Black Hat: Hack of mock oil rigs showcases potential for real-world "catastrophe"

Share this article:

Researchers at the recently concluded Black Hat conference demonstrated how vulnerable supervisory control and data acquisition (SCADA) systems could be successfully targeted to trigger a “catastrophic failure.”

These systems relay important communications to industrial equipment, like oil pumps. But, Brian Meixell and Erick Forner, researchers at Cimation, a Houston-based firm specializing in tech solutions for the energy sector, used a mock oil tank to demonstrate to Black Hat attendees how programmable logic controllers (PLCs) can be manipulated to display incorrect temperature or oil level readings to equipment operators.

According to the duo, an attacker could easily spoof communications to integral devices in SCADA networks by exploiting the inadequate security of the Modbus/TCP protocol, which was developed in the 1970s to help manage communications between SCADA systems and devices, like PLCs, for industrial processes.

During their talk on Thursday, Forner told attendees that an attacker “could cause a complete environmental catastrophe” by targeting the Modbus protocol as it relays important operations data.

The hack required no vulnerability in Modbus – the researchers merely sent packets over the network by remotely inputting Python scripts [a programming language] to execute malicious commands.

During the demo, attendees watched as liquid rushed into the mock oil pump, offering a sobering illustration of how real attackers could create a similar scenario in an actual industrial environment.

“You can see what could happen,” Forner said. “It's just a demo, but it's a real threat."

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Information sharing requires breaking down barriers, White House cyber guru says

Information sharing requires breaking down barriers, White House ...

The White House has advanced an agenda to promote and facilitate information sharing on security threats and vulnerabilities.

Worm variant of Android ransomware, Koler, spreads via SMS

Worm variant of Android ransomware, Koler, spreads via ...

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Patch for Windows flaw can be bypassed, prompts temporary fix from Microsoft

Patch for Windows flaw can be bypassed, prompts ...

The Windows zero-day received a patch last week, but the fix can still be bypassed by crafty attackers.