Menu
Public utility compromised after brute-force attack, DHS says

Public utility compromised after brute-force attack, DHS says

The utility, which was not identified, had been compromised before

A public utility in the US was compromised after attackers took advantage of a weak password security system, according to a U.S. Department of Homeland Security team that studies cyberattacks against critical infrastructure.

The utility's control system was accessible via Internet-facing hosts and used a simple password system, wrote the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) in a report on incidents covering the first quarter of this year.

The utility, which was not identified, was vulnerable to a brute-force attack, where hackers try different combinations of passwords until the right one is found. An investigation showed the utility was attacked before.

"It was determined that the systems were likely exposed to numerous security threats, and previous intrusion activity was also identified," ICS-CERT wrote in the report.

The US government has long warned that critical infrastructure such as power and water plants are at risk of cyberattack, as many of their IT systems have not been rigorously audited for vulnerabilities and configuration mistakes.

ICS-CERT warned that it is easy for hackers using search engines such as Google and SHODAN to find Internet-connected control systems "that were not intended to be internet facing."

The report described a second cyberattack but did not specify what type of organization was affected.

In that instance, an Internet-connected control system that operated a mechanical device was accessed by an attacker using a cellular modem. The access has been gained using a SCADA (supervisory control and data acquisition) protocol, the team wrote.

"The device was directly Internet accessible and was not protected by a firewall or authentication access controls," ICS-CERT wrote.

The attacker appears to have struck at just the wrong moment. The mechanical device happened to be disconnected from the control system for scheduled maintenance, the team wrote.

In the first quarter of this year, ICS-CERT advised 20 energy, water, nuclear and transportation utilities on identifying vulnerabilities and how to improve their cyberdefenses, the report said.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Industrial Control Systems Cyber Emergency Response TeamintrusionsecurityU.S. Department of Homeland Security

Featured

Slideshows

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

​Ingram Micro’s Hooked on Lenovo incentive programme recently rewarded 28 of New Zealand's top performing resellers with a full-on fishing trip at Great Barrier Island for the third year​ in a row.

Tight lines as Hooked on Lenovo catches up at Great Barrier Island
Inside the AWS Summit in Sydney

Inside the AWS Summit in Sydney

As the dust settles on the 2017 AWS Summit in Sydney, ARN looks back an action packed two-day event, covering global keynote presentations, 80 breakout sessions on the latest technology solutions, and channel focused tracks involving local cloud stories and insights.

Inside the AWS Summit in Sydney
Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Ingram Micro hosted its third annual Cure Kids Charity Golf Tournament at the North Shore Golf Club in Auckland. In total, 131 resellers, vendors and Ingram Micro suppliers enjoyed a round of golf consisting of challenges on each of the 18 sponsored holes, with Team Philips taking out the top honours.

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day
Show Comments