U.S. public utility suffers a compromise

The unidentified utility was vulnerable to a brute-force cyber security attack, where hackers try different combinations of passwords until they find the right one.


A public utility in the U.S. suffered a compromise after attackers took advantage of a weak password security system.

The utility's control system was accessible via Internet-facing hosts and used a simple password system, wrote the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) in a report on incidents covering the first quarter of this year.

The unidentified utility was vulnerable to a brute-force attack, where hackers try different combinations of passwords until they find the right one. An investigation showed the utility suffered an attack before.

"It was determined that the systems were likely exposed to numerous security threats, and previous intrusion activity was also identified," ICS-CERT wrote in the report.

The U.S. government continues to warn critical infrastructure players like power and water plants they remain at risk of cyber attack, as many of their IT systems have not undergone an audit for vulnerabilities and configuration mistakes.

ICS-CERT warned it is easy for hackers using search engines such as Google and SHODAN to find Internet-connected control systems "that were not intended to be Internet facing."

The report described a second cyber attack, but did not give further details.

"In that instance, an Internet-connected control system that operated a mechanical device ended up accessed by an attacker using a cellular modem. The access was through a SCADA (supervisory control and data acquisition) protocol," ICS-CERT said.

"The device was directly Internet accessible and was not protected by a firewall or authentication access controls," ICS-CERT wrote.

The attacker appears to have struck at the wrong time as the device was undergoing scheduled maintenance and ended up disconnected from the control system.

"In the first quarter of this year, ICS-CERT advised 20 energy, water, nuclear and transportation utilities on identifying vulnerabilities and how to improve their cyber defenses," the report said.

Gregory Hale is the editor and founder of Industrial Safety and Security Source (ISSSource.com), a news and information website covering safety and security issues in the manufacturing automation sector. This content originally appeared here. Edited by Brittany Merchut, Project Manager, CFE Media, bmerchut@cfemedia.com 

C.G. , FL, United States, 07/02/14 12:03 AM:

This just points out the danger inherent in connecting control systems to the outside world. While it may be convenient to allow managers and technicians to reach facilities controls remotely, one should seriously think whether that convenience is worth the risk. Its an assessment that needs to be done on a case-by-case basis.
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Learn how to create value with re-use; gain productivity with lean automation and connectivity, and optimize panel design and construction.
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
Industrial wireless cyber security: More complex than black and white; IIoT at the I/O level; Process modeling; Cyber security research
Robotic advances: Software, form factors; System-based ROI; Embedded control; MES and information integration; SCADA and cyber security; Position sensor; Controller, I/O module
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security
Cyber security attack: The threat is real; Hacking O&G control systems: Understanding the cyber risk; The active cyber defense cycle