Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/3/2013
10:12 PM
Tom Parker
Tom Parker
Commentary
50%
50%

Red Teaming the Electric Grid

Tom Parker explores the complexities of an attack against the US bulk electric system.

Over the next week in Vegas, Jonathan Pollet and I will be making our annual trip to the desert, to teach our SCADA security course out at UBM’s Blackhat Training & Briefing event. In response to increased media-created fear, uncertainty and doubt over whether groups like Anonymous are capable of successfully attacking the electric grid, through its various digital interconnections, we’ll be spending a half day discussing what exactly would be required / involved in pulling off a successful attack against the US bulk electric system (or “BES”). The point of this activity is not so much to provide attendees with a road-map to conducting such an attack (indeed, this couldn’t be learned in a half day), but to understand the relative complexity of pulling off such an attack, owing to the highly heterogeneous nature of the target environment, therefore making it fairly laughable that anyone except a well-funded nation state could likely pull off a broad-scale attack. For those of you who won’t be able to join us out in LV, here’s the skinny for your enjoyment and hopefully, to provide you some talking points next time you’re asked about such craziness.

One, the electric grid isn’t a single grid. In Northern America (and Europe), the “grid” is actually comprised of multiple, regionalized grids, each with its own ability to sectionalize and isolate itself from outages which may be occurring inside and outside of its operating region. The two primary grids that you’ll hear people talk about are the western and eastern interconnections; however, Texas also has its own grid, as does Quebec (although generally considered to be part of the eastern US interconnection). The point here is that you’re not just targeting one grid, you’re at very least targeting four, each with their own fault isolation and monitoring systems which would need subverting.

Two, the electric grid doesn’t run Windows. Well, at least not most of it. If you consider the numbers of “assets” involved in the operation of the grid, a very small percentile are running any kind of standardized operating platform, and where they do, mostly exist in control / monitoring rooms. When we’re talking about doing physical damage to power lines, transformers and generators, we’re now talking about an extremely heterogeneous environment, which you will find seldom configured in any kind of symmetrical manner, even within a given electric utility. This means that in order to attack this type of equipment , you n not only need to know make, model, firmware version etc, but you also need to understand the context under which the device has been deployed in order to effect the desired impact on whatever it happens to be hooked up to. Even if you’re able to compromise a more monolithic layer, such as a control room, this will only buy you an interface to the field-equipment (PLC’s RTU’s etc) which is what ultimately needs manipulating to make things go bang and lights go out. It is this nuance which made Stuxnet so sophisticated, given its ability to target highly specific industrial processes and the field devices (PLC’s), which were associated with nuclear enrichment.

Finally, it is not to say that such an attack would be impossible, it is just unlikely to manifest itself in the way that we generally view the smash-and-grab nature of most cyber-attacks. The military doctrine of preparing the battlefield is much more likely to apply, which is to say; that a well-funded, long-term campaign would likely be necessary, to gather sufficient intelligence on the environment and position sufficient resources, such that once critical mass is reached, an event may be triggered (such as a cascading failure within each grid geography) which would overcome countermeasures in place. This isn’t something that can happen overnight or come cheaply.

Tom Parker is CTO at FusionX

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3326
PUBLISHED: 2021-01-27
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
CVE-2021-22641
PUBLISHED: 2021-01-27
A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22653
PUBLISHED: 2021-01-27
Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22655
PUBLISHED: 2021-01-27
Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-26276
PUBLISHED: 2021-01-27
** DISPUTED ** scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. NOTE: the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data.