A new analysis of industrial control systems (ICS) running in the networks of oil and gas, power generation, refining and chemicals, pulp and paper, and mining industries sheds light on how some legitimate and deeply rooted product features and functions can actually threaten their security.
In many cases, these purpose-built functions embedded in systems can be exploited by malicious attackers by merely changing easily adjusted configurations and settings; malware isn't necessarily required to do so, according to Mark Carrigan, chief operating office of PAS Global. Carrigan's firm studied some 10,000 of its customers' ICS systems to pinpoint features that he describes as "delicate by design" with easily abused configuration capabilities.
It's a spin on the well-known "insecure by design" issue associated with these systems: Security vulnerabilities as well as the lack of security controls in the design of many OT products have been the subject of research for some time. But Carrigan points out that some product features, too, can easily be reconfigured and weaponized.
Not only do many of these systems predate today's cyberthreats, but some of the security-challenged features were built into the systems to make engineers' jobs easier and so they could perform their tasks quickly, according to Carrigan. They can't easily be updated, and even removing some of these weaknesses can, in many cases, cause a ripple effect of disruption in the system and production.
While sophisticated or potentially damaging attacks on ICS networks to date have been relatively rare and difficult to pull off without knowledge of a plant's processes as well as the ICS systems within it, security experts say nation-state attackers, via cyber espionage campaigns, are increasingly gaining knowledge to sabotage a plant's operation via a cyberattack. Stuxnet was the first wakeup call for the industrial sector. Most recently was Triton/Trisis, which in 2017 shut down the safety instrumentation system at a petrochemical plant in Saudi Arabia.
Understanding the processes beneath the control systems could be a deadly combination for a malicious hacker able to change the configuration of the OT assets, Carrigan says. "That's the next landscape for attackers," he says.
'Tip of the Iceberg'
Carrigan won't name names of the affected vendors PAS found in its analysis, but some of the exposed features span multiple brands of OT equipment. Of the 10,000 industrial systems, there were some 380,000 total known vulnerabilities with published CVEs, most of which were Microsoft Windows-related. He will present his findings next week at the S4x20 ICS security conference in Miami.
"This is just the tip of the iceberg. There are tons of these out there," Carrigan says.
Dale Peterson, CEO of Digital Bond, a control systems research and consulting firm that runs S4, says Carrigan's study provides another level of insecure-by-design issues. Specifically, some of them include features that are required for components to communicate. To actually fix these issues would entail simultaneously upgrading a large number of components and weeks of production outage, he explains.
"Also, many of these 'features' are hidden or known only to the team deploying the ICS," Peterson notes.
Many of the security-challenged features PAS is highlighting are well-known by the vendors in question, according to Carrigan. Most of the fallout he has seen with those features so far has been with mistakes and inadvertent misconfigurations by the operators themselves, not malicious hackers.
One feature that spans all vendors' control systems products is a parameter or setting generally known as the output characteristic. This control function parameter is a binary setting that determines, for example, the flow rate of air or gas in a valve. If the flow controller is set for 100 and the current flow is 80, it will open the valve to reach 100, for example, he says. "If I just reverse that setting — just switch it ... it's a simple thing to do — that valve opening is going to close. I've [then] reversed the action of the output characteristic," he explains.
Another feature specific to one vendor's control system product — which it recently patched — is a command in the human machine interface's (HMI) graphics files that could allow an attacker to gain administrative control of the entire DCS network, Carrigan says. This feature is for engineers or designers to create a command for an operator, but if an attacker got hold of it, he or she could land admin privileges. It even bypasses any set Windows admin privileges, he says.
An additional feature at risk is an HTML weakness in most HMIs built in the past 10 years, according to PAS's findings. These HMIs use a free format of HTML for graphics design, according to Carrigan. "If you have HTML, you can inject code and do almost anything you want — change flow control settings, no problem. Do SQL injections in the configuration database, no issue there," he says.
PAS also found a setting in one vendor's control system for balancing computing loads for a flow-control indicator process. By "mixing up" the calculations of the flow indicator and the flow controller on the CPU, an attacker could wreak havoc on the operation. "There's nothing in the system to prevent you from setting those things wrong. So at a minimum I can cause production problems by changing a bunch of these settings," or even overload the CPU, he says.
Another "delicate" feature they found: one vendor's ICS system that uses a single, hard-coded system engineer username and password that is stored in its configuration database. The password is hashed, but Carrigan says it's a very simple and guessable hash. "Once I've [the attacker] figured it out, I know for every single system, I can access that hash and access that system," he explains. The password can't be changed because it's "designed into" the product.
Damon Small, technical director of the NCC Group, says the threat model has changed significantly for the ICS sector, and attacks are becoming more common. But the real-world impact of making security changes like patching or other moves that take operations offline even for a short period of time often deter any major security changes by operators. Small says once when he recommended an operator to patch monthly for Windows flaws, the operator told him that taking those systems offline for just four hours would cost his organization $350,000 in outage time.
"Operators know very well the inefficiencies introduced when you start messing with control systems," Small explains.
What to Do
How do OT operators protect their plants from their own systems, especially if patching may be off the table in some cases?
Adopting configuration management, especially for the most critical systems and assets, is one way to thwart an attack via "delicate" features, according to Carrigan. That way only the changes you allow can take place, for instance, he says.
Passive network monitoring can also catch anomalous traffic and behavior, notes NCC Group's Small, who is also a founding member of the Operational Technology Cyber Security Alliance. "If you see something other than what you were expecting, that could an indicator of something having gone wrong. But this assumes you understand what your normal traffic looks like — what your baseline is," he notes, which requires analysis.
- Siemens Offers Workarounds for Newly Found PLC Vulnerability
- Triton/Trisis Attacks Another Victim
- Industrial Safety Systems in the Bullseye
- Lessons From The Ukraine Electric Grid Hack
Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "6 Unique InfoSec Metrics CISOs Should Track in 2020."