Security

Water treatment plant hacked, chemical mix changed for tap supplies

Well, that's just a little scary

By John Leyden

82 SHARE

Hackers infiltrated a water utility’s control system and changed the levels of chemicals being used to treat tap water, we're told.

The cyber-attack is documented in this month’s IT security breach report (available here, registration required) from Verizon Security Solutions. The utility in question is referred to using a pseudonym, Kemuri Water Company, and its location is not revealed.

A "hacktivist" group with ties to Syria compromised Kemuri Water Company’s computers after exploiting unpatched web vulnerabilities in its internet-facing customer payment portal, it is reported.

The hack – which involved SQL injection and phishing – exposed KWC's ageing AS/400-based operational control system because login credentials for the AS/400 were stored on the front-end web server. This system, which was connected to the internet, managed programmable logic controllers (PLCs) that regulated valves and ducts that controlled the flow of water and chemicals used to treat it through the system. Many critical IT and operational technology functions ran on a single AS400 system, a team of computer forensic experts from Verizon subsequently concluded.

Our endpoint forensic analysis revealed a linkage with the recent pattern of unauthorised crossover. Using the same credentials found on the payment app webserver, the threat actors were able to interface with the water district’s valve and flow control application, also running on the AS400 system. We also discovered four separate connections over a 60-day period, leading right up to our assessment.

During these connections, the threat actors modified application settings with little apparent knowledge of how the flow control system worked. In at least two instances, they managed to manipulate the system to alter the amount of chemicals that went into the water supply and thus handicap water treatment and production capabilities so that the recovery time to replenish water supplies increased. Fortunately, based on alert functionality, KWC was able to quickly identify and reverse the chemical and flow changes, largely minimising the impact on customers. No clear motive for the attack was found.

Verizon's RISK Team uncovered evidence that the hacktivists had manipulated the valves controlling the flow of chemicals twice – though fortunately to no particular effect. It seems the activists lacked either the knowledge of SCADA systems or the intent to do any harm.

The same hack also resulted in the exposure of personal information of the utility’s 2.5 million customers. There’s no evidence that this has been monetised or used to commit fraud.

Nonetheless, the whole incident highlights the weaknesses in securing critical infrastructure systems, which often rely on ageing or hopelessly insecure setups.

Monzy Merza, Splunk’s director of cyber research and chief security evangelist, commented: “Dedicated and opportunistic attackers will continue to exploit low-hanging fruit present in outdated or unpatched systems. We continue to see infrastructure systems being targeted because they are generally under-resourced or believed to be out of band or not connected to the internet.”

“Beyond the clear need to invest in intrusion detection, prevention, patch management and analytics-driven security measures, this breach underscores the importance of actionable intelligence. Reports like Verizon’s are important sources of insight. Organisations must leverage this information to collectively raise the bar in security to better detect, prevent and respond to advanced attacks. Working collectively is our best route to getting ahead of attackers,” he added.

Reports that hackers have breached water treatment plants are rare but not unprecedented. For example, computer screenshots posted online back in November 2011 purported to show the user interface used to monitor and control equipment at the Water and Sewer Department for the City of South Houston, Texas by hackers who claimed to have pwned its systems. The claim followed attempts by the US Department of Homeland Security to dismiss a separate water utility hack claim days earlier.

More recently hackers caused "serious damage" after breaching a German steel mill and wrecking one of its blast furnaces, according to a German government agency. Hackers got into production systems after tricking victims with spear phishing emails, said the agency.

Spear phishing also seems to have played a role in attacks lining the BlackEnergy malware against power utilities in the Ukraine and other targets last December. The malware was used to steal user credentials as part of a complex attack that resulted in power outages that ultimately left more than 200,000 people temporarily without power on 23 December. ®

Sign up to our NewsletterGet IT in your inbox daily

82 Comments

More from The Register

Wait a minute, we're supposed to haggle! ISPs want folk to bargain over broadband

11?!! This cost me 12! Do you want to ruin me?!

Bankrupt Aussie Hells Angel scoops £750k lottery jackpot

From a remand prison cell, no less

Bulgaria hack: 20-year-old infosec whizz cuffed after 'adult population's' finance deets nicked

Bosses stick up for suspect, claim he's being framed for pinching 5m folks' data

Blah blah Blaha: Slovak infosec firm ESET sues politico who called them 'outrageous fascists'

He also said they're working with the CIA

Wow, talk about a Maine-wave: US state says ISPs need permission to flog netizens' personal data

What a radical idea

Brit infosec firms urge PM Boris to reform the Computer Misuse Act

Let us compete globally, say threat intel outfits

British ISPs throw in the towel, give up sending out toothless copyright infringement warnings

What a waste of time and money that was

American ISPs fined $75,000 for fuzzing airport's weather radar by stealing spectrum

FCC also moves, albeit glacially, on robocalls

NASA's crap infosec could be 'significant threat' to space ops

Inspectors not happy with stagnant security practices

FCC boosts broadband competition by, er, banning broadband competition in buildings

Analysis George Orwell's got nothing on this lot with doublespeak