases to be something that requires money and resources.
Experts tell Business Insider that China and Russia are capable of these attacks but choose not to execute them because the globe’s superpowers depend on each other. If the U.S. economy tanks because of a catastrophic attack on New York City, then Russia and China both suffer.
On the other hand, the world is full of ideological psychos. From lone wolves to terrorist organisations — the ability to exact a catastrophic attack is becoming more and more accessible.
“I don’t even want the think about the worst case scenario; it could get real ugly,” Ludlow concluded.
NOW WATCH: Briefing videos
Business Insider Emails & Alerts
Site highlights each day to your inbox.