Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Jimbo101

(776 posts)
Sun Jul 9, 2017, 11:18 AM Jul 2017

FBI-DHS amber alert warns energy industry of attacks on nuke plant operators

ARS Technica

The Department of Homeland Security and FBI have issued a joint report providing details of malware attacks targeting employees of companies that operate nuclear power plants in the US, including the Wolf Creek Nuclear Operating Corporation, The New York Times reports. The attacks have been taking place since May, as detailed in the report issued by federal officials last week and sent out to industry.

The "amber" alert to industry—the second-highest level of severity for these types of reports from the FBI and DHS—noted that the attacks had been focused on employees' personal computers but had not managed to jump to control systems. Administrative computers and reactor control systems in most cases are operated separately, and the control networks are generally "air-gapped"—kept disconnected from networks that attach to the Internet.

There is no evidence that information on plant operations was exposed. FBI and DHS analysts have not been able to determine the nature of the malware planted by the attempted hacks, which used a "spear-phishing" campaign targeting senior industrial control engineers at nuclear facilities. The tailored e-mails contained fake résumés and appeared to be from people seeking control engineering jobs, according to the report seen by the Times.

While nuclear power plant industrial controls are "air-gapped," that doesn't necessarily mean that they are secure. A 2015 study by the British think-tank Chatham House found nuclear control systems to be "insecure by design" and vulnerable to attack. Some did not keep control systems isolated from administrative networks connected to the Internet, and others were vulnerable despite air-gaps because of the heavy use of USB thumb drives to move data and install software updates. Many of these systems run on older operating systems that are not regularly updated.

8 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies

The Velveteen Ocelot

(115,856 posts)
2. It wasn't the Russians, though, because Putin says they don't do that.
Sun Jul 9, 2017, 11:24 AM
Jul 2017

And we should be credulous dupes like our Dear Leader.

MineralMan

(146,331 posts)
4. Sample Phishing Email Sent to Technical Staff of Nuclear Plants?
Sun Jul 9, 2017, 11:26 AM
Jul 2017

To: Bill Johnson
From: Deparmant of Homland Securety

Subject: Limited Sistem Acess: Warning of Securety Breech!

Mr. Johnson:
This mails is to inform you that your acess to account is been limted. This is because security breech. You are to Click Here to verify your name and pasword immeditaly. You must verify or lost acess to logins.

Sinserely,

Yuri Vasilov
Technicle Analist
Depament Homland Securety

Achilleaze

(15,543 posts)
5. republican BFF russia is up to this evil shit
Sun Jul 9, 2017, 11:42 AM
Jul 2017

and freaking republicans will not lift a finger to defend America.

Bluepinky

(2,276 posts)
6. They want to see a nuclear meltdown like Chernobyl.
Sun Jul 9, 2017, 12:02 PM
Jul 2017

Then Trump can use the disaster to impose martial law and the coup will be complete. We will be a tool for Russia.

Igel

(35,358 posts)
8. This kind of thing's been happening for years.
Sun Jul 9, 2017, 01:55 PM
Jul 2017

Sadly, a lot of people only noticed it recently, and they often still get it wrong. There's a higher purpose now--it's not security, it's politics. It really is sad--Stuxnet showed exactly how vulnerable things were and most people were busy trying to blame others instead of worrying about fixing the problem. Again, it's about political power and validation and pride for many, not security and the common good. And that's sad.

Some stuff was done before 1/2017, but what government can do is both limited and unclear--the fact it's been going on for years means Bush II and Obama didn't succeed in hardening what they needed to. It's like transportation security--the entire system is built to be open, which we say is a great thing; but for good security, you have to distrust everybody and have a closed system. It's easy to rant "government should do something", and in specific cases it can and has done things. (10-15 years ago a lot more power control systems had access to the Internet. Now we have "smart homes" and hear about how great they are; smart cars, too. Wait until the first virus hits and all the naifs ignoring the risk they pose say, "Government must do something." It's like (R) that want low taxes and high benefits. Cause and effect aren't being learned in elementary school any more.)

Anyway, Russia, China, N. Korea have been doing this for years. Sometimes as state actors, very often it's their private "patriots" at work--and sometimes you can't find daylight between the two groups, esp. in China and Russia.

But it's not always those. There are anarchist and revolutionary hacker groups out there, other countries with at least some computer savvy that don't like the US. Often the hackers want money more than subversion; sometimes they want both $ and jollies.

The air gap is nice. But if you know enough about the control systems you can probably get malware built for it and try to get it on USB drives. They found a serious USB security flaw a year or two ago--a way to clear out some hidden memory reserved for the USB on-board op system and get very small malware that can be passed to any computer the drive's plugged into.

Problem isn't so much the system, it's the wetware that uses the system. Just as the DNC hack was hacked only because fools took the clickbait, and nothing was done because the IT security guy at the DNC didn't bother to follow up properly, so security can be lax or circumvented by employees. I worked for a while in an office that had two Internet computers and the rest weren't networked at all. They'd just recently gotten some new computers. They'd done something to the USB ports on the back, but there was one on the front. The security guy didn't notice that there was panel that opened and an additional USB port was there. I'd been using it, because they saw no reason to tell me not to--all the USB ports were supposed to be disabled, so it would be like having a floppy disk around a computer with no floppy drive. The IT guy was not happy, and the next day the ports were disabled.

Latest Discussions»General Discussion»FBI-DHS amber alert warns...