iTnews
  • Home
  • News
  • Technology
  • Security

Chinese hackers take over fake water utility

By Juha Saarinen on Aug 5, 2013 6:40AM
Chinese hackers take over fake water utility

Honeypots fool hackers.

Chinese hackers thought to be linked to the country's government were caught breaking into a United States water plant — without realising it was a decoy set up by a security researcher.

The MIT Technology Review said the project by Trend Micro security researcher Kyle Wilhoit shows the attacks, which took place in December last year by means of an infected Word document, represent "the most significant proof" of people actively trying to exploit vulnerabilities in industrial control systems (ICS).

According to Wilhoit who observed the attackers taking over the honeypot, "it was 100 per cent clear that they knew what they were doing."

Known as APT1 or the Comment Crew, Wilhoit believes it is the same group of attackers based in Shanghai with links to the Chinese government that has purloined terabytes of corporate data from at least 141 companies since 2006.

Wilhoit has found that roughly half of the criticial attacks on his honeypots come from China, with Germany, UK, France, Palestine and Japan also making the list.

Overall, sixteen countries were involved in the attacks.

Between March and June this year Wilhoit's 12 honeypots attracted 74 attacks, 10 of which took complete control over the dummy ICS.

The findings were presented at the at the annual Black Hat security conference in Las Vegas over the weekend.

Attacks on networked and Internet connected industrial control systems are said to have become more commonplace in recent years.

Earlier this year, the United States Department of Homeland security released a report saying 198 attacks on infrastructure facilities were documented in 2012, many of which were classified as serious.

Most of the attacks in the US were on energy utilities, followed by water companies.

There are now calls for engineers to receive formal training in protecting against infrastructure attacks.

Queensland University of Technology researchers put forward a proposed Australian industrial control systems security curriculum (pdf) at the 2013 46th Hawaii international conference on system sciences, saying " successful cyber attack has the ability to disrupt and even damage critical infrastructure." 

The supervisory control and data acquisition (SCADA) security curriculum aims to provide greater awareness of infrastructure threats, and a five-day vulnerability analysis and system audit course.

Penetration testing and forensic analysis and incident response would also be part of the SCADA security curriculum with full lab facilities available under the proposal.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
black hatchinaicsinfosecscadasecurity

Partner Content

Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Juha Saarinen
Aug 5 2013
6:40AM
0 Comments

Related Articles

  • Hacker claims to have stolen 1 billion records of Chinese citizens
  • Police arrest thousands in global crackdown on social engineering
  • Australian organisations targeted by Aoqin Dragon hackers for a decade
  • China spied on Russian defence research institutes
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Aussie Broadband nears end of NBN PoI fibre rollout

Aussie Broadband nears end of NBN PoI fibre rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Student details, photos exposed in University of WA data breach

Student details, photos exposed in University of WA data breach

Transport for NSW exits Global Switch data centre

Transport for NSW exits Global Switch data centre

Digital Nation

Case Study: Swinburne University overhauls student management system
Case Study: Swinburne University overhauls student management system
COVER STORY: What happens when Google changes its algorithm?
COVER STORY: What happens when Google changes its algorithm?
Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Multicloud business drivers at MLC Life Insurance
Personalisation strategies need to be built from the ground up
Personalisation strategies need to be built from the ground up
COVER STORY: Multiple cloud models make security more complex
COVER STORY: Multiple cloud models make security more complex
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.