Incidenti di Cyber Security Industriale riferiti ad Infrastrutture
by user
Comments
Transcript
Incidenti di Cyber Security Industriale riferiti ad Infrastrutture
Incidenti di Cyber Security Industriale riferiti ad Infrastrutture (aggiornato ad Agosto 2009) a cura di Enzo M. Tieghi (membro AIIC – Associazione Italiana Esperti in Infrastrutture Critiche – www.infrastrutturecritiche.it ) La storia degli incidenti informatici accaduti a reti e sistemi utilizzati in impianti industriali ed infrastrutture è abbastanza recente, i primi incidenti risalgono alla prima metà degli anni ’90, ed il numero di eventi è limitato per diversi motivi, sicuramente non per la mancanza di rischi dati da vulnerabilità e minacce informatiche. Gli incidenti squisitamente “cyber” sono difficili da identificare se non si hanno strumenti di log ed analisi, che sono presenti ed utilizzati su molte reti IT e sono raramente utilizzati in reti e sistemi di fabbrica. Molti incidenti, soprattutto quelli relativi a interruzioni del funzionamento e/o DOS (Denial of Service) spesso vengono quindi addebitati a “malfunzionamenti generici” e sono complessi da riprodurre: solo dopo attente valutazioni si riesce a risalire a problemi ed eventi avversi relativi ad hardware e/o software. Come per molti incidenti informatici, raramente ci sono evidenze e testimonianze dirette da parte delle aziende e degli utenti per motivi di riserbo e per evidenti ragioni di non mettere a conoscenza clienti, competitor o altri enti di eventuali informazioni o problemi interni all’azienda che oltre al danno causato ne potrebbero in definitiva pregiudicare la reputazione. Quelli qui di seguito riportati sono una serie di incidenti noti e soprattutto documentati, raccolti nel tempo: non è sicuramente un elenco completo ed esaustivo. E’ una lista di eventi abbastanza composita e soprattutto indicativa in quanto ogni singolo incidente è facilmente generalizzabile anche in altri contesti. Il fatto che venga citata la fonte e siano presenti riferimenti e documentazione è importante in quanto spesso in questo campo ci si imbatte nei cosiddetti “hoax” (secondo Wikipedia, bufala: indica un tentativo di ingannare un pubblico presentando deliberatamente per reale qualcosa di falso o artefatto), fatti spesso tramandati via rete ma lontani dalla realtà. La maggior parte degli incidenti citati proviene dagli USA, in quanto vengono resi pubblici molto più correntemente che in altri paesi, inclusi quelli europei ed il nostro. Il progetto di un database degli incidenti informatici relativi alla cybersecurity era partito qualche anno fa presso il BCIT, British Columbia Institute of Technology di Vancouver in Canada, con la sigla ISID (Industrial Security Incidente Database) e curato dal team del professore e ricercatore Eric Byres. Nel 2008 il progetto è passato ad altra organizzazione, denominata RISI The Repository of Industrial Security Incidents, ed è pubblicato e disponibile presso il sito www.securityincidents.org . Alcuni degli incidenti qui riportati provengono dal RISI, altri sono stati raccolti nel tempo con i riferimenti alla rete ed alle fonti citate. Incidenti di Cyber Security Industriale riferiti ad Infrastrutture (aggiornato ad Agosto 2009) Pagina 1 Data: 15/05/1994 Luogo: Arizona, USA Titolo: Salt River Project, Arizona Abstract: A hacker did break into the computers of an Arizona water facility, the Salt River Project in the Phoenix area Riferimenti: http://news.zdnet.co.uk/internet/0,1000000097,2121358,00.htm Data: 17/08/1998 Luogo: N/A, USA Titolo: Computer Flaw Makes Water Undrinkable Abstract: A computer glitch shut down the chlorination system and caused the chlorine content of the city water to drop below the safety threshold, affecting 40,000 residents. Riferimenti: © 2009 The Repository of Industrial Security Incidents #87 www.securityincidents.org Data: 11/01/1999 Luogo: San Diego, CA, USA Titolo: Navy Radar Shuts Down SCADA Systems Abstract: The San Diego County Water Authority (SDCWA) and the San Diego Gas and Electric (SDGE) Companies were unable to remotely actuate critical value openings and closings as a result Riferimenti: Jeff Dagle, "Recent Control System Cyber Incidents" Kema Conference, Denver, April 2003 ‐ Credited to John Latess of Naval Surface Warfare Center, Dahlgren Data: 10/06/1999 Luogo: Bellingham, WA, USA Titolo: Bellingham, Washington Gasoline Pipeline Failure Abstract: The pipeline failure was exacerbated by control systems not able to perform control and monitoring functions Riferimenti: www.ntsb.gov/publictn/2002/PAR0202.pdf http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Bellingham_Case_Study_report%2020Sep071.pdf Data: 13/06/2001 Luogo: California, USA Titolo: Hack raises fears of unsafe energy networks Abstract: An intruder cracked the security of two Web servers at the California Independent Power System Operator (ISO) Riferimenti: http://news.cnet.com/2100-1001-268400.html Incidenti di Cyber Security Industriale riferiti ad Infrastrutture (aggiornato ad Agosto 2009) Pagina 2 Data: 30/01/2002 Luogo: N/A, USA e CA Titolo: Terrorist Interest in Water Supply and SCADA Systems Abstract: The U.S. National Infrastructure Protection Center has issued an Information Bulletin relating terrorist interest in water supply and Supervisory Control And Data Acquisition (SCADA) systems. Riferimenti: http://www.publicsafety.gc.ca/prg/em/ccirc/2002/in02-002-eng.aspx Data: 25/01/2003 Luogo: Oak Harbor, OH, Usa Titolo: Davis-Besse nuclear power plant in Oak Harbor, Ohio Abstract: the Microsoft SQL Server worm known as Slammer infected a private computer network, disabling a safety monitoring system for nearly five hours Riferimenti: http://www.securityfocus.com/news/6767 Data: 14/08/2003 Luogo: East Coast,USA Titolo: SCADA defect contributes to August 2003 US East Coast blackout Abstract: A previously-unknown software flaw in a widely-deployed energy management system contributed to the devastating scope of the August 14th northeastern U.S. blackout Riferimenti: http://www.securityfocus.com/news/8016 Data: 21/08/2003 Luogo: Jacksonville, Florida, USA Titolo: CSX Train Signaling System Abstract: the Sobig computer virus was blamed for shutting down train signaling systems throughout the east coast of the U.S. Riferimenti: http://www.cbsnews.com/stories/2003/08/21/tech/main569418.shtml http://www.informationweek.com/story/showArticle.jhtml?articleID=13100807 Data: 09/09/2003 Luogo: BCIT, Vancouver, BC, CA Titolo: Baseline Audit Causes Water Control System Crash Abstract: Water Control system was performing poorly and database errors were suspected, patches and antivirus were not current. The system crashed while checking. Riferimenti: © 2009 The Repository of Industrial Security Incidents #81 www.securityincidents.org Incidenti di Cyber Security Industriale riferiti ad Infrastrutture (aggiornato ad Agosto 2009) Pagina 3 Data: 04/10/2003 Luogo: UK, Europe Titolo: Proposed Hack of UK Water Systems Abstract: Detailed breakdown of RF systems that are used by water management authorities in the UK and how these systems can be acused, interfered with and generally messed up Riferimenti: http://www.theregister.co.uk/2003/10/20/we_have_your_water_supply/ Data: 19/11/2003 Luogo: N/A, USA Titolo: Foxboro DCS I/A UNIX host contracts worm Abstract: control systems integrator contracted a variant of the sadmin/IIS worm on a DCS Riferimenti: http://www.freelists.org/post/foxboro/foxboro-Our-AW51-Solaris-Got-a-VirusWorm Data: 15/10/2004 Luogo: Victoria, BC, CA Titolo: Trojan Backdoor on Water SCADA System Abstract: During a security audit of the SCADA system, a trojan backdoor was located on a human machine interface (HMI) computer. Riferimenti: Critical Infrastructure Security ‐ Privacy and Security: Synergies in an e‐Society, Victoria, BC, February 11, 2005 Data: 12/02/2005 Luogo: BCIT, Vancouver, BC, CA Titolo: Routine Audit of SCADA Laptop Identifies Virus Abstract: A routine audit of dial in Laptop's was conducted. Staff were reluctant to bring in laptops regularly to allow patches and upgrades. Three virus types were found Riferimenti: © 2009 The Repository of Industrial Security Incidents #80 www.securityincidents.org Data: 07/03/2005 Luogo: Sandia Nat.Lab., USA Titolo: Penetration Testing Incident Abstract: penetration test locked up the SCADA system and the Gas utility was not able to send gas through its pipelines for four hours Riferimenti: http://www.sandia.gov/scada/documents/sand_2005_2846p.pdf Incidenti di Cyber Security Industriale riferiti ad Infrastrutture (aggiornato ad Agosto 2009) Pagina 4 Data: 27/07/2005 Luogo: Big Lake, Alberta, CA Titolo: Spill Dumps a Million Litres of Sewage Into Riparian Area Abstract: Sewage being pumped had escaped from a hole in the sewage line running along the south shore of the lake. It is not manned but does have a SCADA (Supervisory Control and Data Acquisition) system that enables remote monitoring Riferimenti: http://www.bless.ab.ca/Documents/2005SewageSpill.html Data: 05/09/2005 Luogo: N/A, USA Titolo: Attempted Cover‐Up of Sewage Spillage Abstract: A pump station inlet control valve after being routinely serviced failed normal operation and closed partially after service personnel left site. The valve opening was subsequently blocked by a large piece of wood and cloth like material Riferimenti: http© 2009 The Repository of Industrial Security Incidents #116 www.securityincidents.org Data: 14/12/2005 Luogo: Lesterville, Missouri, USA Titolo: Taum Sauk Water Storage Dam Failure Abstract: the reservoir's berm was overtopped when the routine nightly pump-back operation failed to cease when the reservoir was filled. Riferimenti: http://en.wikipedia.org/wiki/Taum_Sauk_Dam_Failure http://washingtontechnology.com/articles/2008/04/09/water-water-everywhere-under-attack.aspx Data: 30/10/2006 Luogo: Harrisburg, Pa, USA Titolo: Pennsylvania Water Company Hack Abstract: A foreign hacker penetrated security at a water filtering plant near Harrisburg, Pa., for planting malicious software capable of affecting the plant's water treatment operations Riferimenti: http://blogs.abcnews.com/theblotter/2006/10/hackers_penetra.html http://www.infoworld.com/d/security-central/hackers-break-water-system-network-679?page=0,0 Data: 03/04/2007 Luogo: N/A, USA Titolo: Phishing Attack Exposed an Energy Company to Hackers Abstract: Using a Microsoft zero-day vulnerability and a bit of social engineering, hackers compromised a workstation and threatened critical SCADA systems Riferimenti: http://www.eweek.com/c/a/Security/How-a-Phishing-Attack-Exposed-an-Energy-Company-toHackers-183328/ Incidenti di Cyber Security Industriale riferiti ad Infrastrutture (aggiornato ad Agosto 2009) Pagina 5 Data: 15/08/2007 Luogo: Willows, CA, USA Titolo: California Tehama Colusa Canal Authority computer Hack Abstract: Former fired employee intentionally accessed and damaged the computer used to divert water from the Sacramento River Riferimenti: http://pcworld.about.com/od/hackers/California-Canal-Management-Sy.htm Data: 11/01/2008 Luogo: Lodtz, Poland, Europe Titolo: Polish boy derails tram after hacking train network Abstract: A Polish teenager allegedly turned the tram system in the city of Lodz into his own personal train set, triggering chaos and derailing four vehicles in the process. Twelve people were injured in one of the incidents. Riferimenti: http://www.theregister.co.uk/2008/01/11/tram_hack/ Data: 18/01/2008 Luogo: N/A, USA Titolo: CIA Confirms Cyber Attack Caused Multi-City Power Outage Abstract: cyberattacks have been used to disrupt power equipment in several regions outside the U.S. Riferimenti: http://www.sans.org/newsletters/newsbites/newsbites.php?vol=10&issue=5 http://news.cnet.com/CIA-Cyberattack-caused-multiple-city-blackout/2100-7349_3-6227090.html Data: 07/03/2008 Luogo: Baxley, Georgia, USA Titolo: Cyber Incident Blamed for Nuclear Power Plant Shutdown Abstract: A nuclear power plant in Georgia was recently forced into an emergency shutdown for 48 hours after a software update was installed on a single computer. Riferimenti: http://www.washingtonpost.com/wp-dyn/content/article/2008/06/05/AR2008060501958.html Data: 05/05/2008 Luogo: N/A, USA Titolo: Wonderware SuiteLink Denial of Service vulnerability Abstract: A vulnerability was found that could allow an un-authenticated remote attacker with the ability to connect to the TCP port to shutdown the service abnormally by sending a malformed packet. Riferimenti: http://blog.clusit.it/sicuramente/2008/05/ora-anche-vulne.html http://www.coresecurity.com/content/wonderware Incidenti di Cyber Security Industriale riferiti ad Infrastrutture (aggiornato ad Agosto 2009) Pagina 6 Data: 30/05/2008 Luogo: Trail, British Columbia, CA Titolo: Teck Cominco lead refinery spills chemicals into Columbia River Abstract: A leak in a lead refinery pipe triggered an alarm late Wednesday afternoon and led to shutdown of the electrolytic refining plant at the smelter complex on the banks of the Columbia. Some acid, which contained lead, ended up in the river. Riferimenti: http://www.publicsafety.gc.ca/dir/dir08-105-eng.aspx http://www2.news.gov.bc.ca/news_releases_2005-2009/2008ENV0063-000833.htm http://blog.oregonlive.com/breakingnews/2008/05/29/ Data: 02/06/2008 Luogo: New Brunswick, CA Titolo: Boil water order for Saint John, New Brunswick Abstract: The water for people living east of the Reversing Falls Bridge is not receiving proper chlorine treatment at Latimer Lake Water Treatment Facility, the municipal water supply may not be completely disinfected Riferimenti: http://www.publicsafety.gc.ca/dir/dir08-107-eng.aspx http://www.canadaeast.com/news/article/780754 http://www.cbc.ca/canada/new-brunswick/story/2008/06/02/nb-boil-order.html Data: 11/06/2008 Luogo: San Francisco, CA, USA Titolo: Security hole exposes utilities to Internet attack, Citect SCADA ODBC service vulnerability Abstract: Attackers could gain control of water treatment plants, natural gas pipelines and other critical utilities because of a vulnerability in the software that runs some of those facilities Riferimenti: http://www.usatoday.com/tech/products/2008-06-11-4111787945_x.htm http://www.coresecurity.com/content/citect-scada-odbc-service-vulnerability Data: 12/09/2008 Luogo: CERN, Ginevra Titolo: Hackers attack Large Hadron Collider Abstract: Hackers have mounted an attack on the Large Hadron Collider, raising concerns about the security of the biggest experiment in the world as it passes an important new milestone Riferimenti: http://blog.clusit.it/sicuramente/2008/09/hacking-al-lhc.html http://www.telegraph.co.uk/scienceandtechnology/science/sciencetopics/largehadroncollider/3351691/Hacke rs-attack-Large-Hadron-Collider.html Incidenti di Cyber Security Industriale riferiti ad Infrastrutture (aggiornato ad Agosto 2009) Pagina 7 Data: 27/01/2009 Luogo: Texas, USA Titolo: Hacking programmable road signs Abstract: Digital road signs (remotely controlled) on the side of the road while driving, indicating important information such as road closures or traffic delays, but what if the sign included information such as "Zombies ahead" or "this sign has been hacked" Riferimenti: http://blog.clusit.it/sicuramente/2009/01/pannelli-a-messaggio-variabile-da-hacker.html http://www.neowin.net/news/main/09/01/27/hacking-programmable-road-signs Data: 18/02/2009 Luogo: Foxboro, MA, USA Titolo: CERT Reported Vulnerabilities in iFIX Security Abstract: Some security issues have been reported in GE Fanuc SCADA software iFIX, which can be exploited by malicious users to disclose sensitive information and bypass certain security restrictions, and by malicious people to disclose sensitive information Riferimenti: http://support.gefanuc.com/support/index?page=kbchannel&id=S:KB13253&actp=search http://loftyperch.com/index/page/405/use_lang/EN/cnt_id/41.html http://www.f-secure.com/vulnerabilities/SA200900818 Data: 07/04/2009 Luogo: NY, USA Titolo: Usa, cyberterroristi all'attacco "E' stata minata la rete elettrica" Abstract: La rete elettrica americana 'minata' da sofisticati software, acquedotti, impianti di depurazione e altre infrastrutture a rischio, 'cyberspie' russe e cinesi in azione negli States Riferimenti: http://blog.clusit.it/sicuramente/2009/04/e-stata-minata-la-rete-elettrica.html http://www.repubblica.it/2009/04/sezioni/esteri/cyberpirati-usa/cyberpirati-usa/cyberpirati-usa.html Data: 22/06/2009 Luogo: Washington, DC, USA Titolo: Washington Metro Crash Abstract: Failure of the signal system and operator error as likely causes of yesterday's fatal Red Line crash Riferimenti: http://www.washingtonpost.com/wp-dyn/content/article/2009/06/22/AR2009062203261.html Incidenti di Cyber Security Industriale riferiti ad Infrastrutture (aggiornato ad Agosto 2009) Pagina 8 Data: 30/06/2009 Luogo: Dallas, TX, USA Titolo: Arlington Security Guard Arrested on Federal Charges for Hacking into Hospital's Computer System Abstract: Computer intrusions of several computers in the Carrell Clinic hospital building, including the Heating, Ventilation and Air Conditioning (HVAC) system and computers containing confidential patient information. Riferimenti: http://dallas.fbi.gov/dojpressrel/pressrel09/dl063009.htm http://blog.clusit.it/sicuramente/2009/07/preso-di-mira-dallhacker-anche-il-sistema-di-controllo-hvacdellospedale.html Data: 24/08/2009 Luogo: Azerbaijan Titolo: Russian hackers vandalized BTC pipeline data servers Abstract: Russian hackers are long attacking Baku-Tbilisi-Ceyhan (BTC) pipeline data server, through the agency of Russian Special Service vandalized servers of energy pipe, carrying gas from Azerbaijan to Europe bypassing Russia, Riferimenti: http://news.am/en/news/2963.html http://www.aviationweek.com/aw/blogs/defense/index.jsp?plckController=Blog&plckScript=blogScript&plckEl ementId=blogDest&plckBlogPage=BlogViewPost&plckPostId=Blog%3a27ec4a53-dcc8-42d0-bd3a01329aef79a7Post%3a9e21ed93-400c-4f43-a976-c377cd661ae2 Incidenti di Cyber Security Industriale riferiti ad Infrastrutture (aggiornato ad Agosto 2009) Pagina 9