{"id":13843,"date":"2018-11-15T13:10:14","date_gmt":"2018-11-15T21:10:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/11\/15\/news-7610\/"},"modified":"2018-11-15T13:10:14","modified_gmt":"2018-11-15T21:10:14","slug":"news-7610","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/11\/15\/news-7610\/","title":{"rendered":"Compromising vital infrastructure: air traffic control"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 15 Nov 2018 20:12:06 +0000<\/strong><\/p>\n<p>While most of us know that flying is the safest mode of transport, we still feel that sigh of relief when the plane has made its landing on the runway and we can text our loved ones that we have arrived safe and sound. Accidents may be rare, but they&#8217;re often shocking and horrific and accompanied by the loss of many lives. Unfortunately, they also tend to make the news, which only heightens fear.<\/p>\n<p>In this blog post, we look at the dangers related to flying from a cybersecurity perspective. As we know, cybercriminals are motivated mostly by <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime\/\" target=\"_blank\" rel=\"noopener\">money, power, and ego<\/a>\u2014and messing with air traffic and air traffic control can boost any of those factors. While the majority of these cybersecurity incidents result in data breaches, make no mistake: Attacks on this vital infrastructure could lead to much more grim consequences.<\/p>\n<h3>Air traffic control<\/h3>\n<p>Air traffic can roughly be divided into four general categories:<\/p>\n<ul>\n<li>Public transport<\/li>\n<li>Cargo and express freight<\/li>\n<li>Military operations<\/li>\n<li>Smaller aircrafts (recreational, training, helicopters, and drones)<\/li>\n<\/ul>\n<p>Organizations like the ATO and EUROCONTROL manage the air traffic across entire continents, communicating with commercial and military bodies to control the coordination and planning of air traffic in their designated territory. These organizations work closely together, as there are many intercontinental flights that pass from one territory to another.<\/p>\n<p>Air traffic control organizations need to react quickly to incidents, and their instructions should be followed to the T. They need flawless communication to work properly, as they are crucial to maintaining the normal flow of air traffic. Therefore, these organizations and their related systems are heavily computerized. This makes them primary targets for cyberattacks.<\/p>\n<h3>Public transportation<\/h3>\n<p>Using airlines as a means of public transport brings with it certain security-related dangers. Online bookings have led to many data leaks. Recently we have learned about breaches at <a href=\"https:\/\/www.nova969.com.au\/news\/over-9-million-passengers-affected-following-airline-data-leak\" target=\"_blank\" rel=\"noopener\">Cathay Pacific<\/a>, <a href=\"https:\/\/www.theguardian.com\/business\/2018\/sep\/06\/british-airways-customer-data-stolen-from-its-website\" target=\"_blank\" rel=\"noopener\">British Airways<\/a>, <a href=\"https:\/\/allafrica.com\/view\/group\/main\/main\/id\/00064559.html\" target=\"_blank\" rel=\"noopener\">Arik Air<\/a>, and <a href=\"https:\/\/www.aircanada.com\/ca\/en\/aco\/home\/book\/travel-news-and-updates\/2018\/notice-air-canada-mobile-app-users.html\" target=\"_blank\" rel=\"noopener\">Air Canada<\/a>. Some of these breaches were website hacks. Others only concerned users of mobile apps.<\/p>\n<p>Another privacy-related cause for worry is the type of information displayed on an airline ticket or boarding pass. Some people post pictures of their tickets on social media, and\u00a0<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/qvvxv3\/why-you-should-never-post-pictures-of-your-flight-tickets-or-keys\" target=\"_blank\" rel=\"noopener\">the Aztec codes used on those tickets are easy to decipher<\/a>. This can provide a threat actor with a wealth of personally identifiable information, such as payment method, confirmation numbers, names, and addresses.<\/p>\n<p>Travelers should also pay extra attention to spam that comes in looking convincingly like a <a href=\"https:\/\/www.esecurityplanet.com\/network-security\/american-airlines-spam-delivers-malware.html\" target=\"_blank\" rel=\"noopener\">ticket confirmation<\/a>. This type of spam has been around for a few years, and is usually easy to discard\u2014except when you actually happened to have booked with the same airline being spoofed.<\/p>\n<hr \/>\n<p style=\"text-align: center;\"><em>For more travel safety tips read: <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/tips-safe-summer-travels-cybersecurity-checklist\/\" target=\"_blank\" rel=\"noopener\">Tips for safe summer travels: your cybersecurity checklist<\/a><\/em><\/p>\n<hr \/>\n<h3>Air cargo<\/h3>\n<p>Air cargo is by definition always in a hurry. If delivery of the cargo wasn&#8217;t urgent, it would have been put on a less costly mode of transportation. This makes shipment information valuable to both thieves and scammers.\u00a0How often have you received a phishing mail claiming to be shipment information from one of the major express freighters such as DHL, FedEx, or UPS? If a threat actor were to know you were expecting air cargo or an express delivery from a particular company, these blind attempts could become more targeted and efficient.<\/p>\n<h3>Military<\/h3>\n<p>In warfare, competition for air supremacy is fierce. It is defined by the USDoD and NATO as the &#8220;degree of air superiority wherein the opposing air force is incapable of effective interference.\u201d There are <a href=\"https:\/\/en.wikipedia.org\/wiki\/Air_supremacy\" target=\"_blank\" rel=\"noopener\">several levels of control of the air<\/a>, but the general idea is that air supremacy is a major goal on the way to victory.<\/p>\n<p>In modern warfare, you can expect every side to try every possible way to gain control of the air, including cyberattacks on the enemies\u2019 air traffic infrastructure. In such a scenario, the infrastructure includes planes, aircraft factories, airports, air traffic control, and the lines of communications between all of them.<\/p>\n<h3>Recreational use of the airways<\/h3>\n<p>Interfering with recreational air traffic may not be a target for cybercriminals, but recreational traffic can,\u00a0<a href=\"https:\/\/chicago.cbslocal.com\/video\/category\/news-local-news\/3736379-united-flight-narrowly-avoids-mid-air-collision-with-glider\/\" target=\"_blank\" rel=\"noopener\">and has been known to<\/a>, hinder other forms of air traffic. Drones have been reported in hundreds of near misses with commercial air liners, and one even managed to <a href=\"https:\/\/www.nytimes.com\/2015\/01\/27\/us\/white-house-drone.html\" target=\"_blank\" rel=\"noopener\">land on the grounds of the White House<\/a>. Considering that the number of drones is expected to <a href=\"https:\/\/www.businessinsider.com\/harrison-wolf-drones-disruption-aircraft-certification-2018-3\" target=\"_blank\" rel=\"noopener\">grow exponentially<\/a> in years to come\u2014with increasing commercial use-cases, such as delivery, photography, inspection, and reconnaissance\u2014expect more interference problems to emerge.<\/p>\n<p>Drones come in many forms and shapes, and the same is true for their level of security. But you can readily assume that most of them can be <a href=\"https:\/\/thehackernews.com\/2016\/10\/how-to-hack-drone.html\" target=\"_blank\" rel=\"noopener\">remotely hacked<\/a>. In the US, drone operations are not allowed within five miles of an airport unless they <a href=\"https:\/\/uavcoach.com\/controlled-airspace\/\" target=\"_blank\" rel=\"noopener\">inform traffic control<\/a>. One would expect these rules to become stricter as we proceed.<\/p>\n<h3>Terrorist attacks<\/h3>\n<p>Aircrafts have been hijacked by terrorists in the past, the most famous example being\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/September_11_attacks\" target=\"_blank\" rel=\"noopener\">9\/11<\/a>, where terrorists snuck their way onto four different aircrafts, incapacitated the pilots, and flew the planes into the World Trade Centers, Pentagon, and crashing into a field in Pennsylvania. These physical, in-person hijacks are the reason for the extensive security measures that you encounter at every major airport.<\/p>\n<p>But hijackers don\u2019t have to be physically present to cause huge damage. As demonstrated in the past,\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/3236721\/security\/homeland-security-team-remotely-hacked-a-boeing-757.html\" target=\"_blank\" rel=\"noopener\">aircrafts can be hacked remotely<\/a> and <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/iot-malware-discovered-trying-to-attack-satellite-systems-of-airplanes-ships\/d\/d-id\/1332529\" target=\"_blank\" rel=\"noopener\">malware can infect computer systems in the aircraft<\/a>.<\/p>\n<h3>Ransomware victims<\/h3>\n<p>Like any other industry, you will find many ransomware victims in the aviation and air traffic sector.<\/p>\n<p>The flight information screens on <a href=\"https:\/\/www.cbronline.com\/news\/bristol-airport-cyber-attack\" target=\"_blank\" rel=\"noopener\">Bristol Airport<\/a> went dark after the airport\u2019s administration system was the subject of a cyberattack. The attack was suspected to be ransomware, although I could not find official confirmation for this. In this case, flight operations were (thankfully) not affected.<\/p>\n<p><a href=\"https:\/\/www.nytimes.com\/2018\/03\/28\/technology\/boeing-wannacry-malware.html\" target=\"_blank\" rel=\"noopener\">Boeing<\/a> was one of the many victims of the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/wanna-cry-some-more-ransomware-roundup-special-edition\/\" target=\"_blank\" rel=\"noopener\">WannaCry attack in May 2017<\/a>, even though the attack was played down afterward, since the production lines had not been disturbed.<\/p>\n<p>As mentioned in an <a href=\"https:\/\/blog.malwarebytes.com\/101\/business\/2018\/11\/compromising-vital-infrastructure-transport-logistics\/\" target=\"_blank\" rel=\"noopener\">earlier blog<\/a>, air and express freight carrier FedEx has been a ransomware victim twice: once through their <a href=\"https:\/\/www.theregister.co.uk\/2017\/09\/20\/fedex_notpetya_damages\/\" target=\"_blank\" rel=\"noopener\">TNT division hit by NotPetya<\/a>, and once in their own delivery unit by <a href=\"https:\/\/www.wate.com\/news\/national-world\/fedex-hit-by-wannacry-ransomware\/834560132\" target=\"_blank\" rel=\"noopener\">WannaCry<\/a>.<\/p>\n<h3>Targeted cyberattacks<\/h3>\n<p>A targeted attack was suspected when malware was found in the IT network <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/78kvkq\/malware-found-in-international-airport-in-ukraine\" target=\"_blank\" rel=\"noopener\">of Boryspil International Airport<\/a>, located in the Ukraine, which reportedly included the airport&#8217;s air traffic control system. Due to rocky relations between Ukraine and Russia, attribution quickly swerved to BlackEnergy, a Russian APT group held responsible for many cyberattacks on the Ukraine.<\/p>\n<p>Ukranian aircraft builder Antonov was also a victim of <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/badrabbit-closer-look-new-version-petyanotpetya\/\" target=\"_blank\" rel=\"noopener\">NotPetya<\/a>, ransomware that was suspected of targeting Ukrainian users. In hindsight, it may just have looked that way because the malware was spread with software update systems for a Ukrainian tax accounting package called MeDoc.<\/p>\n<h3>Budget concerns<\/h3>\n<p>In 2017, the Air Traffic Control Association (ATCA) published a <a href=\"https:\/\/www.atca.org\/Uploads\/cyberuploads\/CyberWhitePaper_2017.pdf\" target=\"_blank\" rel=\"noopener\">white paper<\/a> issuing the following warning:<\/p>\n<blockquote>\n<p>Where budgets are concerned, cybersecurity is treated reactively instead of proactively.<\/p>\n<\/blockquote>\n<p>This was after a <a href=\"https:\/\/www.dataprivacyandsecurityinsider.com\/tag\/dont-wait-the-evolution-of-proactive-threat-hunting\/\" target=\"_blank\" rel=\"noopener\">2016 report by the Ponemon Institute<\/a> that found organizations did not budget for the technical, administrative, testing, and review activities that are necessary to operate a truly secure system. Instead, at least two-thirds of businesses waited until they had experienced a cyberattack or data breach to hire and retain security vendors to help.<\/p>\n<p>The budgeting process for systems architecture in the aviation industry does not account for built-in security. It would certainly make sense to include it if we want to protect our passengers and cargo making use of this vital infrastructure. It would even be more cost effective, since retroactively securing a system after an attack is usually much more expensive than preventing one.<\/p>\n<p>So, while the physical security on airports has been tightened significantly, it would seem the cybersecurity of this important infrastructure still needs a lot of work, especially when you consider the sheer number of cyberattacks on the industry that have taken place in the last few years.<\/p>\n<p>Those in the aviation, air traffic, and air cargo industries need to include cybersecurity in their budget and design proposals for 2019, otherwise the excrement might really hit the propeller.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/business-security-world\/2018\/11\/compromising-vital-infrastructure-air-traffic-control\/\">Compromising vital infrastructure: air traffic control<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/business-security-world\/2018\/11\/compromising-vital-infrastructure-air-traffic-control\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 15 Nov 2018 20:12:06 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/business-security-world\/2018\/11\/compromising-vital-infrastructure-air-traffic-control\/' title='Compromising vital infrastructure: air traffic control'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/air_traffic_control_tower.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The aviation industry and air traffic (control) are vital elements of our infrastructure. While flying is reportedly safe, how does that landscape look cybersecurity-wise?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/business-security-world\/\" rel=\"category tag\">Business<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/air-traffic\/\" rel=\"tag\">air traffic<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/air-traffic-control\/\" rel=\"tag\">air traffic control<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/atca\/\" rel=\"tag\">ATCA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ato\/\" rel=\"tag\">ATO<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/aviation\/\" rel=\"tag\">aviation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/control\/\" rel=\"tag\">control<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breaches\/\" rel=\"tag\">data breaches<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/drones\/\" rel=\"tag\">drones<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eurocontrol\/\" rel=\"tag\">EUROCONTROL<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/freight\/\" rel=\"tag\">freight<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/notpetya\/\" rel=\"tag\">NotPetya<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spam\/\" rel=\"tag\">spam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wannacry\/\" rel=\"tag\">WannaCry<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/business-security-world\/2018\/11\/compromising-vital-infrastructure-air-traffic-control\/' title='Compromising vital infrastructure: air traffic control'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/business-security-world\/2018\/11\/compromising-vital-infrastructure-air-traffic-control\/\">Compromising vital infrastructure: air traffic control<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[20183,20184,20185,20186,1000,1001,20003,4503,11740,8150,20187,20188,12830,3765,10518,12252],"class_list":["post-13843","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-air-traffic","tag-air-traffic-control","tag-atca","tag-ato","tag-aviation","tag-business","tag-control","tag-cybercrime","tag-data-breaches","tag-drones","tag-eurocontrol","tag-freight","tag-notpetya","tag-ransomware","tag-spam","tag-wannacry"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13843"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13843\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13843"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}