{"id":8503,"date":"2017-07-29T04:46:17","date_gmt":"2017-07-29T12:46:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/29\/news-2277\/"},"modified":"2017-07-29T04:46:17","modified_gmt":"2017-07-29T12:46:17","slug":"news-2277","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/07\/29\/news-2277\/","title":{"rendered":"How Hackers Can Use &#8216;Evil Bubbles&#8217; to Destroy an Industrial Pump"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/597b80ea81c49267751c04a5\/master\/pass\/evilbubble-FA.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Sat, 29 Jul 2017 12:00:00 +0000<\/strong><\/p>\n<p data-reactid=\"243\"><span class=\"lede\" data-reactid=\"244\"><!-- react-text: 245 -->Since the NSA\u2019s <!-- \/react-text --><\/span><!-- react-text: 246 -->infamous <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/2011\/07\/how-digital-detectives-deciphered-stuxnet\/\" data-reactid=\"247\"><!-- react-text: 248 -->Stuxnet malware<!-- \/react-text --><\/a><!-- react-text: 249 --> started exploding Iranian centrifuges, hacker attacks that disrupt big, physical systems have moved out of the realm of <!-- \/react-text --><em data-reactid=\"250\"><!-- react-text: 251 -->Die Hard<!-- \/react-text --><\/em><!-- react-text: 252 --> sequels and into reality. As those attacks <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/story\/crash-override-malware\/\" data-reactid=\"253\"><!-- react-text: 254 -->evolve<!-- \/react-text --><\/a><!-- react-text: 255 -->, the cybersecurity community has started to move beyond the question of whether hacks can impact physical infrastructure, to the more chilling question of exactly what those attacks might accomplish. Judging by one proof-of-concept demonstration, those attacks could come in more insidious and unexpected forms than defenders expect.<!-- \/react-text --><\/p>\n<p data-reactid=\"256\"><!-- react-text: 257 -->In a talk at the Black Hat security conference Thursday, Honeywell security researcher Marina Krotofil showed one example of an attack on industrial systems meant to drive home just how surreptitious the hacking of so-called cyberphysical systems\u2014physical systems that can be manipulated by digital means\u2014might be. With a laptop connected to a $50,000, 610-pound industrial pump, she showed how a hacker could leverage a hidden, highly destructive weapon on that massive machine: bubbles.<!-- \/react-text --><\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"271\">&#39;Crash Override&#39;: The Malware That Took Down a Power Grid<\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"281\">A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever<\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"291\">How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History<\/p>\n<p data-reactid=\"292\"><!-- react-text: 293 -->Midway through her talk, Krotofil pointed to a Flowserve pump system, roughly the size of a  big rig truck&#x27;s engine, in front of the crowd. To that point, it had loudly cycled water through a series of transparent pipes. Then she cued a \u201chacker\u2019 in a black hoodie on stage, who typed a command that sent a thick flow of bubbles through those pipes. A sensor on the pump registered that it was subtly vibrating, reducing its efficiency and, Krotofil said, slowly damaging it. In a matter of hours, she said, the bubbles would start to wear pits in the pump&#x27;s metal surfaces, and in days would wear down the \u201cimpellers\u201d that push water through it, until it\u2019s rendered useless.<!-- \/react-text --><\/p>\n<p data-reactid=\"294\"><!-- react-text: 295 -->\u201cBubbles can be evil,\u201d she said. \u201cThese bubbles are my attack payload. And I deliver them through the physics of the process.\u201d<!-- \/react-text --><\/p>\n<p data-reactid=\"296\"><!-- react-text: 297 -->Importantly, Krotofil&#x27;s hacker had delivered the evil bubbles without having any access to the pump component of her rig. Instead, he had only adjusted a valve further upstream to decrease the pressure in a certain chamber, which caused bubbles to form. When those bubbles strike the pump, they implode and, in a process called \u201ccavitation,\u201d turn back into a liquid, transfering their energy to the pump. \u201cThey collapse at very high velocity and high frequency, which creates massive shockwaves,\u201d Krotofil explained.<!-- \/react-text --><\/p>\n<p>Krotofil&#8217;s demo rig, a Flowserve industrial pump.<\/p>\n<p data-reactid=\"305\"><!-- react-text: 306 -->That means a hacker would be able to quietly and steadily cause damage to the pump, despite obtaining only indirect access to it. But Krotofil&#x27;s attack doesn&#x27;t merely warn about the specific the danger of hacker-induced bubbles. Instead, it&#x27;s meant as a harbinger, illustrating that in the coming world of cyberphysical hacking, attackers can use physics to cause chain reactions, inducing mayhem even in parts of a system that they haven\u2019t directly breached.<!-- \/react-text --><\/p>\n<p data-reactid=\"307\"><!-- react-text: 308 -->\u201cShe can use a less critical piece to control that critical piece of the system,\u201d says Jason Larsen, a researcher with security consultancy IOActive who worked with Krotofil on some parts of her research. \u201cIf you look at just the data flows, you\u2019re going to miss a bunch of attack vectors. There are also these physical flows that go between parts of the system.\u201d<!-- \/react-text --><\/p>\n<p data-reactid=\"309\"><!-- react-text: 310 -->That could not only allow a hacker to reach further into a sensitive system, but also make it far harder to detect their presence or the damage they&#x27;ve caused, Larsen says. Cavitation, for instance, is a hazard of industrial systems that often occurs by accident, so stealthy hackers could use it as a weapon without necessarily attracting attention.<!-- \/react-text --><\/p>\n<p data-reactid=\"313\"><!-- react-text: 314 -->&#x27;Bubbles can be evil.&#x27; \u2013 Marina Krotofil, Honeywell<!-- \/react-text --><\/p>\n<p data-reactid=\"315\"><!-- react-text: 316 -->In her talk, Krotofil argued that defending against that kind of insidious attack requires more careful, broader measurements of industrial systems to identify potential hacker attacks as they unfold. She described that kind of anomaly detection as another necessary layer of defense for those with cyberphysical systems, beyond traditional data security protections like firewalls and IT-focused intrusion detection systems. &quot;We know that we have to have defense in depth,&quot; Krotofil said. &quot;This is how we build security.&quot; Hacker attacks that meddle with physical infrastructure remain exceedingly rare. But in 2015, for instance, hackers <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/2015\/01\/german-steel-mill-hack-destruction\/\" data-reactid=\"317\"><!-- react-text: 318 -->attacked a German steel mill<!-- \/react-text --><\/a><!-- react-text: 319 -->, preventing a furnace from being shut down and causing &quot;massive&quot; damage to the facility according to a government report. And late last year, hackers used a <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/story\/crash-override-malware\/\" data-reactid=\"320\"><!-- react-text: 321 -->sophisticated piece of malware known as &quot;Crash Override&quot; or &quot;Industroyer&quot;<!-- \/react-text --><\/a><!-- react-text: 322 --> to automate an attack on the country&#x27;s state-run power company Ukrenergo, triggering a blackout in Kiev.<!-- \/react-text --><\/p>\n<p data-reactid=\"323\"><!-- react-text: 324 -->Those sorts of attacks show that physical infrastructure hacking is indeed evolving, says Larsen. &quot;What we see in research, we see attackers do five or six years later,&quot; Larsen says. Krotofil&#x27;s work, he says, &quot;is about laying the groundwork for when these attacks do start showing up.&quot; Given the potentially disastrous damage one of those physical attacks can cause, better to start imagining the future of evil bubble sabotage than wait for it to arrive.<!-- \/react-text --><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/evil-bubbles-industrial-pump-hack\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/597b80ea81c49267751c04a5\/master\/pass\/evilbubble-FA.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Sat, 29 Jul 2017 12:00:00 +0000<\/strong><\/p>\n<p>One demonstration at the Black Hat conference shows how insidious physical infrastructure hacking could be.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-8503","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8503"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8503\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}