Subtitles section Play video
From transportation, to telecommunications,
health care and banking.
The digitization of our infrastructure has made
our daily lives more convenient, but it's also
opened us up to the threat of cyberattacks.
Yahoo's hack of over 500 million accounts will
make it the biggest data breach ever.
Equifax, which, as you know, is a very large
supplier of credit information, has announced a
cybersecurity incident that they say potentially
impacts about 143 million U.S.
consumers. Marriott announcing that up to 500
million guests with reservations at Starwood
Properties could have had their data compromised.
But it's not just companies under attack.
Increasingly, power plants and other critical
infrastructures are also becoming a target.
Critical infrastructure is really anything that
makes up the backbone of society.
Everything from transportation and airlines to
banks. Cyberwarfare is the new weapon of choice.
You can run a cyberattack remotely, shut down the
critical infrastructure of other countries,
create massive destruction of refineries and
chemical plants without ever shooting a gun.
Electricity is so prevalent in our lives that we
often don't even think about it until it fails to
work. All electricity starts at a generator,
which can be powered by wind, water, coal or even
nuclear fission. After it is generated, the
electricity travels from the power plant to
transmission substations, which convert it to a
very high voltage so that it can travel long
distances. From there, the electricity travels
along power lines to another transformer, which
again converts the power, this time to a lower
voltage, before it goes into our homes and
businesses. Often people think of the power grid
as "the grid."
It's really not. It's a quilt made up of 3,000 or
so power companies that are owned by
investor-owned utilities.
But most of them are rural electric associations,
or maybe a few owned by the government.
But generally it's a mixture.
This ownership disparity also means that
utilities are regulated differently.
The focus of the regulation is to prevent the
bulk electric system from suffering a widespread
outage. So it may not affect the smaller
companies that are serving smaller cities or
rural areas. On one hand, smaller power companies
in the United States may not be as juicy of a
target because they have a small amount of
customers, say 25,000.
But on the other hand, they may be more
susceptible to cyberattacks because they don't
have a big as security team or a big as security
budget to focus on protecting their critical
systems. That's where Sistrunk comes in.
As a consultant for cybersecurity firm, FireEye,
part of Sistrunk's job involves teaching a
digital forensics class for people who want to
learn how to defend the control systems running
our power plants. And to learn how to defend
against an attack, you first have to learn to
hack. This is a small PLC, programmable logic
controller. This particular device is made by
Phoenix Contact and it's basically easy to for an
attacker to get into.
There's a lot of vulnerabilities in it.
Sistrunk demonstrated how a hacker may alter the
functions of "stop" and "go" buttons that in a
power facility may control something like a motor
or a pump. This is a web page of this PLC and
it's been hacked. You can see whenever I try to
click on the red stop button, the green start
button comes on.
So an attacker can go download the software and
change things if they wanted to.
And that's what we do in the class.
In a conventional warfare attack, the first thing
that is hit is the infrastructure, the
refineries, the electrical systems, the chemical
plants, those things that fuel the war machine.
You can simply do the same thing remotely with
cyberweapons. It seems like attackers have
crossed the Rubicon or they've crossed the red
line in the sand.
You know, that they are going after control
systems, whereas once no one cared.
Today, there are more than 9,700 power plants in
the US. Many of them were built decades ago when
operating a plant required a lot of manual labor
and cybersecurity was not a consideration.
But that's changing. Starting in the mid '80s and
early 2000s, the industry started connecting
these control systems through the enterprise
networks to the internet, for the benefit of
remote access, information sharing, etc..
Fantastic for productivity improvement and
business enhancements, but that exposed us to
cybersecurity threats.
The heart of a power plant is what is known as a
SCADA system. SCADA stands for supervisory
control and data acquisition.
These systems are made up of a combination of
software and hardware that allow operators to
monitor and control plant processes in one
central location. Besides power generation
plants, SCADA systems are ubiquitous in the
manufacturing, telecommunications and
transportation sectors, among others.
Today, a typical SCADA system is made up of
thousands of components and runs on several
different kinds of operating systems.
Because of this wide spread of operating systems,
it creates a very complex surface that security
experts have to understand before they can defend
against the many different types of exploits used
against those specific operating systems.
Since 2010, the number of attacks have increased
exponentially. The reason for it is that it's a
lucrative business for ransom attackers as well
as for nation states.
A 2015 risk report put out by the University of
Cambridge and Lloyd's, a large insurance company,
posed a hypothetical scenario in which a
cyberattack plunged 15 U.S.
states into darkness, leaving 93 million people
without power. The report estimated that the loss
to the U.S. economy would range between $243
billion to $1 trillion.
There is a belief that every system could be
compromised, especially these control systems,
since they were not originally designed for
cybersecurity, unlike computers that we use at
home and at work that are regularly patched and
protected from cyberattacks.
As reported in this "60 Minutes" episode on CNBC
from December 2014, the first cyberweapon to
cause physical damage was used in Iran in 2010.
We begin with the story of Stuxnet, a computer
virus considered to be the world's first
destructive cyberweapon.
It was launched several years ago against an
Iranian nuclear facility, almost certainly with
some U.S. involvement.
Stuxnet infected SCADA systems that were running
Windows and Siemens software within the nuclear
facility. It was used to spin centrifuges too
fast until they basically destroyed themselves.
This was the first time a virus of this type was
used to physically destroy something within a
power facility. In December 2015, hackers cut
power to around 225,000 people in Ukraine.
The incident became the first successful hack on
utilities. It was believed to have been done
through a tactic called spearphishing, where
hackers sent emails with malicious attachments to
I.T. staff and system administrators that helped
to steal the recipients' credentials.
Almost exactly a year later, hackers again shut
off power to a large part of the Ukrainian
capital. Some have blamed the attacks on Russia.
While the attacks were short lived, it showed the
world that Russia had the will and the ability to
conduct cyberwarfare in this way.
Another attack shook the cybersecurity world in
2017, this time in the Middle East.
In the past year, researchers have spotted a new
family of industrial control malware.
It's called Triton. Triton was a really alarming
piece of malware. It affected facilities in the
Middle East. And what was most alarming about it
was that it disabled what essentially was the
kill switch for a catastrophic disaster.
The metaphor I use here is relying on the police
to come help you out when your house is broken
into. But the police is asleep in his police car.
That is a metaphor of that safety system being
bypassed. Though there's not been a cyberattack
in the U.S. that has shut off power to the grid,
hackers have still gone after utility companies.
In 2016, an electric power and water utility
company paid $25,000 in bitcoin ransom after
hackers locked the utility out of its computer
systems. In 2018, the Department of Homeland
Security and the FBI issued a joint alert,
warning that Russian cyberactors had been
targeting U.S. government entities and critical
infrastructure sectors since 2016.
And in 2017, the Department of Energy disclosed a
hack at an electric utility in the western U.S.
Though the hack did not cause outages, it did
show that our power grid was vulnerable.
Most countries that the United States has an
adversarial relationship with don't actually want
to go to war with the United States.
It makes more sense for them to conduct
reconnaissance missions against our electrical
grid. For that reason, it's more realistic that
the types of attacks we see are in the name of
gathering information or opening back doors, then
some sort of catastrophic attack or an attack
similar to the one that we saw in Ukraine.
Protecting our energy grid is essential to our
national security. But there are a few reasons
why it is difficult to do.
For one, it's hard to even gauge how many cyber
attacks there are. The reason we don't have good
numbers around how many cyber attacks there are
against utilities is that most of these companies
simply don't report them.
There's not much of an incentive for utilities or
the companies that provide them with equipment to
tell the public about every cyberattack they've
had. They would risk panicking the public and
they might also even open themselves up to
further attacks if attackers know what's working
against them. That's changing.
In early 2019, the Federal Energy Regulatory
Commission updated cybersecurity standards for
electric grids.
The new standards require electric companies to
report any incidents that either compromise or
attempt to compromise electronic security
perimeters, electronic access control or
monitoring systems and physical security
perimeters associated with cyber systems.
The new reliability standard also encompasses
disruptions or attempts to disrupt the operation
of a bulk electric system or cyber system.
Like with Stuxnet, hackers may try to subvert
security measures by targeting suppliers as
opposed to going after the big utility companies.
Companies are becoming very careful about
checking the software that comes from their
suppliers. In fact, they have a test environment
whereby the updates for the software is tested to
make sure that the software they're getting from
their automation vendor is not infested with
malware. Another best practice is what is known
as PEN or penetration testing.
PEN testing is a process through which you
intentionally attack your own system, whether
with your own people or bring people from the
outside to see how well your defenses are.
But finding someone to perform this test is often
difficult. There is a shortage of over 1.5
to 2 million cybersecurity experts in our
industry, and that is something that's going to
harm us if we don't address it more proactively.
Despite these obstacles, experts stress that
there are steps we can take to mitigate the risk
of cyberthreats. Knowing what you have is the
very first thing you must do, and that's become
more and more accepted as the first thing you do,
which is gain a complete inventory of your
control systems.
The second thing that you do is understand your
vulnerabilities and address them.
Those are the holes in your system.
And the best way to do that is do some PEN
testing or vulnerability assessment.
And the third thing that we advocate is
understanding the configuration of these systems,
the brains, the genealogy of the data in your
environment and controlling that.
So when they are changed, you know.
And the last thing that we advocate, very
strongly, is assume you've been attacked.
What are you doing for recovery purposes?
Do you have the latest version of that
configuration of your system to bring the system
back up in the unfortunate occurrence of losing
the system? Adopting new technology is part of
competitive advantage.
You have to continue to automate.
You have to continue to take on new technologies
to make your business competitive.
Otherwise you get left behind.
While the threat of cyberattacks against the grid
is a real threat, and we have to be proactive
about it, and we have to prepare for it, it's
also important not to panic and to not
sensationalize. We experience reconnaissance
missions and attacks against electrical companies
every day. The majority of them are not
successful.