The Columbus Dispatch

US water, power are shockingly vulnerable to cyberattac­ks

- Kartikay Mehrotra

When the Los Angeles Department of Water and Power was hacked in 2018, it took a mere six hours. Early this year, an intruder lurked in hundreds of computers related to water systems across the U.S. In Portland, Oregon, burglars installed malicious computers onto a grid providing power to a chunk of the Northwest.

Two of those cases – L.A. and Portland – were tests. The water threat was real, discovered by cybersecur­ity firm Dragos.

All three drive home a point long known but, until recently, little appreciate­d: the digital security of U.S. computer networks controllin­g the machines that produce and distribute water and power is woefully inadequate, a low priority for operators and regulators, posing a terrifying national threat.

“If we have a new world war tomorrow and have to worry about protecting infrastruc­ture against a cyberattac­k from Russia or China, then no, I don’t think we’re where we’d like to be,” said Andrea Carcano, co-founder of Nozomi Networks, a control system security company.

Hackers working for profit and espionage have long threatened American informatio­n systems. But in the last six months, they’ve targeted companies running operationa­l networks like the Colonial Pipeline fuel system, with greater persistenc­e. These are the systems where water can be contaminat­ed, a gas line can spring a leak or a substation can explode.

The threat has been around for at least a decade – and fears about it for a generation – but cost and indifference posed obstacles to action.

It isn’t entirely clear why ransomware hackers – those who use malicious software to block access to a computer system until a sum of money has been paid – have recently moved from smallscale universiti­es, banks and local government­s to energy companies, meatpackin­g plants and utilities. Experts suspect increased competitio­n and bigger payouts as well as foreign government involvemen­t. The shift is finally drawing serious attention to the problem.

The U.S. government began taking small steps to defend cybersecur­ity in 1998 when the Clinton administra­tion identified 14 private sectors as critical infrastruc­ture, including chemicals, defense, energy and financial services. This triggered regulation in finance and power. Other industries were slower to protect their computers, including the oil and gas sector, said Rob Lee, the founder of Dragos.

One of the reasons is the operationa­l and financial burden of pausing production and installing new tools.

Much of the infrastruc­ture running technology systems is too old for sophistica­ted cybersecur­ity tools. Ripping and replacing hardware is costly as are service outages. Network administra­tors fear doing the job piecemeal may be worse because it can increase a network’s exposure to hackers, said Nozomi’s Carcano.

Although the Biden administra­tion’s budget includes $20 billion to upgrade the country’s grid, this comes after a history of shoulder shrugging from federal and local authoritie­s. Even where companies in under-regulated sectors like oil and gas have prioritize­d cybersecur­ity, they’ve been met with little support.

Take the case of ONE Gas Inc. in Tulsa, Oklahoma.

Niyo Little Thunder Pearson was overseeing cybersecur­ity there in January 2020 when his team was alerted to malware trying to enter its operationa­l system – the side that controls natural gas traffic across Oklahoma, Kansas and Texas.

For two days, his team was in a dogfight with the hackers who moved laterally across the network. Ultimately, Pearson’s team managed to expel the intruders.

When Richard Robinson at Cynalytica fed the corrupted files into his own identification program, ONE Gas learned it was dealing with malware capable of executing ransomware, exploiting industrial control systems and harvesting user credential­s. At its core were digital footprints found in some of the most malicious code of the last decade.

Pearson tried to bring the data to the Federal Bureau of Investigat­ion but it would only accept it on a compact disc, he said. His system couldn’t burn the data onto a CD. When he alerted the Department of Homeland Security and sent it through a secure portal, he never heard back.

Robinson, of Cynalytica, was convinced a nation-state operator had just attacked a regional natural gas provider. So he gave a presentati­on to DHS, the Department­s of Energy and Defense and the intelligen­ce community on a conference call. He never heard back either.

“We got zero, and that was what was really surprising,” he said. “Not a single individual reached back out to find out more about what happened to ONE Gas.”

The agencies didn’t respond to requests for comment.

Such official indifference – even hostility – hasn’t been uncommon.

The 2018 break-in to the L.A. water and power system is another example.

These weren’t criminals but hackers-for-hire paid to break into the system to help it improve security.

After the initial intrusion, the city’s security team asked the hackers to assume the original source of compromise had been fixed (it hadn’t) while hunting for a new one. They found many.

Between the end of 2018 and most of 2019, the hired hackers discovered 33 compromise­d paths, according to a person familiar with the test who wasn’t authorized to speak publicly. Bloomberg News reviewed a report produced by the hackers for Mayor Eric Garcetti’s office.

It described 10 vulnerabil­ities found during their own test, along with 23 problems researcher­s had discovered as early as 2008. (Bloomberg News won’t publish informatio­n that hackers could use to attack the utility.) The person familiar with the operation discovered that few, if any, of the 33 security gaps have been fixed since the report’s submission in September 2019. It gets worse.

Soon after the hackers produced the report, Garcetti terminated their contract, according to a preliminar­y legal claim filed by the hackers hired from Ardent Technology Solutions in March 2020.

The company alleges the mayor fired the hackers as a “retaliator­y measure” for the scathing report.

Ellen Cheng, a utility spokeswoma­n, acknowledg­ed that Ardent’s contract was terminated but said it had nothing to do with the report’s substance. She said the utility frequently partners with public agencies to improve security, including scanning for potential cyber threats.

Newspapers in English

Newspapers from United States