Feeds

Hacktivists pose growing threat to industrial computing

DHS warns nation about Anonymous

Top three mobile application threats

Members of the Anonymous hacking collective are increasingly interested in attacking industrial control systems used to automate machinery used by factories, power stations, water treatment plants, and other facilities critical to national security, the Department of Homeland Security warned last month.

In a memorandum (PDF) sent to partners involved in security and critical infrastructure operations, members of a DHS arm known as the National Cybersecurity and Communications Integration Center cited several internet postings that indicate Anonymous' growing interest in targeting the remotely accessible computers used to open valves and control other gear in industrial facilities. The four-page document went on to say Anonymous members faced significant challenges, including their limited ability in hacking the gear.

“However, experienced and skilled members of Anonymous in hacking could be able to develop capabilities to gain access and trespass on control system networks very quickly,” the memo stated. “Free educational opportunities (conferences, classes), presentations at hacker conferences, and other high profile events/media coverage have raised awareness to ICS vulnerabilities, and likely shortened the time needed to develop sufficient tactics, techniques, and procedures to disrupt ICS.”

Events over the past 18 months have brought new urgency to the security of so-called SCADA, or supervisory control and data acquisition, systems used in factories, power plants, and elsewhere. Topping the list is evidence that the Stuxnet computer worm, which penetrated thousands of systems across the globe, was built as a “search and destroy weapon” by the US, Israel, or another country to sabotage Iran's fledgling nuclear program. The sophisticated piece of malware repeatedly attacked five industrial plants inside Iran over a 10-month period and caused centrifuges for uranium enrichment to malfunction.

Also significant was research unveiled earlier this year by Dillon Beresford of NSS Labs that defects in SCADA software sold by Siemens affected “every industrialized nation across the globe.” Beresford ended up postponing a previously scheduled talk about the vulnerabilities following concerns it could make attacks easier.

According to last month's DHS memo, people claiming affiliation to Anonymous in July posted code that makes queries to SIMATIC, the automation system used to issue commands to industrial control systems.

“The posted xml and html code reveals that the individual understands the content of the code in relation to common hacking techniques to obtain elevated privileges,” the document stated. “It does not indicate knowledge of ICS; rather, it indicates that the individual has interest in the application software used in control systems.

The memo went on to note that recent updates to Metasploit and other tools used by blackhat and whitehat hackers may allow even novices to penetrate SCADA systems.

The memo also referred to the “green energy” agenda touted by some members of Anonymous who are opposed to a proposed Keystone oil pipeline that would extend from Canada to Texas. Targeting of energy companies could extend beyond the ranks of Anonymous to other hacking groups, the authors said. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Canadian taxman says hundreds pierced by Heartbleed SSL skewer
900 social insurance numbers nicked, says revenue watchman
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
Burnt out on patches this month? Oracle's got 104 MORE fixes for you
Mass patch for issues across its software catalog
Reddit users discover iOS malware threat
'Unflod Baby Panda' looks to snatch Apple IDs
Oracle working on at least 13 Heartbleed fixes
Big Red's cloud is safe and Oracle Linux 6 has been patched, but Java has some issues
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.