Hackers say cracking power grid tech was easiest challenge yet
By Kristin Houser, Free Think
White hat hackers won $40,000 for cracking a system used by most major industrial companies, including the ones that manage our power grids — and they told MIT Technology Review it was ridiculously easy.
![]() | |
Credit: Zero Day Initiative / Pwn2Own |
The challenge: Industrial control systems — the hardware and software used to control power grids, water treatment facilities, and other critical infrastructure — are an alluring target for cybercriminals.
Because so many people rely on this infrastructure, hackers can ask for and receive large ransoms in exchange for ending an attack. Those motivated by politics, meanwhile, can weaken an enemy by disrupting its citizens’ access to electricity or water.
That’s made preventing attacks on industrial control systems a top concern for cybersecurity experts.
“As the destruction or corruption of these control systems could cause grave harm, ensuring their security and resilience must be a collective effort that taps into the innovation, expertise, and ingenuity of the [industrial control systems] community,” said Jen Easterly, director of the US’s Cybersecurity and Infrastructure Security Agency.
White hats: One way to protect industrial control systems (and other tech) from hackers is by holding contests in which “white hat” hackers try to break into the systems in exchange for prizes.
Any vulnerabilities that are exposed during the contests can then be fixed before cybercriminals exploit them.
One of these contests — Pwn2Own Miami 2022 — just took place April 19-21, and the results aren’t exactly encouraging for those of us who like reliable electricity and water: nearly every industrial control system targeted during the contest was hacked.
Low-hanging fruit: Dutch researchers Daan Keuper and Thijs Alkemade took home the biggest prize of the event — $40,000 — for hacking OPC UA, a communications protocol commonly used by industrial companies.
“OPC UA is used everywhere in the industrial world as a connector between systems,” Keuper told MIT Tech Review. “It’s such a central component of typical industrial networks, and we can bypass authentication normally required to read or change anything.”
Keuper said he and Alkemade needed “just a couple of days” to figure out their hack of the industrial control system — for comparison, Keuper spent three weeks working with a partner to hack an iPhone 4S in 2012.
“In industrial control systems, there is still so much low-hanging fruit,” Keuper said. “The security is lagging behind badly.”
Comments
Post a Comment