Researcher develops ransomware attack that targets water supply
Security

Researcher develops ransomware attack that targets water supply

A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He's experimented with a simulated water treatment system based on actual programmable logic controllers (PLCs) and documented how these can be hacked.

David Formby, a PhD student at Georgia Institute of Technology, conducted his experiment to warn the industry about the danger of poorly-secured PLCs. These small dedicated computers can be used to control important factory processes or utilities, but are sometimes connected to the internet.

For instance, Formby found that 1,500 of these industrial PLCs are accessible online, he said while speaking at the RSA cybersecurity conference on Monday. It's not hard to imagine a hacker trying to exploit these exposed PLCs, he added. Cybercriminals have been infecting businesses across the world with ransomware, a form of malware that can hold data hostage in exchange for bitcoin.

For a hacker, holding an industrial control system hostage can also be lucrative, and far more devastating for the victim.

“He (the hacker) can threaten to permanently damage this really sensitive equipment,” Formby said. “For example, a power grid transformer can take months to repair.”

Ideally, industrial PLCs should be “air-gapped” or segregated from the internet. But often times, they’re connected to other computers that are frequently online. Or they're accessible from a third-party vendor, who’s been hired to maintain them over the internet, Formby said.

In addition, these PLCs are often old, and weren’t built with online security features in mind. For instance, there’s nothing to protect them from brute-force password attacks or to prevent the use of weak passwords, Formby said.  

To demonstrate the risks, Formby designed a simulated water treatment plant, built with actual industrial PLCs that will control the flow of water and chlorine into a storage tank (a YouTube video can be found here).

In a month's time he developed a ransomware-like attack to control the PLCs to fill the storage tank with too much chlorine, making the water mix dangerous to drink. Formby also managed to fool the surrounding sensors into thinking that clean water was actually inside the tank.

A hacker wanting to blackmail a water utility could take a same approach, and threaten to taint the water supply unless paid a ransom, he warned.  

Real-world water treatment systems are more sophisticated than the generic one he designed, Formby said. However, poorly-secured PLCs are being used across every industry, including in oil and gas plants and manufacturing.

Most of these PLCs he found that were accessible online are located in the U.S., but many others were found in India and China, he said.

Formby recommends that industrial operators make sure they understand which systems connect to the internet, and who has control over them. He’s also set up a company designed to help operators monitor for any malicious activity over their industrial control systems.

IDG Insider

PREVIOUS ARTICLE

«Amazon Chime goes after WebEx, Skype for Business and more

NEXT ARTICLE

Chips coming by June will herald the next generation of Wi-Fi»
author_image
IDG Connect

IDG Connect tackles the tech stories that matter to you

Add Your Comment

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?