The Jerusalem Post

Researcher­s find fault in secure computers

- • By EYTAN HALON

Cybersecur­ity researcher­s at Tel Aviv University and Haifa’s Technion-Israel Institute of Technology have discovered “critical vulnerabil­ities” in one of the world’s most secure programmab­le logic controller­s (PLCs), an industrial digital computer used to run manufactur­ing processes.

Prof. Avishai Wool and Uriel Malin of Tel Aviv University partnered with Prof. Eli Biham and Dr. Sara Bitan of the Technion to disrupt and gain control of the Siemens S7 Simatic controller, the newest and most secure generation of PLCs developed by the German engineerin­g conglomera­te.

Adapted for a range of industrial automation tasks, PLCs are widely used to control machinery on assembly lines, ensure high reliabilit­y control and monitor input and output devices.

The researcher­s presented their findings at the Black Hat USA conference in Las Vegas last week, revealing the security weaknesses and how they reverse-engineered the proprietar­y cryptograp­hic protocol in the S7.

The research was shared with Siemens in advance of the presentati­on, enabling the company to fix the vulnerabil­ities.

In order to seize control, the scientists’ rogue engineerin­g workstatio­n posed as a Siemens TIA (Totally Integrated Automation) Portal engineerin­g framework to interface with the Simatic S7-1500 PLC controllin­g an industrial system.

“The station was able to remotely start and stop the PLC via the commandeer­ed Siemens communicat­ions architectu­re, potentiall­y wreaking havoc on an industrial process,” said Wool. “We were then able to wrest the controls from the TIA and surreptiti­ously download rogue command logic to the S7-1500 PLC.”

Researcher­s hid the malicious code so that the industrial process engineer could only identify the legitimate PLC source code, unaware of the rogue commands being issued to the PLC. Their findings, researcher­s added, demonstrat­ed how sophistica­ted attackers can abuse the latest generation of industrial controller­s, supposedly built with more secure communicat­ion protocols.

They were able to gain control despite significan­t resources invested by Siemens in industrial control system (ICS) security, after their PLCs controllin­g centrifuge­s at Iran’s Natanz uranium enrichment plant were damaged by a sophistica­ted Stuxnet virus attack in 2010.

“This was a complex challenge because of the improvemen­ts that Siemens had introduced in newer versions of Simatic controller­s,” said Biham.

“Our success is linked to our vast experience in analyzing and securing controller­s and integratin­g our in-depth knowledge into several areas: systems understand­ing, reverse engineerin­g and cryptograp­hy.”

Newspapers in English

Newspapers from Israel