Detroit TAC

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, November 21, 2011

Hackers 'hit' US water treatment systems

Posted on 7:00 AM by Unknown

Hackers are alleged to have destroyed a pump used to pipe water to thousands of homes in a US city in Illinois.
Hackers with access to the utility's network are thought to have broken the pump by turning it on and off quickly.
The FBI and Department for Homeland Security (DHS) are investigating the incident as details emerge of what could be a separate second attack.
Experts said the news revealed a growing interest in critical infrastructure by cyber criminals.
Information about the 8 November incident came to light via the blog of Joe Weiss who advises utilities on how to protect hardware against attack.
Mr Weiss quoted from a short report by the Illinois Statewide Terrorism and Intelligence Center which said hackers obtained access using stolen login names and passwords. These were taken from a company which writes control software for industrial systems.
The net address through which the attack was carried out was traced to Russia, according to Mr Weiss. The report said "glitches" in the remote access system for the pump had been noticed for months before the burn out, said Mr Weiss.
Peter Boogaard, A spokesman for the DHS, said it was gathering facts about the incident.
"At this time there is no credible corroborated data that indicates a risk to critical infrastructure entities or a threat to public safety," he said.
Industrial action The comments by the DHS prompted a hacker using the handle "pr0f" to claim he had access to the control systems for a second US water utility.
He posted a document to the Pastebin website which purportedly contained links to screenshots of the internal control systems for a waste water treatment plant in South Houston.
The hacker's claims about their ability to penetrate the control systems have yet to be confirmed or denied by South Houston's Water and Sewer Department.
In an interview with the Threat Post website, Pr0f said the hack of the South Houston network barely deserved the name because only a three-character password had been used to protect the system.
The attacks are the latest in a series in which different hackers and groups have targeted so called Supervisory Control And Data Acquisition (SCADA) systems. These specialised computer systems are used to control machinery used to filter water, mix chemicals, distribute power and route trains and trams.
One of the best known SCADA attacks involved the Stuxnet worm which caused problems for Iran.
There were reports that the malware crippled centrifuges used in the nation's uranium enrichment program. Iran denied the claims saying that it had caught the worm before it reached its intended target.
Earlier this year, security researchers who investigated ways to attack SCADA systems were persuaded to cancel a public talk about their findings because of the "serious physical, financial impact these issues could have on a worldwide basis".
Lani Kass, a former advisor to the US Joint Chiefs of Staff on security issues, said America had to start doing more work to understand attacks on critical infrastructure.
"The going in hypothesis is always that it's just an incident or coincidence," she said. "And if every incident is seen in isolation, it's hard - if not impossible - to discern a pattern or connect the dots."
"Failure to connect the dots led us to be surprised on 9/11," she said.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Tech News Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • When touring the Large Hadron Collider, stay with your group
  • Hooray, the supercommittee failed! Commentary: Failure no help, but greater harm averted
    By Darrell Delamaide  — The supercommittee to cut the deficit was a bad idea, and its failure is a good thing for America. Pundits are...
  • Quantum Computing Almost Here
    R. Colin Johnson   IBM recently demonstrated the components necessary to build a quantum computer, including superconducting microchips th...
  • Wet Electronics Open Door to New Possibilities
    R. Colin Johnson Gadgets, gizmos and wireless wonders must be fastidiously protected from moisture today, but researchers using circuitry w...
  • 2012 Salary and Skills report
    http://www.techrepublic.com/blog/career/infographic-2012-salary-and-skills-report/4545?tag=nl.e101
  • Medical Privacy Secured on Smartphones
    R. Colin Johnson | Anti-cloning encryption technology is being used to secure validated medical data, which can only be accessed by an att...
  • Entry-level IT jobs will be plentiful in 2012, experts predict
    Help desk, app development, analytics among the hottest prospects for college grads By Carolyn Duffy Marsan Here is good news for coll...
  • Rise of the 'maker movement'
    Rise of the 'maker movement' What does 'do-it-yourself' culture mean for the future of development?  ...
  • (no title)
    Toy Dept.: Parrot AR.Drone 2.0 Visits WWJ Reporting Matt Roush SOUTHFIELD — It’s hard to believe that a four-bladed toy helicopter with onb...
  • Melissa Harris-Perry: World wide web access to local communities
    Melissa Harris-Perry: World wide web access to local communities : 'via Blog this' Visit NBCNews.com for breaking news , world news ...

Categories

  • Android (1)
  • BDPA (3)
  • BDPA Local Chapter (3)
  • Career Networking (20)
  • Cool Stuff (14)
  • Education Tech (8)
  • Election (1)
  • FoodforThought (32)
  • FreeStuff (2)
  • Funny (2)
  • Green Power (7)
  • Hackerspace (6)
  • Local Tech Events (2)
  • Med Tech News (9)
  • Money (1)
  • MovieTech (1)
  • New Technology (5)
  • Open Source Tech News (7)
  • Personal Achievement (1)
  • personal rant (1)
  • Presidental (2)
  • SocialNetworkTech (1)
  • Space Tech (10)
  • Tech News (35)
  • Tech News Security (12)
  • Tech Tip (5)
  • Tech Tips (1)
  • Tech Toys (2)

Blog Archive

  • ►  2013 (202)
    • ►  September (6)
    • ►  August (21)
    • ►  July (17)
    • ►  June (17)
    • ►  May (26)
    • ►  April (23)
    • ►  March (32)
    • ►  February (28)
    • ►  January (32)
  • ►  2012 (200)
    • ►  December (27)
    • ►  November (31)
    • ►  October (33)
    • ►  September (12)
    • ►  August (14)
    • ►  July (5)
    • ►  June (9)
    • ►  May (13)
    • ►  April (9)
    • ►  March (24)
    • ►  February (10)
    • ►  January (13)
  • ▼  2011 (95)
    • ►  December (10)
    • ▼  November (27)
      • Chattanooga Builds a Smart City
      • Cisco User group meeting
      • NASA launching 'dream machine' to explore Mars
      • Hooray, the supercommittee failed! Commentary: Fa...
      • IT's age problem
      • The Silicon Valley of Shit: Nairobi Is Ground Zero...
      • Compuware Warns Of Mainframe Skills Shortages
      • Digital Cinema Killing 35mm Film
      • Will IT certs get you jobs and raises? Survey says...
      • Innovation Nation:StartUp Success Panel
      • Full disk encryption is too good, says US intellig...
      • Hackers 'hit' US water treatment systems
      • Wordless Friday
      • Smart Pills Transmit After Being Swallowed
      • GPUs, Multicore Processors Drive Up Performance of...
      • Black inventor pioneer Jesse Russell
      • Medical Privacy Secured on Smartphones
      • Motivational Moment
      • If life existed on Mars, rover equipped for the se...
      • Cable cos. to offer $9.95 broadband for poor homes
      • Everist Genomics to Launch CardioDefender, Advance...
      • Pi Baked at Home
      • Free download software, games, about technology an...
      • 9 secrets of getting stuff done in a big company
      • Japanese supercomputer blisters 10 quadrillion cal...
      • Solar-Powered, Wired School Brings Learning to Rur...
      • Motivational Moment
    • ►  October (18)
    • ►  September (11)
    • ►  August (24)
    • ►  July (5)
Powered by Blogger.

About Me

Unknown
View my complete profile