BreachExchange mailing list archives
Intruders hack industrial heating system using backdoor posted online
From: Erica Absetz <eabsetz () opensecurityfoundation org>
Date: Sat, 15 Dec 2012 15:05:38 -0500
http://arstechnica.com/security/2012/12/intruders-hack-industrial-control-system-using-backdoor-exploit/ Hackers illegally accessed the Internet-connected controls of a New Jersey-based company's internal heating and air-conditioning system by exploiting a backdoor in a widely used piece of software, according to a recently published memo issued by the FBI. The backdoor was contained in older versions of the Niagara AX Framework, which is used to remotely control boiler, heating, fire detection, and surveillance systems for the Pentagon, the FBI, the US Attorney's Office, and the Internal Revenue Service, among many others. The exploit gave hackers using multiple unauthorized US and international IP addresses access to a "Graphical User Interface (GUI), which provided a floor plan layout of the office, with control fields and feedback for each office and shop area," according to the memo, which was issued in July. "All areas of the office were clearly labeled with employee names or area names." An IT contractor for the unnamed business told FBI agents the "Niagara control box was directly connected to the Internet with no interposing firewall," according to the memo, which was published Saturday by Public Intelligence. The website has an established track record of posting authentic government documents. Barbara Woodruff, a spokeswoman in the Newark, New Jersey division of the FBI, where the memo originated, said the document appeared to be authentic. The unauthorized access began in February, a few weeks after someone using the Twitter handle@ntisec posted comments indicating hackers were targeting SCADA—or supervisory control and data acquisition—systems. One tweet included a list of Internet addresses, including one that was assigned to the heating system belonging to the New Jersey business. The hack came five months before security researchers Billy Rios and Terry McCorkle blew the whistle on serious vulnerabilities in the Niagara system, which is marketed by Tridium, a company with US offices located in Richmond, Virginia. Only getting worse The revelation that Niagara vulnerabilities have been actively exploited in the wild is significant because the system is widely used to control critical equipment used around the world. Further, the number of Internet-facing Niagara systems appears to be growing. A search using the Shodan computer search engine late last year found about 16,000 systems, with more than 12,000 of those based in the US, according to Billy Rios, one of the security researchers who documented the vulnerabilities in the industrial control system. This year, the same search returned more than 20,000 systems, with about 16,000 of them in the US. While patches released earlier this year apply only to versions 3.5 and 3.6 of Niagara, Shodan continues to show "tons" of systems running earlier versions, including 1.1, Rios said. "These things keep popping up," he told Ars. "It's not going away. It's getting worse." Perhaps the only other documented case of an industrial control system being breached in the US came in 2009, when a security guard abused his physical access to breach computers that controlled air-conditioning systems at a Texas hospital. The intrusion came to light after he posted a screenshots and other evidence showing he had control of the systems that cool operating rooms and other critical areas of the Texas facility, where temperatures regularly hit the triple digits. He has spent most of his time since in federal prison. The FBI's "Situational Information Report" referred to the hacked company as US Business 1 and described it as a New Jersey air conditioning company. The report said the system the hackers intruded on controlled the company's internal heating, ventilation and air conditioning units. "The main control box for the HVAC system of US Business 1 was a Tridium brand, Niagara model controller," the memo stated. "US Business 1 actively used this system in-house, but also installed the control system for customers, which included banking institutions and other commercial entities. An IT contractor of US Business 1 confirmed the Niagara control box was directly connected to the Internet with no interposing firewall." The memo continued: "US Business 1 had a controller for the system that was password protected, but was set up for remote/Internet access. By using the link posted by the hacktivist, the published backdoor URL provided the same level of access to the company's control system as the password-protected administrator login. The backdoor required no password and allowed direct access to the control system." The incident underscores the prevalence of industrial control systems that are connected to the Internet. Security consultants have long considered the practice to be unsafe. Sadly, they say, the convenience of IT employees get from being able to administer those systems from home or other remote locations often trumps security concerns. There are about 300,000 instances of the Niagara framework installed worldwide, according to Tridium's website. _______________________________________________ Dataloss-discuss Mailing List (dataloss-discuss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://datalossdb.org/mailing_list Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) Risk Based Security equips organizations with security intelligence, risk management services and on-demand security solutions to establish customized risk-based programs to address information security and compliance challenges. Tenable Network Security (http://www.tenable.com/) Tenable Network Security provides a suite of solutions which unify real-time vulnerability, event and compliance monitoring into a single, role-based, interface for administrators, auditors and risk managers to evaluate, communicate and report needed information for effective decision making and systems management.
Current thread:
- Intruders hack industrial heating system using backdoor posted online Erica Absetz (Dec 15)