{"id":82916,"date":"2013-10-18T06:59:47","date_gmt":"2013-10-18T05:59:47","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/breaking-news\/hack-a-power-plant-researchers-discover-vulnerabilities-impacting-critical-us-infrastructure-19\/82916\/"},"modified":"2013-10-18T06:59:47","modified_gmt":"2013-10-18T05:59:47","slug":"hack-a-power-plant-researchers-discover-vulnerabilities-impacting-critical-us-infrastructure-19","status":"publish","type":"post","link":"http:\/\/rinf.com\/alt-news\/breaking-news\/hack-a-power-plant-researchers-discover-vulnerabilities-impacting-critical-us-infrastructure-19\/","title":{"rendered":"Hack a power plant: Researchers discover vulnerabilities impacting critical US infrastructure"},"content":{"rendered":"<div class=\"ftpimagefix\" style=\"float:left\"><a target=\"_blank\" href=\"http:\/\/rt.com\/usa\/sistrunk-crain-cert-power-324\/\"><img decoding=\"async\" width=\"150\" title=\"\" src=\"http:\/\/rt.com\/files\/news\/20\/cb\/40\/00\/researchers.si.jpg\" alt=\"The Vermont Yankee nuclear power plant in Vernon (Reuters\/Brian Snyder)\"\/><\/a><\/div>\n<div>\n<div>\n\t\t\t\t\t\t<!-- time --><br \/>\n                        <span><br \/>\n                            Published time: October 17, 2013 20:55                                                    <\/span><br \/>\n                        <!--\/\/ time --><\/p><\/div>\n<div>\n<p>The Vermont Yankee nuclear power plant in Vernon (Reuters\/Brian Snyder)<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p>New research revealed this week shows that many of the nation&#8217;s vital infrastructure systems are more vulnerable to cyberattacks than previously expected.<\/p>\n<p>\n  In fact, researchers Chris Sistrunk and Adam Crain have<br \/>\n  discovered 25 different security system weaknesses that could<br \/>\n  potentially permit hackers to sabotage or crash servers that<br \/>\n  control water systems and electric substations.\n<\/p>\n<p>\n  Throughout the course of their research, Sistrunk and Crain<br \/>\n  discovered that the products of more than 20 vendors had<br \/>\n  significant security vulnerabilities. Hackers could, for example,<br \/>\n  crash a power station&#8217;s master server by guiding it into an<br \/>\n  infinite loop, or cause power outages by remotely injecting their<br \/>\n  own make-shift code into a server.\n<\/p>\n<p>\n  &ldquo;<i>Every substation is controlled by the master, which is<br \/>\n  controlled by the operator<\/i>,&rdquo; Sistrunk told Wired, which broke<br \/>\n  the story. &ldquo;<i>If you have control of the master, you have<br \/>\n  control of the whole system, and you can turn on and off power at<br \/>\n  will<\/i>.&rdquo;\n<\/p>\n<p>\n  These security holes have generally been found in serial and<br \/>\n  networking devices used to communicate between servers and<br \/>\n  substations. Since most efforts have gone into preventing<br \/>\n  cyberattacks via IP networks, the possibility of a security<br \/>\n  breach through serial communication products has generally been<br \/>\n  deemed as less of a risk. The truth of the matter, as Crain tells<br \/>\n  it, is that hacking into a power system via serial communication<br \/>\n  devices may be easier than going through the internet.\n<\/p>\n<p>\n  Part of the reason why is that substations generally have very<br \/>\n  lax security; they are rarely manned and often surrounded only by<br \/>\n  a fence and monitored by a security camera. If physical access<br \/>\n  isn&#8217;t possible, hackers could crack into a utility&#8217;s wireless<br \/>\n  radio network and use that as a means for delivery.\n<\/p>\n<p>\n  <i>&ldquo;If someone tries to breach the control center through the<br \/>\n  Internet, they have to bypass layers of firewalls<\/i>,&rdquo; Crain<br \/>\n  said. &ldquo;<i>But someone could go out to a remote substation that<br \/>\n  has very little physical security and get on the network and take<br \/>\n  out hundreds of substations potentially. And they don&#8217;t<br \/>\n  necessarily have to get into the substation either.&rdquo;<\/i>\n<\/p>\n<p>\n  Of the more than two dozen vulnerabilities discovered, vendors<br \/>\n  have released security patches for nine of them. Bafflingly,<br \/>\n  however, many utilities have yet to install them because they<br \/>\n  underestimate the potential risk of attack. The fact that the<br \/>\n  security standards established by theNorth American Electric<br \/>\n  Reliability Corporation focus solely on IP communication also<br \/>\n  makes the problem worse.\n<\/p>\n<p>\n  In an attempt to raise awareness about the issue, the Industrial<br \/>\n  Control Systems Cyber Emergency Response Team (ICS-CERT) has<br \/>\n  issued multiple reports on the security weaknesses. Additionally,<br \/>\n  Crain and Sistrunk will speak on their research during Florida&#8217;s<br \/>\n  S4 security conference in January.\n<\/p>\n<p>Copyright: <a href=\"http:\/\/rt.com\/usa\/sistrunk-crain-cert-power-324\/\" target=\"_blank\" title=\"Hack a power plant: Researchers discover vulnerabilities impacting critical US infrastructure\">RT<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Published time: October 17, 2013 20:55 The Vermont Yankee nuclear power plant in Vernon (Reuters\/Brian Snyder) New research revealed this week shows that many of the nation&#8217;s vital infrastructure systems are more vulnerable to cyberattacks than previously expected. In fact, researchers Chris Sistrunk and Adam Crain have discovered 25 different security system weaknesses that could [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[487],"tags":[],"class_list":{"0":"post-82916","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-breaking-news"},"_links":{"self":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/82916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=82916"}],"version-history":[{"count":0,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/82916\/revisions"}],"wp:attachment":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=82916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=82916"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=82916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}