{"id":11455,"date":"2018-02-12T10:46:01","date_gmt":"2018-02-12T18:46:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/02\/12\/news-5226\/"},"modified":"2018-02-12T10:46:01","modified_gmt":"2018-02-12T18:46:01","slug":"news-5226","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/02\/12\/news-5226\/","title":{"rendered":"Cryptojacking Found in Critical Infrastructure Systems Raises Alarms"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5a7e4c31263579570b6bfb15\/master\/pass\/cryptojacking_waterwaste.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Mon, 12 Feb 2018 17:09:20 +0000<\/strong><\/p>\n<p>The rise of <a href=\"https:\/\/www.wired.com\/story\/cryptojacking-cryptocurrency-mining-browser\/\">cryptojacking<\/a>\u2014which co-opts your PC or mobile device to illicitly mine cryptocurrency when you visit an infected site\u2014has fueled mining&#x27;s <a href=\"https:\/\/www.wired.com\/story\/cryptojacking-has-gotten-out-of-control\/\">increasing appeal<\/a>. But as attackers have expanded their tools to slyly outsource the number of devices, processing power, and electricity powering their mining operations, they&#x27;ve moved beyond the browser in potentially dangerous ways.<\/p>\n<p>On Thursday, the critical infrastructure security firm Radiflow announced that it had discovered cryptocurrency mining malware in the operational technology network (which does monitoring and control) of a water utility in Europe\u2014the first known instance of mining malware being used against an industrial control system.<\/p>\n<p class=\"paywall\">Radiflow is still assessing the extent of the impact, but says that the attack had a \u201csignificant impact\u201d on systems. The researchers note that the malware was built to run quietly in the background, using as much processing power as it could to mine the cryptocurrency Monero without overwhelming the system and creating obvious problems. The miner was also designed to detect and even disable security scanners and other defense tools that might flag it. Such a malware attack increases processor and network bandwidth usage, which can cause industrial control applications to hang, pause, and even crash\u2014potentially degrading an operator\u2019s ability to manage a plant.<\/p>\n<p class=\"paywall\">&quot;I&#x27;m aware of the danger of [malware miners] being on industrial control systems though I&#x27;ve never seen one in the wild,\u201d says Marco Cardacci, a consultant for the firm RedTeam Security, which specializes in industrial control. \u201cThe major concern is that industrial control systems require high processor availability, and any impact to that can cause serious safety concerns.&quot;<\/p>\n<p class=\"paywall\">Radiflow CEO Ilan Barda says the company had no idea it might discover a malicious miner when it installed intrusion detection products on the utility\u2019s network, particularly on its inner network, which wouldn\u2019t usually be exposed to the internet. \u201cIn this case their internal network had some restricted access to the internet for remote monitoring, and all of a sudden we started to see some of the servers communicating with multiple external IP addresses,\u201d Barda says. \u201cI don\u2019t think this was a targeted attack, the attackers were just trying to look for unused processing power that they could use for their benefit.\u201d<\/p>\n<p>&#x27;Industrial control systems require high processor availability, and any impact to that can cause serious safety concerns.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Marco Cardacci, RedTeam Security<\/p>\n<p class=\"paywall\">Industrial plants may prove an enticing environment for malicious miners. Many don\u2019t use a lot of processing power for baseline operations, but do draw a lot of electricity, making it relatively easy for mining malware to mask both its CPU and power consumption. And the inner networks of industrial control systems are known for running dated, unpatched software, since <a href=\"https:\/\/www.wired.com\/story\/meltdown-and-spectre-vulnerability-fix\/\">deploying new operating systems and updates can inadvertently destabilize<\/a> crucial legacy platforms. These networks generally don&#x27;t access the public internet, though, and firewalls, tight access controls, and <a href=\"https:\/\/www.wired.com\/story\/air-gap-researcher-mordechai-guri\">air gaps<\/a> often provide additional security.<\/p>\n<p class=\"paywall\">Security specialists focused on industrial control, like the researchers at Radiflow, warn that the defenses of many systems still fall short, though.<\/p>\n<p class=\"paywall\">\u201cI for one have seen a lot of poorly configured networks that have claimed to be air gapped but weren&#x27;t,\u201d RedTeam Security\u2019s Cardacci says. \u201cI am by no means saying that air gaps don&#x27;t exist, but misconfigurations occur often enough. I could definitely see the malware penetrating crucial controllers.\u201d<\/p>\n<p class=\"paywall\">With so much fallow processing power, hackers looking to mine\u2014often with automated scanning tools\u2014will happily exploit flaws in an industrial control system\u2019s defenses if it means access to the CPUs. Technicians with an inside track may also yield to temptation; reports surfaced on Friday that a group of Russian scientists were <a href=\"http:\/\/www.bbc.com\/news\/world-europe-43003740\" target=\"_blank\">recently arrested<\/a> for allegedly using the supercomputer at a secret Russian research and nuclear warhead facility for Bitcoin mining.<\/p>\n<p class=\"paywall\">\u201cThe cryptocurrency craze is just everywhere,\u201d says J\u00e9r\u00f4me Segura, lead malware intelligence analyst at the network defense firm Malwarebytes. \u201cIt\u2019s really changed the dynamic for a lot of different things. A large amount of the malware we\u2019ve been tracking has recently turned to do some mining, either as one module or completely changing attention. Rather than stealing credentials or working as ransomware, it\u2019s doing mining.\u201d<\/p>\n<p class=\"paywall\">Though in-browser cryptojacking was a novel development toward the end of 2017, malicious mining malware itself isn\u2019t new. And more and more attacks are cropping up all the time. This weekend, for example, attackers <a href=\"http:\/\/www.theregister.co.uk\/2018\/02\/11\/browsealoud_compromised_coinhive\/\" target=\"_blank\">compromised the popular web plugin Browsealoud<\/a>, allowing them to steal mining power from users on thousands of mainstream websites, including those of United States federal courts system and the United Kingdom&#x27;s National Health Service.<\/p>\n<p class=\"paywall\">Traditional mining attacks look like the Browsealoud incident, targeting individual devices like PCs or smartphones. But as the value of cryptocurrency has ballooned, the sophistication of attacks has grown in kind.<\/p>\n<p class=\"paywall\">Radiflow\u2019s Barda says that the mining malware infecting the water treatment plant, for instance, was designed to spread internally, moving laterally from the internet-connected remote monitoring server to others that weren\u2019t meant to be exposed. \u201cIt just needs to find one weak spot even on a temporary basis and it will find the way to expand,\u201d Barda says.<\/p>\n<p>&#x27;If you run miners at 100 percent, you can cause damage.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">J\u00e9r\u00f4me Segura, Malwarebytes<\/p>\n<p class=\"paywall\">Observers say it\u2019s too soon to know for sure how widespread cryptojacking will become, especially given the volatility of cryptocurrency values. But they see malicious mining cropping up in critical infrastructure as a troubling sign. While cryptojacking malware isn&#x27;t designed to pose an existential threat\u2014in the same way a parasite doesn&#x27;t want to kill its host\u2014it still wears on and degrades processors over time. Recklessly aggressive mining malware has even been known to <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/12\/currency-mining-android-malware-is-so-aggressive-it-can-physically-harm-phones\/\" target=\"_blank\">cause physical damage<\/a> to infected devices like smartphones.<\/p>\n<p class=\"paywall\">It also seems at least possible, that an attacker with goals more sinister than a quick financial gain could use mining malware to cause physical destruction to critical infrastructure controllers\u2014a <a href=\"https:\/\/www.wired.com\/story\/triton-malware-targets-industrial-safety-systems-in-the-middle-east\/\">class of rare but burgeoning attacks<\/a>.<\/p>\n<p class=\"paywall\">\u201cWe\u2019ve seen this technique with <a href=\"https:\/\/www.wired.com\/story\/petya-ransomware-ukraine\/\">ransomware like NotPetya<\/a> where it\u2019s been used as a decoy for a more dangerous attack,\u201d Segura says. \u201cMining malware could be used in the same way to look financially motivated, but in fact the goal was to trigger something like the <a href=\"https:\/\/www.wired.com\/2014\/11\/countdown-to-zero-day-stuxnet\/\">physical damage we saw with Stuxnet<\/a>. If you run miners at 100 percent you can cause damage.\u201d<\/p>\n<p class=\"paywall\">Such a calamitous attack remains hypothetical, and might not be practical. But experts urge industrial control plants to consistently audit and improve their security, and ensure that they&#x27;ve truly siloed internal networks, so there are no misconfigurations or flaws that attackers can exploit to gain access.<\/p>\n<p class=\"paywall\">&quot;Many of these systems are not hardened and are not patched with the latest updates. And they must run 24\/7, so recovery from crypto-mining, ransomware, and other malware threats is much more problematic in industrial control system networks,&quot; says Jonathan Pollet, the founder of Red Tiger Security, which consults on cybersecurity issues for heavy industrial clients like power plants and natural gas utilities. &quot; I hope this helps create a sense of urgency.&quot;<\/p>\n<p class=\"related-cne-video-component__dek\">Ransomware. It&#39;s malware but worse. It takes the contents of your device hostage and demands Bitcoin as a, you guessed it, ransom. Here&#39;s how to avoid it and what to do if your laptop gets locked.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/cryptojacking-critical-infrastructure\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5a7e4c31263579570b6bfb15\/master\/pass\/cryptojacking_waterwaste.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Mon, 12 Feb 2018 17:09:20 +0000<\/strong><\/p>\n<p>Once confined to browsers, hijacking computers to mine cryptocurrency has branched out to dangerous places.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-11455","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11455"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11455\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11455"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}