[Infowarrior] - Just how vulnerable is the electrical grid?
Richard Forno
rforno at infowarrior.org
Fri Apr 10 12:59:10 UTC 2009
April 10, 2009 4:00 AM PDT
Just how vulnerable is the electrical grid?
by Elinor Mills
http://news.cnet.com/8301-1009_3-10216702-83.html?part=rss&subj=news&tag=2547-1_3-0-20
Smarter is not always better--at least when it comes to utilities.
More than a decade after initial reports said critical infrastructure
in the U.S. is vulnerable to cyberattack, the situation has only
worsened as utilities move their control systems closer to the
Internet and install smart-grid technology, according to security
experts.
Questions about the security of infrastructure in the United States
arose this week following a Wall Street Journal report that said the
nation's electricity grid has been compromised by foreign hackers. And
several experts said in interviews this week that some energy systems
have, in fact, gotten less secure as they have modernized. The
Supervisory Control and Data Acquisition (SCADA) control systems used
by the energy industry used to be segregated from public networks. But
they have increasingly become more dependent on Internet protocol-
based systems, the experts said. At the same time, their security
precautions are inefficient, they said.
"The end result is that, as part of our modernization, we've made
ourselves more vulnerable," said James Lewis, a senior fellow at the
nonprofit Center for Strategic and International Studies (CSIS).
"Plant control networks (and their programmable logic controllers)
should be disconnected from the Internet," said Peter "Mudge" Zatko,
technical director of the national intelligence research unit at BBN
Technologies. "These are the things lifting and lowering the plutonium
rods into the water to make steam...It's on the Internet. This is
terrifying."
Myriad operational problems
For many utility workers, it's easier to log onto the Internet from
home when they get called at night. But if those home computers are
infected with spyware, they can be used by attackers to get into the
control systems, which are supposed to be separated from the Internet.
And there are other problems that are more deeply embedded in the day-
to-day operations of a utility's business. Network control software
that utilities buy from outside vendors often includes the ability to
run Web servers and enable remote access and wireless access. Then
there are configuration problems, such as routers and other systems
that use default passwords, or worse, don't use passwords at all,
according to Zatko and others who have tested the systems.
"It's out of ease-of-use and the fact that there weren't strong
restrictions (the electric utilities were deregulated to a large
extent) that the networks are a mess in a lot of places," Zatko said.
Often, "the systems themselves aren't robust because they were
designed to be on networks that weren't talking to the public Internet."
Many warnings have been sounded over the years. In 1999, Zatko
compiled a list of about 30 utilities whose plant control networks
could be accessed remotely, and he says many of them still have the
same problems today. In 2004, Gartner did a report concluding that the
use of IP networks for critical infrastructure could serve as bait for
cyberattackers.
"It's painfully easy to exploit" the control systems, said Frank
Heidt, chief executive of professional security services company
Leviathan Security. "Energy management systems really can't be
connected to the Internet. It's going to be painful for some
companies, but they're going to have to change this."
Last year, a security expert at the RSA conference detailed how easy
it is to break into power plants by downloading malware to employee
computers through a socially engineered e-mail that directs them to a
malicious server. Meanwhile, Core Security found a hole in the
Suitelink software that is used to automate operations at power
stations, oil refineries, and production lines.
Lewis of the CSIS acknowledged that using the Internet opens utilities
up to cyberattack risks, but said there are "sound economic reasons"
for them doing so.
"Most of the critical infrastructure on the Internet is there for
legitimate business purposes," agreed John Bumgarner, a research
director at the nonprofit U.S. Cyber Consequences Unit.
Security company Industrial Defender has done more than 100 threat
assessments over the past seven years, primarily in utility
infrastructure, and identified 34,000 vulnerabilities, said company
CEO Brian Ahern.
For the most part, utilities--among the most conservative businesses
in spending on technology--don't do basic security monitoring of their
power generation and distribution equipment, he said.
"You can't protect when you don't know what's happening. I think that
less than five percent of utilities have a good sense of critical
threats," he said.
Utilities "are sacrificing security for convenience and cost savings,"
said Richard Forno, a principal at KRvW, an information security
consulting firm in Washington, D.C. "We've allowed the situation to
get worse, and it will be harder to get away from these networks
touching the public Net now that we are 10 years, 15 years into the
process."
Smart grids: Efficient but insecure
IP networks aren't the only problem. The use of smart-grid technology,
which consists of networked meters designed for adjusting electricity
flows and monitoring everything from power plants to individual
appliances in homes, are also putting critical systems at risk,
experts said.
Critical infrastructure insiders in the U.S. and Canada surveyed last
year said the energy sector was the industry most vulnerable to
cyberattack. The survey cited many contributing factors: an increase
in the number of access points through the use of sensors, smart
meters, and third-party contractors with remote access capability; use
of more IP-based networks; integration between corporate and
operational networks; reliance on standard or commodity IT platforms
such as Microsoft Windows; and lack of attention to security by
network automation and control system vendors. The biggest bottleneck
to improving critical infrastructure security is cost, followed by
apathy, they said.
In March, IOActive, which provides application and smart-grid security
services, said it had verified "significant" and "inherent" security
flaws with multiple smart-grid platforms" and found them susceptible
to common security vulnerabilities such as protocol tampering, buffer
overflows, persistent and non-persistent rootkits, and code propagation.
"These vulnerabilities could result in attacks to the smart-grid
platform causing utilities to lose momentary system control of their
advanced metering infrastructure smart meter devices to unauthorized
third parties," the company said in a release (PDF). "This would
expose utility companies to possible fraud, extortion attempts,
lawsuits, or widespread system interruption."
More than 2 million smart meters are in use in the U.S. today, and an
estimated 73 utilities have ordered 17 million additional smart
meters, according to IOActive. The Obama administration's proposed
2010 budget has earmarked $4.5 billion for smart-grid technologies in
the electricity infrastructure.
"The plan now would be to put in largely unsecured networks for smart
grid," said Lewis of CSIS. "Hopefully they'll fix it."
The worst case scenario is that a person would access and control a
smart meter and control other networked smart meters to disrupt the
grid, said Ahern of Industrial Defender.
Standards for securing smart-grid technologies are still being
finalized, but Ahern thinks that government-led efforts to modernize
the grid should focus more on designing security in right at the
beginning.
"We've got to take a step back from the hurry-up approach with the
smart grid," he said. "There needs to be a balanced approach between
investing in (smart grid) deployments and building security deeply
into it."
The vulnerability of the critical infrastructure isn't news, so why
the Wall Street Journal report, with its unnamed sources, now?
The story is likely linked to turf battles within the federal
government over which agency will oversee the cybersecurity policies,
and get the funding for it, several of the security experts suggested.
For instance, the Department of Homeland Security has been criticized
for not doing enough on cybersecurity, while the director of Homeland
Security's National Cybersecurity Center resigned recently, accusing
the NSA of trying to wrest control.
The Obama administration in December ordered officials to do a 60-day
review on the Department of Homeland Security's cybersecurity efforts,
and that report is due to be released next week.
Meanwhile, the administration's proposed 2010 budget includes $355
million to support the base operations of the National Cyber Security
Division and the efforts of the Comprehensive National Cybersecurity
Initiative.
"We're right at the point where they're naming new cybersecurity czars
and there's a grab for funding between the Air Force, Navy, NSA, and
others that want the cybersecurity budget," said Zatko. "There are a
lot of renewed efforts in this particular field, and it's a field
that's in a fair amount of disarray."
While experts discuss cybersecurity threats, physical attacks on
infrastructure are taking place. AT&T said on Thursday that vandals
are to blame for the massive phone and Internet outage in Silicon
Valley on Thursday.
(CNET News' Martin LaMonica contributed to this report.)
Elinor Mills covers Internet security and privacy. She joined CNET
News in 2005 after working as a foreign correspondent for Reuters in
Portugal and writing for The Industry Standard, the IDG News Service,
and the Associated Press. E-mail Elinor.
More information about the Infowarrior
mailing list