Feeds

Buggy 'smart meters' open door to power-grid botnet

Grid-burrowing worm only the beginning

Protecting against web application threats using SSL

'Kind of scary'

Davis declined to identify the model of the smart meter or its manufacturer, but he said most of the models he's examined suffer from the same poor design.

"For an embedded platform, they're kind of scary," he said. "It's really not designed from the ground up for security. Just imagine if somebody is outside your house and has the unique identifier that's printed on your meter."

Companies that make gear for smart grids include GE Energy, The ABB Group, Sensus Metering, Itron and Landis+Gyr

One deficiency common among many of the meters is the use of insecure programming functions, such as memcpy() and strcpy(), which are two of the most common sources of exploitable software bugs. In many cases, the devices use general purpose hardware and software that aren't designed for highly targeted or mission critical systems.

By 2015, utilities in more than two-dozen US states expect to have almost 52 million customers outfitted with the bidirectional smart meters, according to this break-down (PDF) from the Edison Electric Institute, which represents power companies. Some of those deployments are already completed and many more will be completed in the next few years.

The new generation of meters will enable what utility companies call smart grids. They turn the power grid into a real-time computerized network, which has the ability to make automated decisions in real time based on data collected from millions of sensors. That would eliminate the need for meter readers to visit each customer to know how much electricity has been consumed, for instance.

But the potential of the smart grid goes well beyond that. Technicians envision a system that raises or lowers rates hour by hour depending on the supply of power available, which would be measured based on the reports of millions of individual meters. In some scenarios, smart meters would respond to power shortages by telling smart appliances such as clothes driers and dish washers to shut off until power is more plentiful.

"This is something that's been on everyone's radar," said Ed Legge, a spokesman for Edison Electric. "I think we've reached that point of opportunity plus ability to do it."

He said the rush to upgrade has only increased in the months following passage of Barack Obama's stimulus package, which reserved $4.5bn for smart-grid spending. To qualify, however, utilities must meet aggressive deadlines that have only accelerated companies' upgrade plans.

As a result, concerns about security have taken a back seat, said IOActive's Davis. Before the incentives were announced, several utilities approached him and asked if he would perform penetration tests on meters they planned to roll out.

"As soon as the stimulus bill came out, everybody just clammed up," he said. "It's almost impossible for us to get new devices to look at now."

Another problem with smart grids is that utilities are essentially responsible for policing themselves, said security consultant Tony Flick, who plans to offer a separate turbo talk at Black Hat. He likens the regulatory arrangement to that in the frequently criticized credit card industry, in which merchants are required only to comply with rules set by other companies in the industry.

"It's kind of like history repeating itself," he said. "They're being relied upon to actually implement the standards without any true oversight." ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.