Cyber-attackers recently accessed the critical infrastructure of three cities in the United States by compromising the industrial control systems, a federal law enforcement official said at a security conference.
Unknown perpetrators had compromised the supervisory control and data acquisitions (Scada) systems monitoring infrastructure in three US cities and could have done a lot of damage, Michael Welch, the deputy assistant director of the Federal Bureau of Investigation’s Cyber Division, told attendees at the Flemings Cyber-Security conference in London on 29 November.
The attacks were a “tease” to law enforcement and city officials saying: “I’m here, what are you going to do about it,” Welch said, according to a report by Information Age.
Welch did not clarify his remarks as to whether these incidents included the recent reports of an attack that damaged a water pump at a water facility in Springfield, Illinois, which the US Department of Homeland Security (DHS) later denied, or the breach at a South Houston, Texas, water utility.
“We just had a circumstance where we had three cities, one of them a major city within the US, where you had several hackers that had made their way into Scada systems within the city,” Welch said.
The attackers had control of the city’s systems and could have performed a variety of malicious activities, such as dumping raw sewage into the lake and shutting down a power plant at a mall, according to Welch.
The biggest problem facing municipal utilities is that they “underestimate the reality” of cyber-security threats and their relative vulnerability, Patrick Miller, CEO of EnergySec, told eWEEK. EnergySec is a non-profit organisation devoted to helping energy sector organisations secure critical technology infrastructure and is supported by the Department of Energy. The utilities think they are too small to be a target, or think they do not have anything of value to a hacker, terrorist or an organised crime ring, according to Miller.
“The assumption is wrong in so many ways” because these smaller utilities are often connected to larger infrastructures and networks, Miller said.
While the threat facing cities through attacks on Scada systems “has been somewhat exaggerated“, the threat is very real and the vulnerabilities have been “underestimated”, according to Miller. “Realistically, cities should already be on high alert for Scada attacks,” said Miller.
Utilities often operate an “aging infrastructure” that has been extended beyond its lifespan and often have insufficient staff to manage, according to Miller. Getting funding for new hires or upgrading equipment is a challenge because many utilities have elected officials, and “few elected officials are willing to spend money on equipment and staff that aren’t directly tied to getting or maintaining future votes”, Miller said.
It was possible that this was a way of “confirming the breaches without providing the classified information”, Miller said.
Miller said theSpringfield,Ill.incident highlighted the importance of proper forensics and clear communication. The utility should have investigated the incident thoroughly and theIllinoisFusionCentre, who issued the report claiming the cyber-attack on the Scada system should have indicated the report was still “unconfirmed” or in “preliminary” stages, he said. DHS should also have issued something immediately to indicate the report was still inconclusive.
Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant
No skynet please. After the US, UK and France pledge human only control of nuclear…
Microsoft's AI investments continue in south east Asia, after investments in Japan, Malaysia, Indonesia, as…
New chapter for LastPass as it becomes an independent company to focus on cybersecurity, after…
US FCC seeks to ban Chinese telecom firms at centre of national security concerns from…
Two updates to Anthropic's AI chatbot Claude sees arrival of a new business-focused plan, as…