Vulnerabilities / Threats
10/28/2015
03:30 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

How Hackers Can Hack The Oil & Gas Industry Via ERP Systems

Researchers at Black Hat Europe next month will demonstrate how SAP applications can be used as a stepping-stone to sabotage oil & gas processes.

Hackers can exploit weaknesses in enterprise resource planning (ERP) systems on oil & gas firms' corporate networks in order to sabotage pipeline pressure or hide oil spills, researchers have discovered.

Researchers at Black Hat Europe next month in Amsterdam will demonstrate these and other attacks on oil & gas networks by abusing holes in SAP ERP applications used in the industrial sector. Oil & gas industrial networks rely on ERP software to help manage and oversee the oil & gas production and delivery processes.

"We want to show that not only Stuxnet-type attacks using USB are possible," says Alexander Polyakov, CTO and founder of ERPScan, who with Mathieu Geli, a researcher with ERPScan, will demonstrate several proof-of-concept attacks at Black Hat in Amsterdam. An attacker could hack the systems remotely over the Internet, he says, or from the oil & gas firm's corporate network.

"SAP is a key to this kingdom because it has a lot of products specifically designed to manage some processes such as operational integrity or hydrocarbon supply chain. Since SAP systems are implemented in, if I’m not mistaken, about 90% of oil and gas companies, this key can open many doors," he said. "SAP is connected with some critical processes which, in their turn, are connected with other processes, and so on."

The researchers, who declined to give details on the actual SAP vulnerabilities prior to their presentation, say the bugs are software and configuration flaws in SAP xMII (Manufacturing Integration and Intelligence) and in SAP Pco software. SAP's MII supports the manufacturing side and includes real-time information for production performance, while the Pco manufacturing module software supports those production-floor operations.

"For those vulnerabilities we can disclose, we will provide details" in the talk, Polyakov said in an email interview.

Polyakov says there's no simple way to separate ERP applications from the industrial operations network. "If you have some plant devices such as wellheads, which pump oil and collect some data from them, you should somehow transfer this data to the corporate network to show managers who want to see all the information on their tablets on nice dashboards. That’s why even if you have a firewall between IT and OT [operations technology], there are some applications which are connected," he said. "What we want to show is that it’s possible to conduct such attack and pivot from IT network or even the Internet into OT network up to OPC servers, SCADA systems, field devices, meters, and dozens of other modules."

Among the processes with ties to ERP are pump control, blow-out prevention, flaring and venting, gas compression, peak-load gas storage, separators and burners, he said. He says he and Geli probably know about just 10% of the overall attack surface:  "The attack surface is huge."

The oil & gas industry already has been targeted by cyberattacks. One of the biggest and infamous attacks was that of oil giant Saudi Aramco, where malware wiped or destroyed the hard drives of some 35,000 computers. A group called the Cutting Sword of Justice claimed responsibility for the massive attack.

While the attack didn't directly affect Saudi Aramco's oil production and exploration systems, it raised concerns of market fallout in the industry, as well as market manipulation. The oil & gas industry is made up of many joint ventures, namely in the oil fields. So if one partner was attacked, another could be affected as well.

"Oil and gas cybersecurity is a small universe which is almost undeveloped, but extremely critical," Polyakov said. "Any changes made during the upstream, midstream, or downstream processes may have a significant impact." 

The ERPScan researchers previously have uncovered flaws in SAP that attackers could use to get to those systems: "Just to name a few, some issues such as SAP Router or SAP Portal or recent SAP Afaria or SAP HANA vulnerabilities, can be used to get access to the SAP infrastructure from the Internet," he said.

Black Hat Europe returns to the beautiful city of Amsterdam, Netherlands November 12 & 13, 2015. Click here for more information and to register.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
BarakPerelman
50%
50%
BarakPerelman,
User Rank: Author
11/13/2015 | 6:37:09 AM
Vulns in ICS networks
Will be interesting to see what the exploits look like, and in any case higher awareness about the risks in ICS networks is always good.

That being said, there's always going to be an exploitable software piece in the network. If not Windows then SAP, is not SAP then OSISoft. The inherent problem in these networks is the total lack of protection and logging in the controllers themselves. This creates a situation where any type of access to the network (malware, employees...) immediately poses a potentially devestating non-tracable threat.

My two cents anyway..
Helpthepeeps724
0%
100%
Helpthepeeps724,
User Rank: Apprentice
10/30/2015 | 2:57:17 PM
Electronic Speed Traps
Please people work on hacking the legal scamming companies that take the picture of a car and send a ticket in the mail.

https://www.onlinecitationpayment.com/auth/login.do

 

Hack their PII so that the municipalities complicit in this scam get sued along with them....hence no more electronic speeding cams!
MartinL703
50%
50%
MartinL703,
User Rank: Apprentice
10/30/2015 | 9:48:19 AM
Really?
Well I'll be interested to see this.  BOPs connected to ERP?  There may be some weaknesses in deployment of the integration of PCN and Enterprise Networks that would expose weaknesses but it is a fundamental principle of Process Control that you cannot penetrate the control elements of the system.  Looking forward to being proven wrong!
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
8 Key Building Blocks for Enterprise Network Defense
Networks are changing rapidly -- and so are strategies for protecting them. This Tech Digest looks at the fundamentals for the next-gen environment.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In this episode of Dark Reading Radio, veteran CISOs will share their experience and insight into how organizations can get the best bang for their security buck.