Feeds

Buggy 'smart meters' open door to power-grid botnet

Grid-burrowing worm only the beginning

The Power of One eBook: Top reasons to choose HP BladeSystem

'Kind of scary'

Davis declined to identify the model of the smart meter or its manufacturer, but he said most of the models he's examined suffer from the same poor design.

"For an embedded platform, they're kind of scary," he said. "It's really not designed from the ground up for security. Just imagine if somebody is outside your house and has the unique identifier that's printed on your meter."

Companies that make gear for smart grids include GE Energy, The ABB Group, Sensus Metering, Itron and Landis+Gyr

One deficiency common among many of the meters is the use of insecure programming functions, such as memcpy() and strcpy(), which are two of the most common sources of exploitable software bugs. In many cases, the devices use general purpose hardware and software that aren't designed for highly targeted or mission critical systems.

By 2015, utilities in more than two-dozen US states expect to have almost 52 million customers outfitted with the bidirectional smart meters, according to this break-down (PDF) from the Edison Electric Institute, which represents power companies. Some of those deployments are already completed and many more will be completed in the next few years.

The new generation of meters will enable what utility companies call smart grids. They turn the power grid into a real-time computerized network, which has the ability to make automated decisions in real time based on data collected from millions of sensors. That would eliminate the need for meter readers to visit each customer to know how much electricity has been consumed, for instance.

But the potential of the smart grid goes well beyond that. Technicians envision a system that raises or lowers rates hour by hour depending on the supply of power available, which would be measured based on the reports of millions of individual meters. In some scenarios, smart meters would respond to power shortages by telling smart appliances such as clothes driers and dish washers to shut off until power is more plentiful.

"This is something that's been on everyone's radar," said Ed Legge, a spokesman for Edison Electric. "I think we've reached that point of opportunity plus ability to do it."

He said the rush to upgrade has only increased in the months following passage of Barack Obama's stimulus package, which reserved $4.5bn for smart-grid spending. To qualify, however, utilities must meet aggressive deadlines that have only accelerated companies' upgrade plans.

As a result, concerns about security have taken a back seat, said IOActive's Davis. Before the incentives were announced, several utilities approached him and asked if he would perform penetration tests on meters they planned to roll out.

"As soon as the stimulus bill came out, everybody just clammed up," he said. "It's almost impossible for us to get new devices to look at now."

Another problem with smart grids is that utilities are essentially responsible for policing themselves, said security consultant Tony Flick, who plans to offer a separate turbo talk at Black Hat. He likens the regulatory arrangement to that in the frequently criticized credit card industry, in which merchants are required only to comply with rules set by other companies in the industry.

"It's kind of like history repeating itself," he said. "They're being relied upon to actually implement the standards without any true oversight." ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.