Did IoT Cyberattacks cause NY Power Transformers to Explode?


Digital Directorship – Cybersecurity: Electrical Grid

Did IoT Cyberattacks cause NY Power Transformers to Explode?

MadIoT attacks cause blackouts with an IoT botnet of compromised appliances.

Network World: JAN 3, 2019 8:53 AM PT

Officials blamed a power surge for the blackout on Dec. 28th that left LaGuardia airport in the dark for about 45 minutes, grounding flights. A look at the trend of power outages at American airports shows a disturbing pattern and possibly sinister cause.

Background

Attacking an adversary’s infrastructure is asymmetrical warfare. It causes a lot of damage for a very small cost. Cyberattacks are an ideal weapon as they disguise who might be behind them, making retaliation much harder. Attacks on the power grid for airports are especially devastating as they ground flights, stranding passengers and disrupting business nationwide. Just take a look at recent power outages:

 Related Article Links:
Jan 20, 2019:Finally, a Breakthrough in Cyber Security Protection
Jan 26, 2019:Cyber-Hijacking Campaign Sets off Global Government Alarm Bells
Feb 01, 2019:Secrecy Reigns as NERC Fines Utilities $10M citing Serious Cyber Risks
Jun 12, 2017: CRASH OVERRIDE: The Malware that Took Down a Power Grid
Jan 03, 2019:Did IoT Cyberattacks cause NY Power Transformers to Explode?
Dec 28, 2019:New York sky turns bright blue after transformer explosion.
Jan 01, 2019:Your data was probably stolen in cyberattack in 2018
Jan 22, 2019:Cyber Attacks are leading to US Navy Collisions
Dec 28, 2018: Did IoT Cyberattacks cause NY Power Transformers to Explode?
Mar 15, 2018:Cyberattacks Put Russian Fingers on the Switch at Power Plants, U.S. Says
Mar 15, 2018: Cyberattacks Put Russian Fingers on the Switch at Power Plants
Nov 28, 2018:Russian Hackers Haven’t Stopped Probing the US Power Grid
Jun 07, 2018:The damage from Atlanta’s huge cyberattack is even worse than the city first thought
Dec 03, 1018:TOP 10 of the world's largest cyberattacks
Dec 15, 2017: A New Industrial Hack Highlights the Cyber Holes in Our Infrastructure

The New York Times reported in March 2018 of possible Russian cyberattacks on US power plants. “Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.”

A Symantec report noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems.”

BlackIoT: How to disrupt the power grid with an IoT appliance botnet

Princeton University researchers Saleh Soltan, Prateek Mittal, and H. Vincent Poor explained at the 27th USENIX Security Symposium how a botnet of high wattage appliances could do this. They explain how hackers could cause compromised appliances to turn on and off, creating an artificial demand for power, tripping generators and causing blackouts. What’s terrifying about this is that the attack vector is low-security home appliances rather than more secure power infrastructure.

Power grid operators typically assume that power demands are predictable. Consumers collectively behave similarly to how they did in the past and under similar conditions. However, with the proliferation of IoT devices and their poor security measures this isn’t a safe assumption. An IoT botnet of high wattage devices (such as air conditioners and heaters) lets adversaries launch large-scale coordinated attacks on the power grid. Such Manipulation of Demand via IoT (MadIoT) attacks use botnets to manipulate the power demand in the grid.

Many of these devices are controlled with mobile apps and home assistants such as Amazon Echo or Google Home. Hacker can manipulate the power demand and cause large scale black outs by compromising these home assistants. These MadIoT attacks manipulate power loads generated by devices that are much less well protected than the power grid’s Supervisory Control and Data Acquisitions (SCADA) system.

[ Prepare to become a Certified Information Security Systems Professional with this comprehensive online course from PluralSight. Now offering a 10-day free trial! ] Even a small increase in demand may result in line overloads and failures. These initial line failures may consequently result in further line failures or as it is called, a cascading failure. An abrupt increase or decrease in the power demands by simultaneously switching on or off many high wattage IoT devices results in an imbalance between the supply and demand. This imbalance instantly results in a sudden drop in the system’s frequency. Generators trip and can causes a large-scale blackout if the imbalance is greater than the system’s threshold.

IoT security standards

The Princeton research paper explains that MadIoT attacks are hard to protect against because:

The power grid operator only sees demand in aggregate from millions of users. This makes it hard to detect and disconnect the compromised appliances that are causing the artificial demand.

An adversary can easily repeat the attack when the power is restarted. This could cause persistent blackouts.
MadIoT is a ‘black box’ attack where detailed knowledge of a power grid isn’t needed. Just faking the demand is enough to cause overload situations.

One would expect the government to act quickly on IoT security guidelines in the face of such persistent and devastating cyberattacks. That isn’t the case. Matt Leonard reports in FCW how “Senators Mark Warner and Cory Gardner introduced the Internet of Things Cybersecurity Improvement Act of 2017. The bill prohibits agencies from acquiring IoT devices and sensors that aren’t patchable and that don’t have changeable passwords. So far, the bill hasn’t received a hearing or a vote in the Senate Homeland Security and Government Affairs Committee, which has jurisdiction over federal procurement and cybersecurity”.

The security recommendations from the IoT Security Foundation are a good framework for such guidelines. They advocate for a Hub-based security which factors in new IoT devices being installed. “The Hub device acts as a central point for trust and IoT environment management. It also makes use of existing security features – such as update mechanisms – and adds an additional layer of security to the IoT environment – such as traffic monitoring and lifecycle management. The Hub device achieves this by communicating with network elements such as routers, protocol bridges and IoT devices, aggregating information to offer support to home IoT administrators. It may also act as a gateway, enabling information sharing between the home IoT environment and other networks or entities, such as the IoT solution provider”.

This would potentially protect high wattage devices from being compromised by hackers to manipulate power demands and cause blackouts.  Bringing down our essential electric grid may be made easier with all of our new interconnected devices. That’s how asymmetrical warfare works in the first place.


Read full article at Network World


Deepak Puri is the founder of SkilledAnalysts, an IoT consulting firm based in San Francisco. Formerly he held executive positions at Oracle, Netscape and VMware. Deepak co-founded Democracy Labs, a non-profit hub that applies innovative technologies and expertise with progressive causes and campaigns. He also serves on the board of the Tides Foundation

Print Friendly, PDF & Email

Richard Spangenberg

About the Author: Richard Spangenberg, CEO and Executive Director of Digital Directorship & board member at several companies, is a senior c-suite level executive, innovative strategic marketing leader, and digital/big data/AI specialist familiar with digital transformation, cybersecurity, startups, and social media integration to existing programs.