Vulnerabilities / Threats
10/11/2010
08:01 PM
50%
50%

Smart Grids Offer Cyber Attack Opportunities

Hackers are likely to exploit the 440 million potential targets researchers predict smart grids will offer by 2015.




Image Gallery: IBM Empowers Smarter Cities
(click for larger image and for full photo gallery)
Is your home electricity meter the next device you have to worry about getting hacked? Researchers at last week's IEEE SmartGridComm2010 conference in Gaithersburg, Md., warned that as utilities transition to greater use of smart grids, their increased two-way communication would leave consumers and suppliers open to more forms of cyber attack. In fact, by 2015, they estimated, the smart grid will offer up to 440 million potential points to be hacked.

Why mess with someone's home heating bill? One significant worry is that intercepting and manipulating smart grid data could provide attackers with the means to benefit financially, said Le Xie, an assistant professor of electrical and computer engineering at Texas A&M University, according to published reports.

For example, utilities typically plan their energy requirements one day in advance. An attacker who manipulated apparent energy demands, forcing utilities to turn to emergency -- and more expensive -- energy resources could likewise place safe bets in the energy market. "The virtual trader basically gambles against the price difference between the day-ahead market and the real-time market," said Xie.

Beyond financial remuneration, other leading attack scenarios include causing chaos, studying consumers' usage patterns to determine when they're on vacation and then burgling their house, or taking out sensitive facilities.

Another difficulty is that like SCADA systems, today's smart grid systems may have a lifespan of 10 or 20 years. During that time, their built-in security, if any, will become widely known and disseminated. In other words, today's new smart grid meter could be 2030's cyber-catastrophe, or at least give rise to some new variation on Stuxnet.

Accordingly, numerous moves are afoot to help nail the security of smart grids in their infancy. The National Institute of Standards and Technology, notably, has been developing a framework for creating interoperable as well as secure smart grids and related systems.

Last month, the Department of Energy also announced awards of more than $30 million to utility cybersecurity projects. "These awards help us make a significant leap forward to strengthen the security and reliability of the nation's electric grid, in a climate of increasingly sophisticated cyber attacks," said U.S. Energy Secretary Steven Chu in a statement.

"The development of technologies that can provide defense-in-depth cyber-security solutions, and increased insight from private-public collaborations, will allow us to better protect the nation's energy delivery systems that keep our lights on and the power flowing," he said.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The Impact of a Security Breach 2017
The Impact of a Security Breach 2017
Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.