Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/28/2015
03:30 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

How Hackers Can Hack The Oil & Gas Industry Via ERP Systems

Researchers at Black Hat Europe next month will demonstrate how SAP applications can be used as a stepping-stone to sabotage oil & gas processes.

Hackers can exploit weaknesses in enterprise resource planning (ERP) systems on oil & gas firms' corporate networks in order to sabotage pipeline pressure or hide oil spills, researchers have discovered.

Researchers at Black Hat Europe next month in Amsterdam will demonstrate these and other attacks on oil & gas networks by abusing holes in SAP ERP applications used in the industrial sector. Oil & gas industrial networks rely on ERP software to help manage and oversee the oil & gas production and delivery processes.

"We want to show that not only Stuxnet-type attacks using USB are possible," says Alexander Polyakov, CTO and founder of ERPScan, who with Mathieu Geli, a researcher with ERPScan, will demonstrate several proof-of-concept attacks at Black Hat in Amsterdam. An attacker could hack the systems remotely over the Internet, he says, or from the oil & gas firm's corporate network.

"SAP is a key to this kingdom because it has a lot of products specifically designed to manage some processes such as operational integrity or hydrocarbon supply chain. Since SAP systems are implemented in, if I’m not mistaken, about 90% of oil and gas companies, this key can open many doors," he said. "SAP is connected with some critical processes which, in their turn, are connected with other processes, and so on."

The researchers, who declined to give details on the actual SAP vulnerabilities prior to their presentation, say the bugs are software and configuration flaws in SAP xMII (Manufacturing Integration and Intelligence) and in SAP Pco software. SAP's MII supports the manufacturing side and includes real-time information for production performance, while the Pco manufacturing module software supports those production-floor operations.

"For those vulnerabilities we can disclose, we will provide details" in the talk, Polyakov said in an email interview.

Polyakov says there's no simple way to separate ERP applications from the industrial operations network. "If you have some plant devices such as wellheads, which pump oil and collect some data from them, you should somehow transfer this data to the corporate network to show managers who want to see all the information on their tablets on nice dashboards. That’s why even if you have a firewall between IT and OT [operations technology], there are some applications which are connected," he said. "What we want to show is that it’s possible to conduct such attack and pivot from IT network or even the Internet into OT network up to OPC servers, SCADA systems, field devices, meters, and dozens of other modules."

Among the processes with ties to ERP are pump control, blow-out prevention, flaring and venting, gas compression, peak-load gas storage, separators and burners, he said. He says he and Geli probably know about just 10% of the overall attack surface:  "The attack surface is huge."

The oil & gas industry already has been targeted by cyberattacks. One of the biggest and infamous attacks was that of oil giant Saudi Aramco, where malware wiped or destroyed the hard drives of some 35,000 computers. A group called the Cutting Sword of Justice claimed responsibility for the massive attack.

While the attack didn't directly affect Saudi Aramco's oil production and exploration systems, it raised concerns of market fallout in the industry, as well as market manipulation. The oil & gas industry is made up of many joint ventures, namely in the oil fields. So if one partner was attacked, another could be affected as well.

"Oil and gas cybersecurity is a small universe which is almost undeveloped, but extremely critical," Polyakov said. "Any changes made during the upstream, midstream, or downstream processes may have a significant impact." 

The ERPScan researchers previously have uncovered flaws in SAP that attackers could use to get to those systems: "Just to name a few, some issues such as SAP Router or SAP Portal or recent SAP Afaria or SAP HANA vulnerabilities, can be used to get access to the SAP infrastructure from the Internet," he said.

Black Hat Europe returns to the beautiful city of Amsterdam, Netherlands November 12 & 13, 2015. Click here for more information and to register.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
MartinL703
50%
50%
MartinL703,
User Rank: Apprentice
10/30/2015 | 9:48:19 AM
Really?
Well I'll be interested to see this.  BOPs connected to ERP?  There may be some weaknesses in deployment of the integration of PCN and Enterprise Networks that would expose weaknesses but it is a fundamental principle of Process Control that you cannot penetrate the control elements of the system.  Looking forward to being proven wrong!
Helpthepeeps724
0%
100%
Helpthepeeps724,
User Rank: Apprentice
10/30/2015 | 2:57:17 PM
Electronic Speed Traps
Please people work on hacking the legal scamming companies that take the picture of a car and send a ticket in the mail.

https://www.onlinecitationpayment.com/auth/login.do

 

Hack their PII so that the municipalities complicit in this scam get sued along with them....hence no more electronic speeding cams!
BarakPerelman
50%
50%
BarakPerelman,
User Rank: Author
11/13/2015 | 6:37:09 AM
Vulns in ICS networks
Will be interesting to see what the exploits look like, and in any case higher awareness about the risks in ICS networks is always good.

That being said, there's always going to be an exploitable software piece in the network. If not Windows then SAP, is not SAP then OSISoft. The inherent problem in these networks is the total lack of protection and logging in the controllers themselves. This creates a situation where any type of access to the network (malware, employees...) immediately poses a potentially devestating non-tracable threat.

My two cents anyway..
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The security team seem to be taking SiegeWare seriously" 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1114
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the filter parameter to cmd.php in an export and exporter_id action. and the filteruid parameter to list.php.
CVE-2012-1115
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the export, add_value_form, and dn parameters to cmd.php.
CVE-2012-1592
PUBLISHED: 2019-12-05
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.
CVE-2019-16770
PUBLISHED: 2019-12-05
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.
CVE-2019-19609
PUBLISHED: 2019-12-05
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.