« on: November 18, 2011, 06:33:50 PM »
http://www.washingtonpost.com/blogs/checkpoint-washington/post/foreign-hackers-broke-into-illinois-water-plant-control-system-industry-expert-says/2011/11/18/gIQAgmTZYN_blog.htmlPosted at 12:44 PM ET, 11/18/2011
Foreign hackers targeted U.S. water plant in apparent malicious cyber attack, expert says
By Ellen Nakashima
Foreign hackers broke into a water plant control system in Illinois last week and damaged a water pump in what appears to be the first reported case of a malicious cyber attack damaging a critical computer system in the United States, according to an industry expert.
On Nov. 8, a municipal water district employee in Illinois noticed problems with the city?s water pump control system, and a technician determined the system had been remotely hacked into from a computer located in Russia, said Joe Weiss, an industry security expert who obtained a copy of an Illinois state fusion center report describing the incident.
?This is a big deal,? said Weiss. The report stated it is unknown how many other systems might be affected.
The Department of Homeland Security confirmed that a water plant in Springfield, Ill. had been damaged, but spokesman Peter Boogaard said officials had not yet determined that the water pump failure was caused by a cyber-attack. ?DHS and the FBI are gathering facts surrounding the report of a water pump failure in Springfield, Illinois. At this time there is no credible corroborated data that indicates a risk to critical infrastructure entities or a threat to public safety,? he said.
Dave Marcus, director of security research for McAfee Labs, said that the computers that control critical systems in the United States are vulnerable to attacks that come through the Internet, and few operators of these systems know how to detect them. ?So many are ill-prepared for cyber attacks,? Marcus said.
Problems with the system in Springfield had been observed for two to three months and recently the system ?would power on and off, resulting in the burnout of a water pump,? the Nov. 10 report from the statewide terrorism and intelligence center stated, according to Weiss, who read the report to The Washington Post.
According to the report, hackers apparently broke into a software company?s database and retrieved user names and passwords of various control systems that run water plant computer equipment. Using that data, they were able to hack into the plant in Illinois, Weiss said.
It?s not the first time that two-step technique ? hack a security firm to gain the keys to enter other companies or entities ? has been used.
Earlier this year, hackers believed to be working from China stole sensitive data from RSA, a division of EMC that provides secure remote computer access to government agencies, defense contractors and other commercial companies around the world. Armed with that data, they breached the computer networks of companies, including Lockheed Martin, whose employees used RSA ?tokens? to log in to the corporate system from outside the office. Lockheed said that no sensitive data were taken.
?RSA is the gold standard? for remote access security in industry, said Gen. Keith Alexander, head of U.S. Cyber Command and director of the National Security Agency, at a conference in Omaha this week. ?If they got hacked, where does that leave the rest??
Alexander noted his concern about ?destructive? attacks on critical systems in the United States.
According to the fusion center report obtained by Weiss, the network intrusion of the software company ?is the same method of attack recently used against a Massachusetts Institute of Technology server? used to ?aid and initiate an attack on other Websites.?
For Weiss, though, the incident has significance. ?It was tracked to Russia. It has been in the system for at least two to three months. It has caused damage. We don?t know how many other utilities are currently compromised.?
Senior U.S. officials, including Alexander, have recently raised warnings about the risk of cyber attacks on critical infrastructure. Questions persist about the readiness and capabilities of DHS to respond to a major attack, and the scope of authority of the U.S. military, which has the greatest cyber operational capabilities, to respond.
Logged
"A GREAT CONTRADICTION IS THE BELIEF IN STATES RIGHTS WHILE NOT SUPPORTING THE RIGHTS OF THE INDIVIDUAL." - Me
Han shot first!