More than one-fourth of utility employees in experiment fell victim to spearphishing emails

Dark Reading Staff, Dark Reading

January 18, 2013

4 Min Read

MIAMI, FL – S4 Conference – Spear-phishing is everywhere in targeted attacks today -- even in the SCADA/industrial control systems (ICS) world. A recent experiment involving two real-world utilities showed just how successful those types of campaigns can be: Twenty-six percent of utility employees clicked on a link in the phony emails.

The experiment, conducted last month by open-source intelligence expert Tyler Klinger of Critical Intelligence and Scott Greaux of PhishMe, also demonstrated how easy it is to gather the necessary intelligence to target key individuals within an ICS organization, including those with access to actual process control systems.

With the help of Digital Bond, Klinger was able to line up three utilities in the gas and electric industries to participate in the experiment. Klinger found valuable but seemingly benign information online in the public domain about employees at the utilities and then used that intelligence to craft convincing spear-phishing emails with "malicious" links. One of the three dropped out of the project after the first phase, but Klinger was able to fool employees with titles including control room supervisor, instrument technician, automation technician, pipeline controller, process control engineer, senior vice president of operations and management, and equipment diagnostics lead.

"If 26 percent of your ICS people are able to get pwned, that's a pretty telling statistic," Klinger said in his presentation here yesterday. And all of the information he needed was available online, via LinkedIn, industry websites, company websites, job postings, crowdsourcing directory site Jigsaw, and other sites. He found users' email addresses, job titles, SCADA product specialties, and other juicy information that could be used to craft convincing, targeted emails.

The goal was to determine how successful spear-phishing can be used in the ICS world, and to demonstrate how attackers can use open-source online intelligence to gain a foothold in a utility or other ICS organization.

"This is pretty serious," says Digital Bond's Peterson. Given the list of titles of employees who fell for the email, an attacker trying to get remote access to a control room or other parts of the network would have hit pay dirt, he says.

Critical Intelligence's Klinger said even if an attacker was unable to connect to the SCADA network via the victim, he would still have plenty of information from the user via emails and instant messaging, for instance.

"Most people think that spear-phishing doesn't even apply to ICS," he said. But most major targeted attack campaigns against businesses and government entities have all started with a spear-phishing attack, he says, such as Shady RAT, Night Dragon, and Shamoon.

According to Trend Micro, 91 percent of targeted attacks involve spear-phishing.

The experiment was only about attacking via email, but it's the cross-contamination that could occur afterward in a real attack that's, of course, the biggest risk, he said. "An engineer with access to the network who downloads firmware ... if one who's hit then plugs" in his machine in the process control network, an attacker could then mess with the ICS systems, he says.

The phony emails included ones posing as a message from a utility supervisor with a link that appeared to be from the firm's website, and another that focused on a Rockwell product known by the victim and included a link that appeared to go to the vendor's website.

Victims who fell for the ruse did so mostly from PCs, and a smattering of other devices were used, including an iPhone.

So how can utilities protect themselves and their employees from spear-phishing attacks? Klinger said you need to know where your company and employees' information resides online in public view. "You've got to review the public source out there and how attackers can use this information," he said. "Then implement policies accordingly."

Even an organization's email schema can be abused by attackers. "One change would be to have ICS people have different emails," which would limit access on sites like Jigsaw, for instance, he says.

One control room supervisor who fell for the phish actually clicked on the phony link four times, wondering why it didn't work. "He tried once and then, an hour later, tried again," Klinger says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights