Showing posts with label research. Show all posts
Showing posts with label research. Show all posts

Monday, 5 August 2013

Industrial control systems targeted by malicious attackers, research shows

Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps.

The ICS honeypot system, designed to attract attackers, was created by Kyle Wilhoit, a researcher from security firm Trend Micro. He shared some initial findings in March based on the system's original deployment in the U.S.

The researcher shared new data regarding attacks at the Black Hat security conference on Thursday and also released the tools for others to build and deploy similar systems.

Since March, he has made significant changes to the system architecture. He virtualized it and deployed it in additional countries, including Brazil, Russia, Ireland, Singapore, China, Japan and Australia.

The new architecture uses a tool called the Browser Exploitation Framework (BeFF) to inject JavaScript code into attackers' browsers if they break into the system and access secure areas.

The injection is not malicious in nature, but it allows the honeypot operator to obtain information about the attacker's computer, which significantly enhances the ability to attribute attacks, Willhoit said. The JavaScript code can perform Wi-Fi triangulation to determine the attacker's location and can gather information about his computer and local network, including the OS, computer name and IP address, he said.

Wilhoit has identified 74 attacks against the ICS honeypot systems, 10 of which can be considered critical and could have compromised the integrity of the water pump.

In one case, an attacker tried to change the water temperature in the pump to 130 degrees Fahrenheit and in two other cases, the attackers issued commands to shut down the water pump.

Overall, 58 percent of attacks originated from Russia, but all of them were non-critical in nature.

Attacks classified as non-critical would have not have severely affected the water pump, but they could have led to critical attacks in the future, the researcher said.

Five of the critical attacks originated from China, and one each from Germany, the U.K., France, Palestine and Japan.

The critical attacks were targeted in nature and the attackers behind them generally tried to manually identify vulnerabilities in the components of the simulated water pump system, Willhoit said.

Meanwhile, the individuals behind the non-critical attacks first performed port scans and then used automated vulnerability scanners or known ICS vulnerabilities to try to break in.

The goal of some of the critical attacks was probably espionage or reconnaissance, as attackers were actively monitoring the data coming from the system, the researcher said.

During the past few years, security researchers have identified a large number of vulnerabilities in various components of industrial control systems. However, real-world information on who might attack such systems, and how likely attacks are, has been limited.

The big takeaway from this research is that attacks against Internet-facing ICSs are occurring and some of them appear to be targeted, Wilhoit said. Many ICS engineers are likely not aware that this is happening, he said.

The researcher hopes the tools he released will help ICS owners build and deploy their own honeypots in order to see who's targeting them and why and what changes they need to make to protect their real systems.

The ICS world needs more security information sharing, Wilhoit said. Researchers and IT professionals are sharing good information in other fields of IT security and same thing needs to happen for ICS, especially in those areas that could be considered critical infrastructure, he said.


View the original article here

Tuesday, 30 July 2013

University condemns court ban of research paper on flaws in car lock system

A court ban on a research paper that analyzes flaws in a car-lock system should be overturned, according to the Dutch university that employs two of the three researchers who wrote the analysis.

The U.K. High Court of Justice banned the publication of the paper, “Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer” on June 25, said the Radboud University Nijmegen in a news release on Monday. The ban came to the attention of the public when the U.K. newspaper The Guardian published a story about it over the weekend.

The U.K. court issued an interim block on the research paper, while considering a permanent ban on request of car manufacturer Volkswagen, the university added. French defense group Thales also requested the ban, according to a report by the BBC.

Roel Verdult and Baris Ege, of the Digital Security faculty at Radboud University, were planning to present their paper with Flavio Garcia a lecturer in Computer Science of the University of Birmingham during the USENIX Security Symposium in Washington, D.C., in August, the Dutch university said.

Verdult and Ege said in a joint email on Monday that they did not want to comment on the matter. Garcia did not return a request for comment.

“In their scientific article, they show that there is a fault in the security of the Megamos chip that is used in the immobilizer in different car brands,” the Radboud University said, adding that the chip was designed in the mid-90s and is outdated. “Nevertheless, it is still widely used in the automotive industry,” it said.

The research is based on publicly available information. In their paper, the researchers reveal the weakness of the chip in mathematical terms, the university said. The research “by no means reveals how to easily steal a car,” it said, adding that very different information is needed to do that.

Furthermore, the researchers informed the chip maker in November 2012, nine months before the intended publication of their paper, so that security measures could be taken, the university said. The researchers also urged the chip maker to inform their own customers from the outset, it added.

“The decision of the English court imposes severe restrictions on the freedom of academic research in a socially highly relevant field,” Radboud University said, adding that it nevertheless respects the decision of the court.

“The University of Birmingham is disappointed with the judgment which did not uphold the defence of academic freedom and public interest, but respects the decision,” a University of Birmingham spokesperson said in an email. It has decided to defer publication of the academic paper in any form while it obtains additional technical and legal advice.

Because the court is considering a final ruling, Radboud University spokeswoman Anja van Kessel declined to provide further comment, but said the university hopes the court will ultimately decide in favor of publication of the paper.

Volkswagen did not respond to a request for comment.

Loek Essers focuses on online privacy, intellectual property, open-source and online payment issues.
More by Loek Essers, IDG News Service


View the original article here