Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/23/2019
06:30 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

RF Hacking Research Exposes Danger to Construction Sites

Trend Micro team unearthed 17 vulnerabilities among seven vendors' remote controller devices.

A global team of researchers recently took industrial system hacking to a whole new — and visual — level by exploiting flaws they discovered in radio frequency (RF) controllers that move cranes and other large machinery at construction sites and in factories.

The Trend Micro team first tested out the vulnerabilities in their lab with a miniaturized crane, and later on a live construction site in Europe, where, with permission, two members of the team hacked the crane's controller and were able to move the massive arm from side to side. Two other members of the team, who shared details of their RF hack at last week's S4x19 conference in Miami, said the two-year-long research project included reverse engineering some remote-controller devices' proprietary RF protocols, and using a software-defined radio (SDR) as well as a homegrown RF analyzing tool, to gain control of the RF devices.

In another twist to the hack, Trend Micro researcher Stephen Hilt built a digital watch to control the crane operation communications. The watch, based on the so-called GoodWatch created by renowned hardware hacker Travis Goodspeed, provided a stealthier method of the attack on the controllers. "I was thinking to myself, I wonder if I could control a crane with this watch? So I actually built a watch to control the crane."

The Trend Micro research team overall discovered and reported some 17 vulnerabilities across seven popular controller products from Saga, Circuit Design, Juuko, Autec, Hetronic, Elca, and Telecrane, most of which have since issued patches. But as with any industrial system, there's no guarantee users will apply the security updates due to the age of their products as well as concerns over disrupting their industrial operations.

This isn't the first time RF technology's security weaknesses have been exposed, but the Trend Micro work focused on cranes, which haven't been closely studied previously, the researchers said. "There's been a lot of research in the RF space, but none has actually applied to this type of industrial controllers," Hilt said.

Radio Free of Security
The Trend Micro team found that the products lack so-called "rolling" or "hopping" code that prevents attackers from recording and replaying their RF communications to control the equipment. Nor do the controllers include encryption: The data sent between the transmitter and receiver is obfuscated, so it can be intercepted. And the software for uploading firmware to the transmitter isn't secured, leaving it open for an attacker to tamper with it.

Using an SDR, the researchers were able to record and then replay the RF signals used by each controller. This replay attack could allow an intruder to gain access to the controller, by replaying the recorded RF transmission communication. The devices basically accepted the commands from the researchers. "There's absolutely no security on these protocols," Hilt said.

"They don't have the security eyes that Bluetooth and Wi-Fi have," said Trend Micro's Jonathan Andersson, who reverse-engineered the RF protocols. Many of the vendors have been using the same radio protocol for a decade or longer, he noted.

The RF protocol flaws allowed them to override the emergency stop (e-stop) mode of their model crane. E-stop is a built-in physical safety feature that stops a crane from moving when RF communications fails or drops between the device and the crane, for example.

Dale Peterson, CEO of Digital Bond and the head of the S4 ICS SCADA conference, said Trend Micro's RF research demonstrated just how pervasive this vulnerable RF communications technology is: "Very little attention has been paid" to these types of industrial operations, he said.

"Clients with these mobile fleets, the people responsible for them are different from those [who are for] ICS. They are in their own zones and not protected in the same way," Peterson said.

While most have humans on-site handling the remote control operations, such as moving a crane in case of an emergency, the risk of an attack via RF is even more ominous as these operations become more automated, according to Peterson. "In the next [few] years when the human goes away, it will be an even bigger deal" for risk, he said.

Trend Micro's Hilt said automation indeed could be the catalyst for better security of these RF-based industrial control devices. "If [vendors] want to be on the forefront of their automation push, they need to be secure," he said.

The researchers also published a detailed technical report on their research.

Related Content:

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Jim, stop pretending you're drowning in tickets."
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3571
PUBLISHED: 2019-07-16
An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.
CVE-2019-6160
PUBLISHED: 2019-07-16
A vulnerability in various versions of Iomega and LenovoEMC NAS products could allow an unauthenticated user to access files on NAS shares via the API.
CVE-2019-9700
PUBLISHED: 2019-07-16
Norton Password Manager, prior to 6.3.0.2082, may be susceptible to an address spoofing issue. This type of issue may allow an attacker to disguise their origin IP address in order to obfuscate the source of network traffic.
CVE-2019-12990
PUBLISHED: 2019-07-16
Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 allow Directory Traversal.
CVE-2019-12991
PUBLISHED: 2019-07-16
Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 have Improper Input Validation (issue 5 of 6).