Feeds

Buggy 'smart meters' open door to power-grid botnet

Grid-burrowing worm only the beginning

Using blade systems to cut costs and sharpen efficiencies

'Kind of scary'

Davis declined to identify the model of the smart meter or its manufacturer, but he said most of the models he's examined suffer from the same poor design.

"For an embedded platform, they're kind of scary," he said. "It's really not designed from the ground up for security. Just imagine if somebody is outside your house and has the unique identifier that's printed on your meter."

Companies that make gear for smart grids include GE Energy, The ABB Group, Sensus Metering, Itron and Landis+Gyr

One deficiency common among many of the meters is the use of insecure programming functions, such as memcpy() and strcpy(), which are two of the most common sources of exploitable software bugs. In many cases, the devices use general purpose hardware and software that aren't designed for highly targeted or mission critical systems.

By 2015, utilities in more than two-dozen US states expect to have almost 52 million customers outfitted with the bidirectional smart meters, according to this break-down (PDF) from the Edison Electric Institute, which represents power companies. Some of those deployments are already completed and many more will be completed in the next few years.

The new generation of meters will enable what utility companies call smart grids. They turn the power grid into a real-time computerized network, which has the ability to make automated decisions in real time based on data collected from millions of sensors. That would eliminate the need for meter readers to visit each customer to know how much electricity has been consumed, for instance.

But the potential of the smart grid goes well beyond that. Technicians envision a system that raises or lowers rates hour by hour depending on the supply of power available, which would be measured based on the reports of millions of individual meters. In some scenarios, smart meters would respond to power shortages by telling smart appliances such as clothes driers and dish washers to shut off until power is more plentiful.

"This is something that's been on everyone's radar," said Ed Legge, a spokesman for Edison Electric. "I think we've reached that point of opportunity plus ability to do it."

He said the rush to upgrade has only increased in the months following passage of Barack Obama's stimulus package, which reserved $4.5bn for smart-grid spending. To qualify, however, utilities must meet aggressive deadlines that have only accelerated companies' upgrade plans.

As a result, concerns about security have taken a back seat, said IOActive's Davis. Before the incentives were announced, several utilities approached him and asked if he would perform penetration tests on meters they planned to roll out.

"As soon as the stimulus bill came out, everybody just clammed up," he said. "It's almost impossible for us to get new devices to look at now."

Another problem with smart grids is that utilities are essentially responsible for policing themselves, said security consultant Tony Flick, who plans to offer a separate turbo talk at Black Hat. He likens the regulatory arrangement to that in the frequently criticized credit card industry, in which merchants are required only to comply with rules set by other companies in the industry.

"It's kind of like history repeating itself," he said. "They're being relied upon to actually implement the standards without any true oversight." ®

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.