TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Global nuclear facilities 'at risk' of cyber attack

40 pointsby SimplyUselessover 9 years ago

7 comments

utefan001over 9 years ago
Once again, I call on Michelle Obama or the next first man&#x2F;lady to make cyber security your cause.<p>We need to teach our children to understand that only a fool would put critical systems on the public internet. Only a fool would forget to implement account lockout rules or forget login rate limiting (edit) --where approprate--. Only a fool would create software with built in default usernames and passwords. Hello world, the &quot;admin&quot; username does not have to be admin or administrator. Computer security today is a joke. Almost a total illusion.<p>We need to pay less attention to Kim Kardashashen and more attention to HD Moore.<p><a href="http:&#x2F;&#x2F;jklossner.com&#x2F;computerworld&#x2F;images&#x2F;security26.gif" rel="nofollow">http:&#x2F;&#x2F;jklossner.com&#x2F;computerworld&#x2F;images&#x2F;security26.gif</a>
评论 #10338867 未加载
评论 #10339350 未加载
at-fates-handsover 9 years ago
This has been on the radar of the NAE (National Academy of Engineering) for quite a while.<p>Here&#x27;s an article that was published in 2010 and talks about the risks of an attack on the power grid: <a href="https:&#x2F;&#x2F;www.nae.edu&#x2F;Publications&#x2F;Bridge&#x2F;TheElectricityGrid&#x2F;18868.aspx" rel="nofollow">https:&#x2F;&#x2F;www.nae.edu&#x2F;Publications&#x2F;Bridge&#x2F;TheElectricityGrid&#x2F;1...</a><p>Some interesting takeaways<p><i>Recent media reports, in April 2009, for example, highlighted penetrations of the U.S. electricity system by hackers. In November 2009, 60 Minutes aired a piece confirming rumors of break-ins to the Brazilian energy system in 2005 and 2007. The Nuclear Regulatory Commission confirmed that in January 2003, the Microsoft SQL Server worm known as “Slammer” infected a private computer network at the Davis-Besse nuclear power plant in Oak Harbor, Ohio, and disabled a safety monitoring system for nearly five hours. Fortunately the plant was off-line at the time. In January 2008, the Central Intelligence Agency reported knowledge of four disruptions, or threatened disruptions, by hackers of the power supplies for four cities.</i><p>Clearly, these attacks have been ongoing for a while. NAE also points out keeping software updated can lag far behind the threats:<p><i>Another problem today is that security patches are sometimes not supplied to end-users, or they are supplied but are not applied for fear of impacting system performance. Current practice is to apply an upgrade&#x2F;patch only after SCADA vendors have thoroughly tested and validated it, which can sometimes take several months.</i>
ykover 9 years ago
And this is why we need better traffic rules for the information highway.<p>Seriously, when was the last time that someone knowledgeable used the term &quot;cyber?&quot;
评论 #10339579 未加载
评论 #10340889 未加载
评论 #10339084 未加载
评论 #10339256 未加载
loaaaover 9 years ago
why these critical facilities connected(or can be connected) to internet? it is crazy
评论 #10338781 未加载
评论 #10338947 未加载
glovesover 9 years ago
I&#x27;m not even sure why this is a surprise to some people...<p>Dangerous system created &gt; People Look to break into dangerous system for personal gain &gt; Result: Danger
VLMover 9 years ago
Someone got contract money to report that nuclear is scary, cyber is scary, so cyber nuclear is therefore really scary, conclusion, more money needs to be sent their way.<p>The interesting parts are not being covered, aside from the reported grubbing for money. I skimmed the 50+ page report and its very unusual to have IT security staff on site 24x7. The infosec folks don&#x27;t share incident reports like the nuclear physics community always has (at least in the USA). Nobody does drills where they assume the computers are powned so go manual&#x2F;verbal. IDS systems are not usually deployed. Patching fixes security holes which are not tracked but results in downed systems and uptime hits which are tracked so you get one guess as to the priority of patching. The IT supply chain is not managed to the military aerospace level of examination that, say, welding gear is managed to at the plants.<p>The journalist reports of problems are bogus. However, the actual report pages 14 thru 17 were pretty interesting reading. The PLC at Browns Ferry is a typical story, they accidentally DOS&#x27;d the VFD controller for a circulation pump, so the other eighty billion procedures to protect the plant kicked in and they shut the plant down, an intentional attack would have had the same result. The Hatch story is a good example of just why plant operators hate patches, a poorly applied patch shut down the plant for days due to a SCADA misreading, if they didn&#x27;t patch the plant would not have been shut down (or maybe it would have been powned later?). Somewhat instructive story about the Korea plant that got their HR database completely powned and its treated as a &quot;nuclear plant attack&quot; even though it was just boring HR pownership like could happen to a food store or something.<p>The report explains in great detail how toxic security is currently implemented, where the nuclear engineers set everything up, and once it all works, as the last step, the infosec guys try to sprinkle magic security pixie dust and checkboxes, and they try to explain in manager language why thats possibly the dumbest possible way to build a secure system, its really pretty well written. Around page 31 of the report.<p>Cloudy Virtualization confuses people, both nuke and infosec, so you&#x27;ll have some PLC in a janitors closet but put the top secret secured by armed guards button up in the control room behind lock and key.<p>Optical data diodes are wide spread and they need more, but journalists will report successful attacks on the insecure side as being as dangerous as a hit on the secure side, and mgmt loves to write insecure side monitoring as procedure, making the ops react as if the primary coolant system just broke, even though its just some harmless metric gathering webserver.<p>I know its cheating, but verbally, from talking to people, there is a terror related to changing default passwords that some jack*ss will change the control rod PLC password to &quot;R@$Gfgsdg&quot; and promptly get hit by a bus moments before someone needs to log in and change something off shift, and now no one can shut down the reactor without a seance. Well not literally, but close. If you have physical air gapped gear if you change the default password the only possible effect is slowing down emergency response, there shouldn&#x27;t even be a password on a router console port, etc.
评论 #10340213 未加载
transfireover 9 years ago
Nuclear Power Plant Rule #1: Do not put nuclear power plant online.<p>Nuclear Power Plant Rule #2: Whomever put nuclear power plant on-line is to be fired immediately.
评论 #10339899 未加载