Detroit TAC

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, November 21, 2011

Hackers 'hit' US water treatment systems

Posted on 7:00 AM by Unknown

Hackers are alleged to have destroyed a pump used to pipe water to thousands of homes in a US city in Illinois.
Hackers with access to the utility's network are thought to have broken the pump by turning it on and off quickly.
The FBI and Department for Homeland Security (DHS) are investigating the incident as details emerge of what could be a separate second attack.
Experts said the news revealed a growing interest in critical infrastructure by cyber criminals.
Information about the 8 November incident came to light via the blog of Joe Weiss who advises utilities on how to protect hardware against attack.
Mr Weiss quoted from a short report by the Illinois Statewide Terrorism and Intelligence Center which said hackers obtained access using stolen login names and passwords. These were taken from a company which writes control software for industrial systems.
The net address through which the attack was carried out was traced to Russia, according to Mr Weiss. The report said "glitches" in the remote access system for the pump had been noticed for months before the burn out, said Mr Weiss.
Peter Boogaard, A spokesman for the DHS, said it was gathering facts about the incident.
"At this time there is no credible corroborated data that indicates a risk to critical infrastructure entities or a threat to public safety," he said.
Industrial action The comments by the DHS prompted a hacker using the handle "pr0f" to claim he had access to the control systems for a second US water utility.
He posted a document to the Pastebin website which purportedly contained links to screenshots of the internal control systems for a waste water treatment plant in South Houston.
The hacker's claims about their ability to penetrate the control systems have yet to be confirmed or denied by South Houston's Water and Sewer Department.
In an interview with the Threat Post website, Pr0f said the hack of the South Houston network barely deserved the name because only a three-character password had been used to protect the system.
The attacks are the latest in a series in which different hackers and groups have targeted so called Supervisory Control And Data Acquisition (SCADA) systems. These specialised computer systems are used to control machinery used to filter water, mix chemicals, distribute power and route trains and trams.
One of the best known SCADA attacks involved the Stuxnet worm which caused problems for Iran.
There were reports that the malware crippled centrifuges used in the nation's uranium enrichment program. Iran denied the claims saying that it had caught the worm before it reached its intended target.
Earlier this year, security researchers who investigated ways to attack SCADA systems were persuaded to cancel a public talk about their findings because of the "serious physical, financial impact these issues could have on a worldwide basis".
Lani Kass, a former advisor to the US Joint Chiefs of Staff on security issues, said America had to start doing more work to understand attacks on critical infrastructure.
"The going in hypothesis is always that it's just an incident or coincidence," she said. "And if every incident is seen in isolation, it's hard - if not impossible - to discern a pattern or connect the dots."
"Failure to connect the dots led us to be surprised on 9/11," she said.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Tech News Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Rise of the 'maker movement'
    Rise of the 'maker movement' What does 'do-it-yourself' culture mean for the future of development?  ...
  • Quantum Computing Almost Here
    R. Colin Johnson   IBM recently demonstrated the components necessary to build a quantum computer, including superconducting microchips th...
  • How a Baptist pastor in Florida became the go-to IT guy
    NorthRidge Church pastor Terrill Gilley installs security gateways, watches for network attacks By Ellen Messmer   As a Baptist pastor,...
  • When touring the Large Hadron Collider, stay with your group
  • 14 Ways to Take Your IT Career to the Next Level - Network World
    14 Ways to Take Your IT Career to the Next Level - Network World
  • Medical Privacy Secured on Smartphones
    R. Colin Johnson | Anti-cloning encryption technology is being used to secure validated medical data, which can only be accessed by an att...
  • 10 Free Google Chrome Extensions to Increase Your Productivity - Network World
    10 Free Google Chrome Extensions to Increase Your Productivity - Network World
  • The No. 1 place to work in IT: Quicken Loans - Network World
    The No. 1 place to work in IT: Quicken Loans - Network World
  • The ACTEra – WHY YOU SHOULD HAVE BEEN AT THE BDPA 2013 CONFERENCE! | The Aspiring Critical Thinker's Era
    The ACTEra – WHY YOU SHOULD HAVE BEEN AT THE BDPA 2013 CONFERENCE! | The Aspiring Critical Thinker's Era
  • 10 hard-earned lessons of a lifetime in IT - Network World
    10 hard-earned lessons of a lifetime in IT - Network World

Categories

  • Android (1)
  • BDPA (3)
  • BDPA Local Chapter (3)
  • Career Networking (20)
  • Cool Stuff (14)
  • Education Tech (8)
  • Election (1)
  • FoodforThought (32)
  • FreeStuff (2)
  • Funny (2)
  • Green Power (7)
  • Hackerspace (6)
  • Local Tech Events (2)
  • Med Tech News (9)
  • Money (1)
  • MovieTech (1)
  • New Technology (5)
  • Open Source Tech News (7)
  • Personal Achievement (1)
  • personal rant (1)
  • Presidental (2)
  • SocialNetworkTech (1)
  • Space Tech (10)
  • Tech News (35)
  • Tech News Security (12)
  • Tech Tip (5)
  • Tech Tips (1)
  • Tech Toys (2)

Blog Archive

  • ►  2013 (202)
    • ►  September (6)
    • ►  August (21)
    • ►  July (17)
    • ►  June (17)
    • ►  May (26)
    • ►  April (23)
    • ►  March (32)
    • ►  February (28)
    • ►  January (32)
  • ►  2012 (200)
    • ►  December (27)
    • ►  November (31)
    • ►  October (33)
    • ►  September (12)
    • ►  August (14)
    • ►  July (5)
    • ►  June (9)
    • ►  May (13)
    • ►  April (9)
    • ►  March (24)
    • ►  February (10)
    • ►  January (13)
  • ▼  2011 (95)
    • ►  December (10)
    • ▼  November (27)
      • Chattanooga Builds a Smart City
      • Cisco User group meeting
      • NASA launching 'dream machine' to explore Mars
      • Hooray, the supercommittee failed! Commentary: Fa...
      • IT's age problem
      • The Silicon Valley of Shit: Nairobi Is Ground Zero...
      • Compuware Warns Of Mainframe Skills Shortages
      • Digital Cinema Killing 35mm Film
      • Will IT certs get you jobs and raises? Survey says...
      • Innovation Nation:StartUp Success Panel
      • Full disk encryption is too good, says US intellig...
      • Hackers 'hit' US water treatment systems
      • Wordless Friday
      • Smart Pills Transmit After Being Swallowed
      • GPUs, Multicore Processors Drive Up Performance of...
      • Black inventor pioneer Jesse Russell
      • Medical Privacy Secured on Smartphones
      • Motivational Moment
      • If life existed on Mars, rover equipped for the se...
      • Cable cos. to offer $9.95 broadband for poor homes
      • Everist Genomics to Launch CardioDefender, Advance...
      • Pi Baked at Home
      • Free download software, games, about technology an...
      • 9 secrets of getting stuff done in a big company
      • Japanese supercomputer blisters 10 quadrillion cal...
      • Solar-Powered, Wired School Brings Learning to Rur...
      • Motivational Moment
    • ►  October (18)
    • ►  September (11)
    • ►  August (24)
    • ►  July (5)
Powered by Blogger.

About Me

Unknown
View my complete profile