Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

11/9/2017
03:55 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

Stealthy New PLC Hack Jumps the Air Gap

Researchers at Black Hat Europe next month will demonstrate a data-exfiltration attack on Siemens PLCs that uses combination of code manipulation and Radio Frequency (RF) emissions.

Once again, a new hack shatters the myth of the air-gapped industrial network.

Researchers have devised a sneaky reconnaissance attack that drops rogue ladder-logic code onto a Siemens programmable logic controller (PLC) to gather sensitive plant data from an industrial network with no Internet connection, and then siphons it remotely via Radio Frequency (RF) transmission. A nation-state or other hacker group could use the stolen information for a future attack that sabotages the plant's physical operations.

"We know that two-thirds of industrial networks are air gapped," says David Atch, vice president of research for CyberX, who along with CyberX researcher George Lashenko, will demonstrate their research at Black Hat Europe next month in London. "We decided to look for a way to [exfiltrate data from] the air-gapped network and we decided to try something more unique and with more of a cover" to avoid detection, he says.

Organizations often have a false sense of security if their networks are air-gapped, or isolated from the Internet. But the infamous Stuxnet attack, where a rigged USB stick carried malware into Iran's Natanz nuclear facility, demonstrated how it only takes one infected machine or device to get connected to the network to wreak destruction.

The ladder logic code Atch and Lashenko wrote for the Siemens S7-1200 PLC in their hack generates frequency-modulated RF signals that ride just under the AM radio band and encode the stolen data, which could be anything from network topology details to nuclear blueprints. The data gets decoded via a Software Defined Radio and PC connected to the targeted site with an antenna. The researchers say an attacker could either fly a drone over the plant to siphon the stolen recon, or set up the SDR and PC nearby for collection.

The malicious code is written to the storage architecture of the PLC so that it remains on the device even if the PLC gets rebooted. "These devices don't have radio transmitters," Atch notes, but the ladder-code logic makes the device generate a radio frequency.

There are no vulnerabilities per se that the researchers exploited, and it's an attack that could be waged on any vendors' PLC. Their attack basically takes advantage of the architecture and inherent weaknesses in industrial networks, which typically have weak or no authentication, for example. PLCs, which control physical processes such as water and power generation, don't run anti-malware due to their embedded real-time operating systems and limited memory and CPU, so they can be easily infiltrated with malicious logic code, the researchers note.

The attack would first require dropping that code onto the PLC. That could occur via the compromised laptop of a plant engineer performing maintenance, or a USB, for example, Atch explains.

Not the First PLC Breach

PLCs have been the darling of white-hat hackers since the discovery of Stuxnet in 2010. Stuxnet targeted an older model of Siemens' S7 PLC to ultimately sabotage centrifuges at Natanz. Since then, researchers have poked around at PLCs to explore other ways they can be abused by the bad guys.

Researchers at last year's Black Hat Europe in London, for instance, built a "silent" rootkit for PLCs that like CyberX team's, sat directly on the PLC. But it manipulated the I/O peripherals and PLC process and did not target the PLC logic code like CyberX's attack does.

Ali Abbasi and Majid Hashemi's rootkit ran in dynamic memory of the PLC, where they said it was less likely to be detected. "In our attack, the PLC logic and PLC runtime remain intact," which kept it hidden, Abbasi explained in an interview with prior to Black Hat Europe 2016. The rootkit can manipulate the I/O and PLC process, such as opening or closing a pressure valve.

And earlier that year at Black Hat USA in Las Vegas, researchers from OpenSource Security demonstrated PLC-Blaster, a PLC worm that spreads on its own among PLCs. Researchers Ralf Spenneberg and Maik Bruggemann used a Siemens S7-1200 PLC for their attack, demonstrating how malicious code can be added to a PLC and go undetected, issuing rogue commands to the operation of connected machinery. PLC-Blaster also searched for and infected other PLCs on the same network.

CyberX's Atch and Lashenko say their hack serves as another wakeup call for industrial network operators who think their systems are untouchable if they're not connected to the Internet, aka air-gapped. 

They were able to exfiltrate data from the Siemens PLC from a distance of one meter, but Lashenko says that distance could be extended with the right type of antenna and code. With a drone, that distance could be expanded to 10 meters, for example.

The best way to defend against air-gapped network attacks is to employ network monitoring to detect unusual activity in the network, notes Phil Neray, vice president of industrial security at CyberX. "If someone tried to download new ladder logic onto a PLC … it would be identified and generate an alert," he notes.

But unlike PCs, PLCs don't have authentication, antivirus, or endpoint detection and response agent tools to catch malware or suspicious activity. "Once an attacker gets into the PLC, it's easy and he can stay there a long time."

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Related Content:

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We are really excited about our new two tone authentication system!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4126
PUBLISHED: 2020-12-01
HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later.
CVE-2020-4129
PUBLISHED: 2020-12-01
HCL Domino is susceptible to a lockout policy bypass vulnerability in the LDAP service. An unauthenticated attacker could use this vulnerability to mount a brute force attack against the LDAP service. Fixes are available in HCL Domino versions 9.0.1 FP10 IF6, 10.0.1 FP6 and 11.0.1 FP1 and later.
CVE-2020-9115
PUBLISHED: 2020-12-01
ManageOne versions 6.5.1.1.B010, 6.5.1.1.B020, 6.5.1.1.B030, 6.5.1.1.B040, ,6.5.1.1.B050, 8.0.0 and 8.0.1 have a command injection vulnerability. An attacker with high privileges may exploit this vulnerability through some operations on the plug-in component. Due to insufficient input validation of ...
CVE-2020-9116
PUBLISHED: 2020-12-01
Huawei FusionCompute versions 6.5.1 and 8.0.0 have a command injection vulnerability. An authenticated, remote attacker can craft specific request to exploit this vulnerability. Due to insufficient verification, this could be exploited to cause the attackers to obtain higher privilege.
CVE-2020-14193
PUBLISHED: 2020-11-30
Affected versions of Automation for Jira - Server allowed remote attackers to read and render files as mustache templates in files inside the WEB-INF/classes & <jira-installation>/jira/bin directories via a template injection vulnerability in Jira smart values using mustache partials. The ...