Are Hackers the Biggest Threat to America’s Critical Infrastructure?

VICE News
9 Apr 202422:25

Summary

TLDRThe transcript discusses the increasing connectivity of critical systems to the internet, highlighting the significant security risks this poses. It emphasizes the rise in cyber attacks and the potential for these attacks to disrupt essential infrastructure, such as power grids and water systems. The narrative includes insights from experts in the field, illustrating the vulnerabilities of industrial control systems and the potential consequences of cyber warfare. It also touches on the challenges of attributing cyber attacks and the need for robust cybersecurity measures to protect against and respond to such threats.

Takeaways

  • 🌐 Critical systems that maintain societal functions are increasingly connected to the internet, creating potential security vulnerabilities.
  • 🔍 The rise in cyber attacks is not a baseless fear, as malware has already infected critical infrastructure worldwide.
  • 💡 Nation states are targeting critical infrastructure such as electricity and water systems, posing a significant threat.
  • 📈 The California power grid was allegedly hacked by China in the early 2000s, highlighting the risk of cyber attacks on industrial control systems (ICS).
  • 🛠️ Industrial Control Systems can be exploited due to complex protocols and potential cross-talk between different vendors' systems.
  • 🔥 Hackers can manipulate inputs to critical infrastructure systems, causing physical damage such as setting a natural gas plant on fire.
  • 🌐 The Internet of Things (IoT) increases the attack surface, as more devices become connected and potentially vulnerable.
  • 🏛️ There is ongoing debate about the laws of war in the context of cyber conflicts, especially concerning attacks on critical infrastructure.
  • 💥 Cyber attacks on critical infrastructure have real-world consequences, such as the Shamoon virus that caused significant damage to Saudi Aramco's network.
  • 🛡️ The US government is investing in cybersecurity, with the Department of Homeland Security actively monitoring and defending against cyber threats.
  • 🌍 International deterrence in cyber warfare is challenging due to the difficulty in attributing attacks to specific actors.

Q & A

  • What is the main concern regarding the increasing connection of critical systems to the internet?

    -The main concern is the exposure of these critical systems to massive security risks. As these systems become more connected, they become more vulnerable to cyber attacks, which can have severe consequences, including potential paralysis of essential services.

  • What does the term 'ICS' stand for, and what does it encompass?

    -ICS stands for Industrial Control Systems. It is a term used to describe a range of systems that monitor or control physical processes, such as electric systems, water systems, pipelines, and other critical infrastructure components.

  • How did the California independent system operator (CAISO) get hacked in the early 2000s?

    -The CAISO was allegedly hacked by China. The hackers gained access to the network controlling the power grid in California, which could have potentially led to widespread power outages and significant disruption.

  • What was the significance of the Stuxnet virus in 2009?

    -Stuxnet was a sophisticated computer virus that infiltrated and destroyed nuclear centrifuges at an Iranian uranium enrichment plant. This attack marked a turning point, showing that cyber attacks could have physical destructive capabilities and could be used as a tool in state-sponsored conflicts.

  • What are some of the challenges in securing Industrial Control Systems?

    -One of the main challenges is the complexity of the protocols used in these systems. Different vendors may use different implementations, leading to potential cross-talk and vulnerabilities. Additionally, the software used in critical infrastructure is often based on decades-old code that has not been audited for security, making it prone to exploits.

  • How do attackers find their targets in critical infrastructure?

    -Attackers can use search engines like Shodan, which scans devices connected to the internet, including control systems. These systems may be exposed with no authentication, making it relatively easy for attackers to identify and target them.

  • What is a Programmable Logic Controller (PLC), and why is it a weak link for hackers to exploit?

    -A PLC is a device used to control physical processes in industrial and infrastructure systems. PLCs have been around since the 1960s and are often based on old code that has not been security-audited. This makes them buggy and full of vulnerabilities, which hackers can exploit to gain control over the systems they are a part of.

  • What is the role of the National Cybersecurity and Communications Integration Center (NCCIC)?

    -The NCCIC serves as the Department of Homeland Security's operations center for cybersecurity. It is responsible for monitoring, detecting, and responding to cyber threats across the nation, working with affected companies to mitigate incidents and protect critical infrastructure.

  • How does the US government approach the threat of cyber attacks on critical infrastructure?

    -The US government is focused on raising the level of cybersecurity in critical infrastructure. While there is an understanding that it is impossible to prevent all cyber intrusions, efforts are made to deter attacks through the concept of mutual assured destruction and by improving defenses against potential threats.

  • What is the debate around the laws of war in the context of cyber conflict?

    -The debate revolves around defining what constitutes an act of war in the context of cyber attacks. Since cyber attacks can have physical destructive capabilities, there is a need to establish clear rules of engagement to determine when a cyber attack is considered an act of war, especially as nation-states and other actors engage in cyber espionage and preparation for potential conflicts.

  • What are the potential consequences of a successful cyber attack on critical infrastructure?

    -The consequences can be severe, including paralysis of essential services, significant economic damage, and potential loss of life. Such attacks can disrupt transportation, energy, finance, and healthcare, leading to widespread societal and economic impact.

Outlines

00:00

🌐 The Vulnerability of Connected Critical Systems

This paragraph discusses the increasing connectivity of critical systems to the internet, highlighting the security risks this poses. It emphasizes the rise of cyber attacks and the potential for malware to infect critical infrastructure. The narrative includes an account of a power station in California allegedly hacked by China in the early 2000s, illustrating the real-world implications of cyber vulnerabilities in industrial control systems. The segment also touches on the broader historical context of targeting critical infrastructure in warfare and the need to consider modern cyber equivalents of traditional warfare rules.

05:01

🔍 Exploiting System Vulnerabilities

The focus of this paragraph is on the vulnerabilities of industrial control systems, particularly how differences in system protocols and implementations can lead to security breaches. It explains how attackers can manipulate inputs to cause system failures, using the example of a natural gas plant to illustrate the potential for catastrophic outcomes. The segment also addresses the awareness of government officials regarding these threats and the implications of the Internet of Things, which increases the attack surface for potential cyber attacks on critical infrastructure.

10:04

💥 Notorious Cyber Attacks on Critical Infrastructure

This paragraph delves into specific examples of cyber attacks on critical infrastructure, such as the Shamoon virus that caused significant damage to Saudi Aramco's network. It discusses the potential motives behind these attacks, including political tensions and the desire to disrupt business operations. The paragraph also highlights the increasing awareness and curiosity about these attacks, suggesting a growing trend in cyber warfare and the need for better security measures to protect critical systems.

15:08

🔎 Identifying and Targeting Critical Systems

The paragraph explores how cyber attackers can identify and target critical infrastructure systems. It introduces Shodan, a search engine for internet-connected devices, which can reveal vulnerable control systems. The segment discusses the ease with which critical systems can be found online and the potential for catastrophic consequences if these systems are compromised. It also touches on the need for better security measures to protect against such vulnerabilities.

20:08

🛡️ The Defense Against Cyber Threats

This paragraph examines the efforts to defend against cyber threats to critical infrastructure. It features interviews with security experts and government officials, discussing the challenges of understanding complex system interactions and the potential for unintended consequences from cyber attacks. The segment also addresses the difficulty in attributing cyber attacks and the challenges in establishing a clear deterrent policy due to the ambiguity of identifying the source of an attack.

Mindmap

Keywords

💡Cybersecurity

Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks. It is a critical aspect of modern infrastructure management, as illustrated in the video where various experts discuss the vulnerabilities of critical systems to cyber attacks. The video emphasizes the rising threat of cyber attacks on infrastructure, highlighting the need for robust cybersecurity measures to safeguard against potential disruptions and damages.

💡Critical Infrastructure

Critical infrastructure encompasses the physical and virtual systems that are essential to the functioning of a society, such as energy, water, and transportation systems. The video script highlights the increasing connectivity of these systems to the internet, which, while beneficial for efficiency, exposes them to significant security risks. The discussion around potential cyber wars and the consequences of attacks on critical infrastructure underscores the importance of safeguarding these systems.

💡Industrial Control Systems (ICS)

Industrial Control Systems (ICS) are computer-based systems used to monitor and control industrial processes. These systems are crucial for operating factories, utilities, and other infrastructure. The video explains that ICS encompasses a broad range of technologies and protocols that can be complex and sometimes insecure, making them potential targets for cyber attacks. The interview with Joe Weiss, an industrial control systems engineer, emphasizes the vulnerability of these systems to cyber threats.

💡Malware

Malware, short for malicious software, is any software designed to cause harm to a computer system or its users. In the context of the video, malware is a significant threat to critical infrastructure as it can be used by attackers to disrupt operations, steal sensitive information, or cause physical damage. The mention of the Shamoon virus, which wiped out thousands of computers at Saudi Aramco, exemplifies the destructive potential of malware.

💡Cyber War

A cyber war refers to conflicts that take place in the digital domain, where nations or other groups use cyber attacks to disrupt, damage, or gain advantage over their adversaries. The concept is significant in the video as it explores the potential for cyber attacks to escalate into full-scale cyber warfare, with attacks on critical infrastructure being a key aspect. The discussion around the rules of war in the context of cyber conflict underscores the complexity and new challenges posed by cyber warfare.

💡Vulnerabilities

Vulnerabilities in the context of cybersecurity are weaknesses or flaws in systems that can be exploited by attackers to gain unauthorized access or perform malicious actions. The video emphasizes the numerous vulnerabilities present in industrial control systems and critical infrastructure, which can be manipulated to cause widespread disruption or damage. The discussion with experts like Meredith Patterson highlights the technical complexities that can lead to such vulnerabilities.

💡Internet of Things (IoT)

The Internet of Things (IoT) refers to the network of physical devices, vehicles, home appliances, and other items that are embedded with sensors, software, and network connectivity, allowing them to collect and exchange data. The video script discusses the expansion of IoT and its implications for security, as the increased connectivity of everyday devices can lead to more potential entry points for cyber attacks, thus expanding the attack surface.

💡Shodan

Shodan is a search engine for Internet-connected devices. It allows users to find specific types of computers, servers, routers, and other devices connected to the Internet using a variety of search criteria. In the video, Shodan is highlighted as a tool that demonstrates the exposure of critical infrastructure to potential cyber threats, as it can locate control systems that are publicly accessible and unprotected.

💡Programmable Logic Controller (PLC)

A Programmable Logic Controller (PLC) is a digital computer used for automation of industrial processes, such as manufacturing and production lines. PLCs are often targeted by hackers due to their foundational role in controlling physical systems and their potential security weaknesses. The video explains that PLCs, built on decades-old code, are prone to vulnerabilities and can be exploited to cause physical damage or operational disruptions.

💡Stuxnet

Stuxnet is a sophisticated computer worm that was discovered in 2010 and is believed to have been created as a joint operation between the United States and Israel to target Iran's nuclear program. It is significant in the video as an example of a high-level state-sponsored cyber attack with the potential to cause physical destruction. Stuxnet represents a turning point in the understanding of cyber warfare, as it was designed to infiltrate and destroy specific industrial equipment.

💡Cyber Pearl Harbor

The term 'Cyber Pearl Harbor' is used metaphorically to describe a hypothetical large-scale, devastating cyber attack that could have widespread and long-lasting effects on a country's critical infrastructure, similar to the impact of the Pearl Harbor attack on the United States in World War II. The video uses this term to emphasize the potential severity of cyber threats and the need for preparedness to prevent such catastrophic events.

Highlights

Critical systems that keep society running are increasingly connected to the internet, creating potential security risks.

The rise in cyber attacks is not just fear mongering; it's a real and growing threat to critical infrastructure.

Malware has infected critical infrastructure globally, emphasizing the need to consider cyber warfare strategies.

In the early 2000s, a power station in California was allegedly hacked by China, demonstrating nation-state targeting of infrastructure.

The Stuxnet virus in 2009 marked a turning point by infiltrating and destroying nuclear facility centrifuges in Iran, likely a joint US-Israeli operation.

Hackers can exploit vulnerabilities in industrial control systems by manipulating or falsifying input data.

The Internet of Things increases the attack surface, as more devices with connectivity introduce new potential vulnerabilities.

The laws of war in the context of cyber conflict are a subject of debate, especially concerning the use of cyber tools for physical destruction.

Critical infrastructure attacks are not just hypothetical; they are occurring and are recognized by governments as a significant threat.

The Shamoon virus in 2012 was one of the most destructive attacks on the private sector, targeting Saudi Arabia's national oil and gas company.

Nation-state actors, such as Iran and North Korea, are among the primary adversaries in cyber warfare against critical infrastructure.

Programmable Logic Controllers (PLCs) are a weak link in critical infrastructure, often exploitable due to outdated and unsecured code.

The ease of hacking into PLCs is a concern, as these systems were not designed with security in mind and have numerous vulnerabilities.

The US government is actively working to improve cybersecurity, but the complexity of systems and potential for unintended consequences remains a challenge.

The National Cyber Security and Communications Integration Center is a key part of the Department of Homeland Security's efforts to monitor and defend against cyber threats.

Defining what constitutes an act of war in the context of cyber attacks on critical infrastructure is not well-defined and presents challenges for deterrence.

The difficulty in attributing cyber attacks, due to the use of multiple launching points and hijacked computers, complicates the implementation of a clear deterrent policy.

Experts and hackers concur that a new war on critical infrastructure is already underway, with significant implications for national security and global stability.

Transcripts

play00:01

the critical systems that keep Society

play00:02

Running are connected these systems are

play00:05

more and more connected to the internet

play00:07

quite openly they're just kind of open

play00:08

game but it's exposing them to a massive

play00:11

security risk if you can access it

play00:13

remotely so can everybody else cyber

play00:17

attacks are on the rise you don't think

play00:19

this is just needless fear markering do

play00:20

you I wish it was then I could sleep a

play00:23

lot better malware has infected critical

play00:26

infrastructure everywhere we've got to

play00:28

begin to think about what are the rules

play00:30

of War if God forbid you wind up with a

play00:32

cyber War well cyber attacks triggering

play00:35

all that

play00:47

[Music]

play00:57

war the industrialized world runs on an

play01:00

infrastructure that we take for

play01:02

granted when things are running well

play01:04

they're pretty easy to forget

play01:06

about but critical infrastructure has

play01:08

always been a prime target in war

play01:11

destroying a power grid or water system

play01:13

can paralyze the enemy and as more and

play01:15

more of that kind of infrastructure is

play01:17

connected to digital networks experts

play01:19

are finding it's also vulnerable to

play01:21

cyber

play01:23

attacks in the control system world if

play01:27

something fails it's obvious the lights

play01:30

go out a pipe breaks what you don't know

play01:35

is did cyber play a role in what

play01:38

happened Joe Weiss has been an

play01:40

industrial Control Systems engineer for

play01:43

almost 40 years Joe took me to a power

play01:46

station in California that State's power

play01:48

grid was allegedly hacked by China in

play01:50

the early

play01:51

2000s okay ICS stands for industrial

play01:54

Control Systems it's essentially

play01:57

ubiquitous term that we're using to

play02:01

cover this range of things that monitor

play02:05

or control physical processes so like

play02:09

what you see over here all of this stuff

play02:11

is controlling the Electric System so

play02:15

someone from China could effectively

play02:17

gain access to a network that's

play02:19

controlling something in California yes

play02:22

I don't think there is any

play02:23

question that there are nation states

play02:26

that are

play02:28

targeting critical infrastructure

play02:31

electric

play02:32

water pipelines you name it we've

play02:35

already had many years ago documented

play02:39

where China did try to meddle with

play02:41

things here like this what did they do

play02:45

they hacked into What's called the

play02:48

California independent system operator

play02:50

which is in fome California which is

play02:53

what on an overall basis controls this

play02:56

and if they had what are the sorts of

play02:58

things we could have SE cuz that's

play02:59

obviously an attack right that was

play03:01

obviously an attack correct and what

play03:03

would have been a Fallout if they had

play03:05

again depending on what they would have

play03:06

done they could have

play03:08

affected you know power

play03:11

to hundreds of thousands of customers

play03:14

shut down California one of the most

play03:15

important States well they could have

play03:17

certainly played Havoc with the

play03:21

grid this attack is just one case the

play03:25

real turning point was in 2009 it was a

play03:28

sophisticated computer virus called

play03:30

stuck net and it infiltrated and

play03:32

destroyed nuclear Center fues at a

play03:34

controversial uranium enrichment plant

play03:36

in Iran observers agreed the attack was

play03:39

likely a joint us Israeli operation the

play03:42

critical infrastructure war was

play03:45

on but I want to know how hackers get

play03:47

inside critical infrastructure in the

play03:49

first place

play03:50

nice pleasure Meredith Patterson is an

play03:53

expert in protocols the instructions

play03:55

machines use to communicate with each

play03:57

other control system is just a system

play04:00

that takes some reference value and then

play04:04

monitors uh a centrifuge or a turbine or

play04:07

a fan any kind of you know device that

play04:10

has some property that can be measured

play04:12

temperature speed uh Direction whatever

play04:15

like a power plant or nuclear power

play04:17

plant or completely critical

play04:19

infrastructure yeah a dam anything like

play04:21

that and are these things

play04:23

secure

play04:25

well one of the problems with industrial

play04:27

Control Systems is that the protocols

play04:30

that are used in them are extremely

play04:32

complex so if you have systems from

play04:35

different vendors that are using

play04:36

different implementations you can

play04:38

sometimes end up with uh cross talk

play04:41

essentially because they're speaking

play04:42

different dialects of the same protocol

play04:44

and one ends up introducing a mistake

play04:46

into the other so if I'm reading this

play04:48

correctly you're saying that at times

play04:52

the software involved with some of the

play04:53

most critical infrastructure we have

play04:56

like nuclear power plants um can break

play05:00

down can they can the code essentially

play05:03

like there's an exploit there's there's

play05:05

a vulnerability that's exactly what I'm

play05:06

saying um vulnerabilities are driven by

play05:10

the inputs that people send into systems

play05:13

and so if an attacker has any way to

play05:17

control or modify the input that is

play05:20

being sent to a system um they could

play05:22

send it false inputs um they could send

play05:24

it syntactically incorrect inputs it it

play05:27

is remarkably easy to just mess with the

play05:29

temperature someplace in a natural gas

play05:31

plant and catch the entire plant on fire

play05:33

I mean really oh yeah like Baytown uh

play05:37

near Houston just frequently has

play05:38

problems with refiner with you know air

play05:40

Refinery catches and you know and the

play05:41

entire river goes up for about a day and

play05:44

that's something that could be done if

play05:46

someone got into the system I mean this

play05:47

is something that happens by accident

play05:49

already right so if you know so if if

play05:51

somebody were to get into the system

play05:53

then yes you could totally set the river

play05:54

on

play05:56

fire that threat is real and the highest

play05:59

levels of government know it Michael

play06:02

cherof was the Secretary of Homeland

play06:03

Security under George W bush he now runs

play06:06

a cyber security consulting

play06:09

firm what's the biggest threat to

play06:12

America's critical infrastructure what's

play06:15

what's the thing that that scares you

play06:16

the most well you know if you're talking

play06:19

about what would cause the greatest

play06:20

consequence I would say anything that

play06:22

affects Transportation energy or Finance

play06:26

or Health Care would be a potentially

play06:28

have a very very big impact on the

play06:30

United States but here's the dangerous

play06:32

thing we are now moving into what they

play06:34

call the Internet of Things where

play06:35

everything is going to get quote smart

play06:38

so as we build out all these you know

play06:42

widgets that have connectivity and

play06:45

wiress we've got to think to ourselves

play06:47

what happens if somebody enters using

play06:50

that wireless and begins to affect the

play06:52

actual physical operation of the system

play06:54

there's also a lot of debate about what

play06:56

the laws of war would be if we did have

play06:58

a cyber conflict and again that's not

play07:00

about stealing information that's

play07:02

literally about using cyber tools to

play07:05

blow up something like a power plant or

play07:08

to kill people by causing an airliner to

play07:10

crash and and so that we've got to begin

play07:13

to think about how do we what are the

play07:14

rules of War if God forbid you wind up

play07:17

with a cyber

play07:18

War critical infrastructure is clearly a

play07:21

Target and attacks against them aren't a

play07:23

pip dream they're actually

play07:28

happening

play07:32

I go to meet someone who knows about

play07:33

hacking critical infrastructure and

play07:35

works to prevent

play07:37

it

play07:41

yes Chris Kuca is an independent

play07:43

security consultant she says she first

play07:45

got into hacking as a kid what' you hack

play07:48

into uh the FBI and the Department of

play07:50

Justice and how old were you I was 10

play07:53

what and I had no idea I was really

play07:56

doing much of anything cuz it was really

play07:58

easy

play08:01

back in August of 2012 mward dub shamon

play08:03

infected the network of Saudi Arabia's

play08:05

National oil and gas company Saudi

play08:09

aramco kuco was hired to assess the

play08:12

damage why didn't you tell me what

play08:14

shamun is shimun was a piece of uh

play08:18

malware that began to randomly wipe over

play08:21

35,000 windows-based computers in Saudi

play08:24

Arco when it was discovered what was

play08:27

going on individuals inside Saudi

play08:30

physically pulled plugs to keep it from

play08:33

getting further and what was the damage

play08:36

uh the damage was about 85% of their it

play08:39

systems were knocked out when I say it

play08:41

systems it wasn't just your desktop

play08:43

computer it was the servers they

play08:45

connected to payroll systems databases

play08:49

any sort of data that held research and

play08:50

development all the way up to the

play08:53

Voiceover IP phones did that Target any

play08:57

let's say critical infrastructure or

play08:59

production yes it appeared that the

play09:02

attack was meant to Target the

play09:04

production systems to take them down so

play09:05

it was actually a critical

play09:07

infrastructure attack yes absolutely it

play09:09

was targeting it yes who did it

play09:11

according to Saudi ramco they think that

play09:13

the Iranians did it and would you agree

play09:15

with that it seemed like it was an

play09:17

extremely political attack done in a way

play09:21

that was extremely damaging to Saudi

play09:25

business culture it seemed

play09:27

like either it had to do with a group

play09:31

related to the Saudi Arab Spring or

play09:34

banian spring which was going on at the

play09:37

same time or perhaps it was Iranian have

play09:40

critical infrastructure attacks

play09:42

increased since stuck net and shamon yes

play09:45

they have absolutely uh more and more

play09:47

people are aware of them so now

play09:49

curiosity is peing and if you went from

play09:53

just writing code to writing code and

play09:55

being able to move

play09:58

things attacks are going to get more and

play10:00

more as curiosity Peaks and also these

play10:04

systems are more and more connected to

play10:06

the internet quite openly they're just

play10:08

kind of open

play10:11

game the Shimon virus was probably the

play10:15

most destructive attack that the private

play10:18

sector has seen

play10:20

today after shamun us defense secretary

play10:23

Leon Panetta sounded the alarm the

play10:26

collective

play10:28

result of these kinds of attacks could

play10:32

be a cyber Pearl

play10:36

Harbor how would cyber attackers find

play10:38

their

play10:40

targets I learned in fact that there's a

play10:42

search engine called Shodan dedicated to

play10:44

scanning devices connected to the

play10:46

internet John mle is its

play10:49

architect what so what am I looking at

play10:51

here Shodan is a search engine that

play10:55

unlike Google which just looks at the

play10:57

web showan looks at the internet which

play10:59

can include much more than just web all

play11:01

these devices are become connected and

play11:04

showan finds them it can be buildings W

play11:07

treatment facilities factories webcams

play11:11

offices everything that you can possibly

play11:14

imagine if it can have a computer inside

play11:16

it show ends found it so this is a 3D

play11:19

Globe where the red dots represent

play11:22

publicly accessible Control Systems so

play11:25

these are control systems that are

play11:27

exposing the Raw protocols there's no

play11:30

authentication on any of these you just

play11:32

connect and you have full access America

play11:34

is just a big red blob yeah that's not

play11:37

good most connected country in the world

play11:39

it's not that surprising but yes very

play11:42

very connected what was one thing you

play11:44

saw you said to yourself like how the

play11:46

hell did this get up online there are a

play11:49

lot of things like

play11:50

that um a big one was one in France it's

play11:53

the hydroelectric Dam it generated like

play11:56

a few megawatts of power it was it was

play11:57

pretty big and actually I can show it

play12:01

and this one actually had a web

play12:02

interface which is unusual that showed a

play12:05

real-time view of how much power was

play12:06

being generated and it also had all

play12:08

sorts of other stuff exposed that's

play12:10

actually a common theme with IC devices

play12:13

they will give you serial numbers

play12:14

they're going to give you firmware

play12:15

versions because it was meant for

play12:17

engineers to maintain remotely and if

play12:20

you're a remote engineer you want to

play12:21

know what you're working with and then

play12:23

you look at the history of it and

play12:25

there's a history of

play12:26

flooding like there are known flooding

play12:28

instances of this Dam and it took two

play12:31

years of poking and prodding for these

play12:34

guys to secure it do you think something

play12:36

this vulnerable and this shitty is lying

play12:39

around in the US somewhere most likely

play12:41

yes a lot of the guys operating these

play12:43

things I didn't understand that if you

play12:46

can access it remotely without logging

play12:48

in over the Internet so can everybody

play12:53

else Shodan proves that critical

play12:55

infrastructure is in danger all over the

play12:57

world but who else has figured that out

play13:00

and what are they doing with

play13:06

it everyone was telling me that critical

play13:09

infrastructure control systems were not

play13:11

only outdated but right for an

play13:14

attack if accessing them could be as

play13:16

simple as finding them on the Internet

play13:18

how hard could it be to trigger the

play13:20

nightmarish damage everyone was warning

play13:23

about I went to meet Stuart McClure the

play13:26

founder and owner of a security firm

play13:27

called silence

play13:31

he shows me a device called a

play13:32

programmable logic controller or

play13:35

PLC plcs have been around since the

play13:38

1960s but in the digital age they're the

play13:40

weak link for hackers to

play13:42

exploit first off why don't you explain

play13:44

to me what a PLC is yeah PLC is a

play13:47

programmable logic controller basically

play13:49

it controls the physical world with by

play13:52

programming or computers so you

play13:54

typically find these though in a lot of

play13:55

critical infrastructure right absolutely

play13:57

any kind of oil and gas or industrial

play13:59

Control Systems anything that tries to

play14:01

control like I said the physical world

play14:04

or physical elements um for power or oil

play14:07

and gas Transportation you name it they

play14:10

all require the use of plc's in some

play14:12

form of fashion to make them work every

play14:14

day as I understand it plc's are quite

play14:16

buggy and easy to exploit are they not

play14:19

well yeah they're built on 30 40 Years

play14:21

of code that is really never been

play14:23

audited for security or very rarely so

play14:26

they often have a lot of vulnerabilities

play14:27

and exploits that have yet to be

play14:29

discovered and of course hackers love

play14:31

that so you know how to hack a PLC yes

play14:34

and you're going to show us yes

play14:35

absolutely let's get to it let's try it

play14:37

out so what this is is a rig that we

play14:40

built to represent the physical world

play14:42

out there that usually has very large

play14:44

versions of these things this PLC is

play14:47

hooked up to this air pump and

play14:50

compressor which is going to allow us to

play14:53

over pressurize a bottle and make it

play14:55

explode so and are you going to run any

play14:58

coat on it is it just am I'm actually

play14:59

running code that we have in Python

play15:02

right now first we set our variable to

play15:04

the IP address of the PLC then overwrite

play15:07

our memory address here MX 0.0 which is

play15:10

the area and Ladder logic which allows

play15:12

us to control the safety disable and

play15:16

overwrite that which allows us to

play15:17

control the PLC itself and do anything

play15:20

we want with it so uh would you like to

play15:22

do the honors all

play15:25

right just hit

play15:27

enter

play15:41

Judas

play15:42

Priest that actually sounded like a bomb

play15:44

now I won't yeah now I won't hear for a

play15:46

while but that was good why is it so

play15:48

easy to control a PLC well it's so easy

play15:52

because the way that these things have

play15:53

been designed they never really

play15:55

considered security from the ground up

play15:57

so when they design them they design

play15:58

them just to work now what's happening

play16:00

is more and more of them are getting

play16:01

hacked up which is requiring

play16:03

manufacturers to go back and redesign

play16:05

them and you don't think this is just

play16:07

needless fear marging do you I wish it

play16:09

was then I could sleep a lot better you

play16:12

can make it more difficult you can make

play16:14

it more challenging uh but at the end of

play16:16

the day it's built so foundationally

play16:18

insecure that it it makes it incredibly

play16:20

easy for attackers to gain

play16:24

access all the experts I've spoken to

play16:26

say our critical infrastructure is

play16:27

vulnerable and I wonder what Washington

play16:29

is doing about it the best guy to ask

play16:32

that question is Michael Daniel he

play16:35

advises President Obama on cyber

play16:37

security

play16:38

issues so what's the attack that keeps

play16:40

you up at night I would say it's one

play16:43

that is focused uh on our critical

play16:46

infrastructure that um has some

play16:49

unintended consequences uh that's the

play16:51

one that really I think worries me

play16:53

because we don't really actually

play16:54

understand how these incredibly complex

play16:57

systems actually interact with each

play17:00

other so you fear that another

play17:02

superpower might infiltrate critical

play17:04

infrastructure and set off an unneeded

play17:06

conflict so that is certainly a concern

play17:09

although I would actually say that I'm

play17:12

less worried about uh that than I am

play17:15

other actors that have less interest in

play17:17

the overall U sort of

play17:19

international Uh current you know status

play17:22

quo who are these adversaries so you

play17:25

know uh the Director of National

play17:26

Intelligence has talked about them and

play17:28

his testimony so Iran and North Korea

play17:30

certainly top uh the list although we

play17:32

are not unconcerned about uh terrorists

play17:35

um and other uh actors who don't build

play17:38

themselves so much as terrorists but

play17:39

certainly cyber activists uh and others

play17:42

everything's crackable you cannot

play17:44

prevent all uh cyber uh intrusions

play17:47

that's just impossible um you'll never

play17:49

be able to prevent all of them

play17:51

everything is penetrat

play17:56

eventually everyone's told me that no

play17:58

critical infrastructure system is

play18:00

bulletproof and one US government agency

play18:03

is trying to keep track of the cyber

play18:05

attacks happening across the

play18:07

[Music]

play18:15

country wrot to meet with Martin Edwards

play18:17

who's the guy tasked by Homeland

play18:19

Security at IC C to protect us critical

play18:23

infrastructure against a Cyber

play18:26

attack Edwards is somebody who knows is

play18:29

the Cyber tax being lobbed at America's

play18:30

critical infrastructure this uh this

play18:33

room looks a lot like Enemy of the State

play18:35

or something so what you're in is you're

play18:37

in the National cyber security and

play18:39

Communications integration Center which

play18:41

is a more or less the DHS operations

play18:44

center for cyber these are where all the

play18:46

different analysts from icert user are

play18:48

actively defending the country's

play18:50

networks in 2015 alone the Department of

play18:53

Homeland Security spent 1.25 billion on

play18:56

cyber

play18:57

security you know we've uh We've cleaned

play19:00

up the place a little bit for you to

play19:02

come in but it's uh it's definitely a

play19:04

very uh High highly active uh

play19:07

environment all the time Edwards has

play19:10

Declassified the control room so we

play19:11

won't see any real-time threats but it

play19:14

still gives us a rare look into their

play19:15

Nationwide monitoring

play19:19

system and how does icert protect the

play19:22

United States yeah it's tough it's tough

play19:24

It's a big problem if there is an

play19:26

incident either criminal or nation state

play19:28

level you we'll send an instant response

play19:30

team to those companies to work hand

play19:32

inand with them to clean up mitigate the

play19:35

event do you see it an awful lot of

play19:37

nation state actors going after critical

play19:40

infrastructure I would say we see the

play19:41

whole spectrum they all look different

play19:43

and we save the word attack for

play19:45

something that you know is is purposeful

play19:48

and intentional uh with an intentional

play19:51

consequence uh a lot of what we see is

play19:55

uh sort of reconnaissance and then of

play19:57

course yes we do see the the nation

play19:59

state level actors uh either in the

play20:01

Espionage uh business or prepping the

play20:04

battlefield type of perspective right so

play20:06

you're trying to understand the

play20:08

infrastructure for some future unknown

play20:11

use so if most threats Homeland Security

play20:14

see or about Espionage at what point do

play20:16

a Cyber attack cross the

play20:18

line at what point does the

play20:21

administration consider a critical

play20:23

infrastructure attack an act of War so

play20:26

that is not something that is well

play20:27

defined

play20:29

um fortunately we haven't seen uh one of

play20:32

those events here in the United States

play20:34

in a way that would uh you know probably

play20:36

Crush that threshold and so therefore I

play20:39

think that we focus on you know really

play20:42

raising the level of cyber security in

play20:44

our in our critical infrastructure it's

play20:46

one of the areas that we've worked very

play20:48

hard on uh over the course of this

play20:51

Administration even as the US tries to

play20:53

shore up its cyber defenses there's

play20:55

little incentive not to attack you know

play20:58

Mutual truly assured destruction is

play21:00

another way of describing deterrence if

play21:02

you attack me I will fight back and

play21:05

therefore it's not in your interest to

play21:06

attack me in the first place and that's

play21:08

where the difficulty of proving who

play21:11

actually launched an attack becomes a

play21:13

major issue because it's very rare for a

play21:15

nation state or a criminal group to go

play21:18

directly from the server at controls at

play21:20

the Target they will often launch from

play21:23

around the world they may hop multiple

play21:25

points they may enlist uh computers at

play21:28

they've hijacked as being the spears

play21:30

basically that they throw at the Target

play21:32

I mean you're painting a pretty dark

play21:33

picture then when you get attacked even

play21:35

if it's major infrastructure the first

play21:37

question is how sure am I that I know

play21:39

the country that either caused it or

play21:41

allowed it to happen and that ambiguity

play21:44

and that uncertainty is one of the

play21:46

obstacles to having a very clear

play21:48

deterrent

play21:51

policy experts and hackers agree that a

play21:53

new war on critical infrastructure has

play21:55

not only begun it's well underway

play22:03

[Music]

play22:24

all

Rate This

5.0 / 5 (0 votes)

Related Tags
CybersecurityInfrastructureNation-StateHackingPLC VulnerabilityCyber WarRisk AssessmentInternet of ThingsCritical Systems