Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/3/2013
10:12 PM
Tom Parker
Tom Parker
Commentary
50%
50%

Red Teaming the Electric Grid

Tom Parker explores the complexities of an attack against the US bulk electric system.

Over the next week in Vegas, Jonathan Pollet and I will be making our annual trip to the desert, to teach our SCADA security course out at UBM’s Blackhat Training & Briefing event. In response to increased media-created fear, uncertainty and doubt over whether groups like Anonymous are capable of successfully attacking the electric grid, through its various digital interconnections, we’ll be spending a half day discussing what exactly would be required / involved in pulling off a successful attack against the US bulk electric system (or “BES”). The point of this activity is not so much to provide attendees with a road-map to conducting such an attack (indeed, this couldn’t be learned in a half day), but to understand the relative complexity of pulling off such an attack, owing to the highly heterogeneous nature of the target environment, therefore making it fairly laughable that anyone except a well-funded nation state could likely pull off a broad-scale attack. For those of you who won’t be able to join us out in LV, here’s the skinny for your enjoyment and hopefully, to provide you some talking points next time you’re asked about such craziness.

One, the electric grid isn’t a single grid. In Northern America (and Europe), the “grid” is actually comprised of multiple, regionalized grids, each with its own ability to sectionalize and isolate itself from outages which may be occurring inside and outside of its operating region. The two primary grids that you’ll hear people talk about are the western and eastern interconnections; however, Texas also has its own grid, as does Quebec (although generally considered to be part of the eastern US interconnection). The point here is that you’re not just targeting one grid, you’re at very least targeting four, each with their own fault isolation and monitoring systems which would need subverting.

Two, the electric grid doesn’t run Windows. Well, at least not most of it. If you consider the numbers of “assets” involved in the operation of the grid, a very small percentile are running any kind of standardized operating platform, and where they do, mostly exist in control / monitoring rooms. When we’re talking about doing physical damage to power lines, transformers and generators, we’re now talking about an extremely heterogeneous environment, which you will find seldom configured in any kind of symmetrical manner, even within a given electric utility. This means that in order to attack this type of equipment , you n not only need to know make, model, firmware version etc, but you also need to understand the context under which the device has been deployed in order to effect the desired impact on whatever it happens to be hooked up to. Even if you’re able to compromise a more monolithic layer, such as a control room, this will only buy you an interface to the field-equipment (PLC’s RTU’s etc) which is what ultimately needs manipulating to make things go bang and lights go out. It is this nuance which made Stuxnet so sophisticated, given its ability to target highly specific industrial processes and the field devices (PLC’s), which were associated with nuclear enrichment.

Finally, it is not to say that such an attack would be impossible, it is just unlikely to manifest itself in the way that we generally view the smash-and-grab nature of most cyber-attacks. The military doctrine of preparing the battlefield is much more likely to apply, which is to say; that a well-funded, long-term campaign would likely be necessary, to gather sufficient intelligence on the environment and position sufficient resources, such that once critical mass is reached, an event may be triggered (such as a cascading failure within each grid geography) which would overcome countermeasures in place. This isn’t something that can happen overnight or come cheaply.

Tom Parker is CTO at FusionX

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16966
PUBLISHED: 2019-10-21
An issue was discovered in Contactmanager 13.x before 13.0.45.3, 14.x before 14.0.5.12, and 15.x before 15.0.8.21 for FreePBX 14.0.10.3. In the Contactmanager class (html\admin\modules\contactmanager\Contactmanager.class.php), an unsanitized group variable coming from the URL is reflected in HTML on...
CVE-2019-9491
PUBLISHED: 2019-10-21
Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below have a vulnerability that may allow an attacker to place malicious files in the same directory, potentially leading to arbitrary remote code execution (RCE) when executed.
CVE-2019-16964
PUBLISHED: 2019-10-21
app/call_centers/cmd.php in the Call Center Queue Module in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated attackers (with at least the permission call_center_queue_add or call_center_queue_edit) to execute any comma...
CVE-2019-16965
PUBLISHED: 2019-10-21
resources/cmd.php in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated administrative attackers to execute any commands on the host as www-data.
CVE-2019-18203
PUBLISHED: 2019-10-21
On the RICOH MP 501 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn and KeyDisplay parameter to /web/entry/en/address/adrsSetUserWizard.cgi.