Hackers hit water treatment plant

Powered by SC Magazine
 

Targeted SCADA through 'astonishing' weak point.

Hackers accessed the network of a water treatment facility in the United States, destroying a water pump, according to reports.

The attack against the water utility in Springfield, Illinois may have started as early as September, but wasn't noticed until the beginning of November.

The hackers targeted its Supervisory Control and Data Acquisition System (SCADA) - the same system under attack by Stuxnet, although there's nothing to suggest that malware is at fault.

“It is unknown, at this time, the number of SCADA usernames and passwords acquired from the [water treatment] software company’s database and if any additional SCADA systems have been attacked as a result of this theft,” Illinois state security authorities said in a report, according to Wired.

The hackers apparently accessed the system via a flaw in phpMyAdmin, which Sophos security researcher Chester Wisniewski criticised as an astonishing weak point.

"Reading about this my spidey-sense was tingling," he said in a post on the Sophos blog.

"They have SCADA control systems hooked up to the public internet? And they are running phpMyAdmin?"

Wisniewski said he stopped using phpMyAdmin to run his own personal site after the "never-ending stream of sever vulnerabilities" became too much trouble.

"Convenience and price are always desirable to those responsible for managing these systems, but this is bordering on criminally negligent when you are responsible for our water, power, gas and other sensitive utilities," he said.

The US Department for Homeland Security has warned about holes in SCADA software, while a report last year warned to expect more attacks against utilities and other infrastructure.

Copyright © PC Pro, Dennis Publishing


Hackers hit water treatment plant
 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1064

Vote