The SolarWinds Hack Can Directly Affect Industrial Control Systems

 It looks like Russian’s hackers succeeded in getting a “two-fer” in the SolarWinds hack which compromise both the IT infrastructure and direct control of building control system devices.

The Russians also got indirect control of industrial control systems via the IT network backdoors.

A highly sophisticated Russian Intelligence group has compromised the SolarWinds Orion platform. The platform’s broad base of users has been estimated at up to 18,000 customers and includes an unknown but vast number of sites.

FireEye, which was affected by SolarWinds, issued a blog on SolarWinds dated December 13, 2020, “Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor”. The blog states: “They gained access to victims via trojanized updates to Solar Wind’s Orion IT monitoring and management software. This campaign may have begun as early as Spring 2020 and is currently ongoing. Post compromise activity following this supply chain compromise has included lateral movement and data theft.”

The FireEye blog, the DHS CISA and the SolarWinds Advisory have all focused on the IT networks, network visibility, and data exfiltration/compromise. However, SolarWinds is used to manage all types of Simple Network Management Protocol (SNMP) devices and these include not just IT equipment like servers and switches, but, also Industrial Control Systems (ICS) like power and cooling systems. 

Specifically, SNMP management systems are used to monitor (using the SNMP "get" command") and control (using the SNMP "set" command) any SNMP device. SNMP management platforms like Orion also monitor and control critical power and cooling systems in mission-critical facilities even though SNMP has little or no viable security. Consequently, data center equipment can be compromised using SNMP vulnerabilities.

Most power and cooling systems in data centers, laboratories, telecom systems and network closets include SNMP communication cards or chips for the expressed purpose of allowing them to be monitored and remotely controlled. 

These power and cooling systems include:

  • Switchgear
  • Power Distribution Units
  • Rack Power Distribution Units
  • Uninterruptible Power Supplies
  • Rack Uninterruptible Power Supplies
  • Computer Room Air Conditioners and Air Handlers (CRAC and CRAH units)
  • Temperature and Humidity Sensors
  • Rack Environmental Monitoring Systems

In mission-critical facilities, it is common for multiple management platforms to have monitoring and control access to SNMP-based systems. For example, the Network Management System (NMS) like Orion typically tracks device information at the rack-level, including the servers, switches, Rack PDU's and, when present, Rack UPS, Rack Cooling, and Rack Monitoring systems. At the same time, Building Management Systems (BMS) track the central cooling units and rack cooling units while the Data Center Infrastructure Management (DCIM) system is also tracking Rack PDUs, Main PDUs, Main UPSs, and Switchgear. This gap in building risk assessments has been highlighted by the process automation experts at Control Global.

Even the most recent SNMP version, version 3, is now over 20 years old and has long been shown to be vulnerable (though not as vulnerable as versions 1 and 2). This peer-reviewed and well-researched report from the Georgia Institute of Technology shows just how easy it is to compromise SNMP devices and cause physical damage.  

Devices that are using SNMP are insecure and can easily be compromised.  The Russians used SNMP communication cards as attack vectors in their 2015 attack on the Ukrainian power grid that left hundreds of thousands without power.

The Russians used targeted the UPS in the control center as the starting point for their attack.  In short, they placed code on the UPS that made it shut down at precisely the moment when they also started a Denial of Service (DoS) attack on the telecom switch (just as shown above in the consequences of SNMP attacks as outlined by the Georgia Tech paper).  Simultaneously, they opened the main breaker that delivers power to the Ukrainian power grid serving much of the country.

It has long been speculated that the Russians have been using the Ukraine as the "test laboratory" for more extensive cyberattacks they intend to use against other countries. Unfortunately, we can now say that they have succeeded in this SolarWinds Orion attack. 

While almost all are searching for malicious code on servers and managed switches, the reality is that code has likely been placed on power and cooling systems' SNMP cards throughout mission-critical enterprises around the globe. SNMP malware is extremely difficult to detect, and there are only a handful of people who have been involved in finding and managing this type of malware. 

The Russians spent significant efforts to deliver the BlackEnergy2 malware that is still in the US grids. The Russians modified it to create BlackEnergy3 which was used in the Ukrainian power grid attacks where the starting point was hacking the UPSs which use SNMP.  Now they spent a significant amount of effort to develop SolarWinds which enables direct access to the SNMP devices in more than 18,000 customers who have critical buildings (e.g., data centers, control centers, laboratories, manufacturing buildings, etc.) with SNMP devices.  

This attack demonstrates the need for the paradigm shift for control system cyber security by having an independent view of the control system devices not connected to any IP network. At what point will control systems be adequately addressed?

About The Author:  Joe Weiss  is an international authority on cybersecurity, control systems and system security. He is Managing Partner at Applied Control Sloutions.

You Might Also Read: 

Russian Hackers Have Stolen US Secrets:

 

« The Different Types of Malware
How To Optimize The DevSecOps Pipeline »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

SecureWorks

SecureWorks

SecureWorks provides intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

NXP Semiconductors

NXP Semiconductors

NXP is a world leader in secure connectivity solutions for embedded applications and the Internet of Things.

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

CyVolve

CyVolve

Cyvolve is the next great leap forward in data security, ensuring constant encryption and pervasive control over all your data.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

SafeTech Informatics & Consulting

SafeTech Informatics & Consulting

Safetech's OTShield detects, prevents and analyses cyber-attacks in SCADA and Industrial IoT systems by utilising state of the art deception techniques.

Ribbon Communications

Ribbon Communications

Ribbon Communications delivers global communications software and network solutions to service providers, enterprises, and critical infrastructure sectors.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

Virtual Technologies Group (VTG)

Virtual Technologies Group (VTG)

Virtual Technologies Group is a single source, IT product and services provider for SMBs and IT departments, delivering reliable, cost-efficient service, maintenance and support solutions.

Battery Ventures

Battery Ventures

Battery partners with talented founders and teams building category-defining businesses at all stages of growth.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

Quotient

Quotient

Quotient builds digital experiences that empower and inspire the American people by understanding their needs, simplifying complex technical solutions and adapting to how they work, live and learn.

Cypherleak

Cypherleak

Cypherleak provide Automated Cyber Risk Monitoring & Ai powered cyber recommendations.