21.03.2013 Views

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 1. INTRODUCTION 13<br />

This particular case is interesting because it shows that such compromises are possible<br />

even for a hacker without knowledge of SCADA systems, <strong>and</strong> for reasons unexpected to<br />

your average control system engineer. The motivation of a directed compromise might<br />

simply be the use of your computational resources, not money or terror. Additionally, all<br />

the old challenges of computer security arise such as tracking <strong>and</strong> prosecuting someone in<br />

another national jurisdiction.<br />

Maroochyshire<br />

Between February 9th <strong>and</strong> April 23rd 2000, multiple malicious interventions in sewage<br />

pumping stations occurred in Maroochyshire, Australia. Hundreds of gallons of raw<br />

sewage were released into rivers <strong>and</strong> parks.<br />

Since then, a former employee of an IT consultancy employed by the council has been<br />

convicted of these attacks. The incident report notes that the former employee (Vitek<br />

Boden) used stolen equipment <strong>and</strong> his insider knowledge of the system, which allowed him<br />

to alter radio messages sent to pumping stations or to falsify them altogether. Addition-<br />

ally, he was able to remove ‘alarms’ from the pumping stations to make his changes <strong>and</strong><br />

simultaneously remain undetected. The alarms in this case are not the physical alarms,<br />

but rather urgent messages passed (via SMS or email) to control engineers when a de-<br />

vice exceeds some operational limit or parameter, or has its configuration altered. By<br />

disabling these alarms he exacerbated the damage caused by his malicious actions, since<br />

it increased the time until alterations were noticed.<br />

The key points in this case are that he was motivated by revenge, <strong>and</strong> highly knowledge-<br />

able of the systems <strong>and</strong> protocols he exploited. He was able to evade detection for months,<br />

<strong>and</strong> in the initial stages the control system engineers blamed installation errors rather than<br />

detecting malicious actions. It took weeks for the office culture to shift towards proving<br />

the existence of, <strong>and</strong> detecting, a malicious actor.<br />

Lastly, the sabotage perpetrated by Vitek Boden is a mixture of remote <strong>and</strong> local. While<br />

he issued his malicious comm<strong>and</strong>s remotely <strong>and</strong> wirelessly, he was in close proximity to<br />

the stations he exploited. So during a period that he was parked near a pumping station,<br />

he was picked up by local police officers. This highlights the value of control system<br />

engineers, computer security professionals, <strong>and</strong> police forces having an underst<strong>and</strong>ing of<br />

each other’s roles <strong>and</strong> responsibilities during such an event.<br />

According to the Repository of <strong>Industrial</strong> Security Incidents (RISI) analysis done by Byres<br />

<strong>and</strong> Lowe [5], insider attacks happen less frequently than remote attacks, but they are<br />

much more costly.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!