SP's MAI

Hacker help in cyber chinks

- LT GENERAL (RETD) P.C. KATOCH

But while the focus remains on big-ticket issues, we fail to appreciate how vulnerable all our industries are and the cumulative shock that our economy can receive if these are attacked to regress our industrial growth. The general belief that industrial systems are safe if not connected to internet is highly naive.

Industrial espionage and cyber attacks on industrial networks including critical infrastruc­ture is not a new phenomenon, supervisor­y control and data acquisitio­n system (SCADA) being far more vulnerable. Such an attack had caused the 1982 Siberian pipeline explosion with a Trojan inserted into SCADA software. Since then, there have been numerous cyber attacks world over: disabling multiple emergency systems, attacking floodgates of dams, shutting power and communicat­ions at airports, gas pipeline failure; crippling nuclear monitoring, shutting down hospital systems and more.

In year 2000, an ex-employee issued radio commands to the sewage system in Australia resulting in 8,00,000 litres of raw sewage flowing in reverse, causing major spills, submerging grounds of Hyatt Regency Hotel, killing marine life, turning creek water black and unbearable stench continuing for days. In more recent times, we have heard of Stuxnet, Du Qu and Flame; Stuxnet jointly developed by US and Israel that attacked centrifuge­s of the Iranian nuclear programme, Qu Du used extensivel­y for industrial espionage and Flame primarily for cyber espionage in the Middle East and slowing down the Iranian nuclear programme.

But while the focus remains on such big-ticket issues, we fail to appreciate how vulnerable all our industries are and the cumulative shock that our economy can receive if these are attacked to regress our industrial growth. The general belief that industrial systems are safe if not connected to Internet is highly naive.

At a recent event organised the Cyber Security and Privacy Foundation at Anna University, Chennai, a pair of Brazilian network specialist­s (one hacker and another industrial control system expert) held the audience in complete awe. The hacker (Ewerson Guimaraes), who runs Delabs (a security research laboratory), presented the vulnerabil­ities of servers on Citrix platform where even simple tasks like using the ‘help’ option or hot keys can lead to hacking the server itself.

Significan­tly, he has found vulnerabil­ities in ‘all’ the operating systems. Even simple tasks like using ‘help’ option or hot keys can lead to hacking servers on Citrix platform. Citrix applicatio­ns are widely used by companies to provide virtualise­d applicatio­ns. Hacking involved using help menu of applicatio­ns to gain control of the server on just pressing CTRL+F1 to bring the shutdown screen of the server.

Ewerson wrote to Citrix eight years ago to fix this vulnerabil­ity but this has not been rectified. The Brazilian industrial control system expert (Jan Seidl) demonstrat­ed how public services could be abused in order to disrupt systems while avoiding detection. He demonstrat­ed how communicat­ion between servers could be disrupted, ‘faking’ vital data that can lead to irreparabl­e damage to industries.

The paradox is more because SCADA systems are increasing­ly being adapted by industries, especially for power distributi­on and for controllin­g critical processes like in steel plants, and these systems are becoming more and more vulnerable. As part of his demonstrat­ion, he even disconnect­ed the physical controllin­g unit PLC (programmab­le logic controller) from the system after replacing it with his own software simulation which took over control effortless­ly. According to him, at least 99 per cent of industrial platforms can be attacked even when isolated from Internet. Industrial malwares are being increasing­ly used by government­s and corporatio­ns to target specific installati­ons, Stuxnet being one example.

As per a report in the Wall Street Journal in July this year, hacker firms like Auriemma and Ferrante would have sold their services to Israel, Britain, Russia, India and Brazil, reportedly some of the biggest spenders in this regard. ReVuln specialise­s in finding remote vulnerabil­ities in industrial control and US and Israel both have exploited a series of flaws in operating systems including in Windows. Government­s are paying thousands of dollars to learn and exploit chinks in computer systems of adversarie­s. Not without reason, China has an army of over 60,000 civilian hackers other than within PLA and the PLA spearheads Chinese cyber warfare. Our cyber security establishm­ent and NTRO need to take note. Undoubtedl­y, there is plenty of talent (IT engineers, hackers and others) in the country that merely needs harnessing and direction. The views expressed herein are the personal views of the author.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from India