Target attack shows danger of remotely accessible HVAC systems

Target attack shows danger of remotely accessible HVAC systems

Qualys says about 55,000 Internet-connected heating systems, including one at the Sochi Olympic arena, lack adequate security

The massive Target breach led to revelations that many companies use Internet-connected heating, ventilation, and air conditioning (HVAC) systems without adequate security, giving hackers a potential gateway to key corporate systems, a security firm warned Thursday.

Cloud security service provider Qualys said that its researchers have discovered that most of about 55,000 HVAC systems connected to the Internet over the past two years have flaws that can be easily exploited by hackers. Such a flaw was used by hackers in the Target breach.

HVAC systems connect to networks at various retail companies, government buildings and even hospitals, according to the security firm. HVAC vendors and other third parties often have remote access right to these systems for administrative and support purposes.

Hackers can exploit these systems to gain access to enterprise networks and leapfrog onto other corporate systems, Qualys said.

The recent breach at Target, which resulted in the theft of data on 40-million credit and debit cards, is believed to have occurred in this way. According to security blogger Brian Krebs, who first reported the massive breach, hackers gained access to the Target network using login credentials stolen from a company that provides HVAC services to the retailer.

The HVAC firm apparently had access rights to Target's network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The Target data thieves used the remote access rights to gain a foothold on the retailer's network and subsequently leapfrog onto the company's payment systems.

Most companies have no idea HVAC systems are connected to the Internet and can serve as gateways into the corporate network and sensitive data, said Billy Rios director of intelligence at Qualys, in an email.

"This breach doesn't just affect Target. There are many other control systems for other companies that are exposed," Rios said.

After the disclosure about how attackers accessed the Target network, Qualys did some network scanning and found that that the HVAC system at Target's headquarters is still visible online. So too is the HVAC and energy management systems at the Sochi Olympics arena, he said.

"The Sochi system doesn't even require a password, so if you know the IP address, you're in. We've contacted the integrator to warn them of this problem," Rios noted.

Often, the companies that have remote access to HVAC systems fail to realize that the systems can be used as a gateway to sensitive corporate networks. So they typically tend to have lax security measures, he said. For instance, many HVAC management companies use the same password to access systems belonging to multiple customers, he said.

Qualys has been working with the DHS on this issue for three years, so the threat is not unknown to all, Rios said. "Most people just don't know about it yet," he added.

Boatner Blankenstein, senior director of solutions engineering at Bomgar, a company that provides tools for securing remote access, said the Target breach shows why companies need to implement measures for controlling what third-parties can do on their networks.

Large enterprises often grant remote access rights to software, hardware, and numerous other vendors and external third parties. But few have measures in place for ensuring that the access is properly authenticated and secured.

While many companies might routinely log remote access sessions, few have capabilities to audit the access from a security standpoint, he said.

Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is

Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags TargetCybercrime and HackingsecurityMalware and Vulnerabilitiesqualys


Top 50 defining moments of the New Zealand channel in 2016

Top 50 defining moments of the New Zealand channel in 2016

Reseller News looks back on a tumultuous 12 months for the New Zealand channel, assessing the fallout from a year of sizeable industry change. Whether it be local or global mergers and acquisitions, distribution deals or job changes, the channel that started the year differs somewhat to the one set to finish it - Reseller News assesses the key moments that made 2016.​

Top 50 defining moments of the New Zealand channel in 2016
​Hewlett Packard Enterprise honours high achieving NZ channel

​Hewlett Packard Enterprise honours high achieving NZ channel

Hewlett Packard Enterprise honoured its top performing Kiwi partners at the second running of its HPE Partner Awards in New Zealand, held at a glitzy ceremony in Auckland. Recognising excellence across eight categories - from distributors to resellers - the tech giant celebrated its first year as a standalone company, following its official split from HP in 2015.

​Hewlett Packard Enterprise honours high achieving NZ channel
Nutanix treats channel partners to Christmas cruise

Nutanix treats channel partners to Christmas cruise

Nutanix recently took to the seas for a Christmas Cruise around Sydney Harbour with its Australia and New Zealand staff, customers and partners to celebrate a stellar year for the vendor. With the sun out, they were all smiles and mingled over drinks and food.

Nutanix treats channel partners to Christmas cruise
Show Comments