Power plants vulnerable to hackers: security firm

May 20, 2011
Photo illustration of a nuclear power plant in Pottstown, Pennsylvania. US computer security research firm NSS Labs warned that it uncovered new ways that hackers could sabotage power plants, oil refineries or manufacturing operations.

US computer security research firm NSS Labs warned that it uncovered new ways that hackers could sabotage power plants, oil refineries or manufacturing operations.

"This is a global problem," NSS chief executive Rick Moy told AFP.

"There are no fixes to this right now," he continued. "Bad guys would be able to cause real environmental and physical problems and possibly loss of life."

NSS said that it shared its findings with the US Computer Emergency Readiness Team and was briefing legitimate industrial facilities that are at risk but was revealing little publicly for the sake of safety.

NSS researcher Dillon Beresford reported finding "multiple vulnerabilities" in Siemens programmable logic controllers (PLCs) used in plants worldwide to automatically regulate temperatures, pressures, turbine speeds, and more.

Those are the same devices targeted by a Stuxnet virus evidently crafted to disable an Iranian .

While the Stuxnet virus struck at PLCs through a plant's , Beresford discovered ways to reprogram the devices directly if they can be reached on a network, according to Moy.

"The security of these systems is not what it should be," Moy said.

"Comments were made that it took a nation state millions of dollars and teams of people to create Stuxnet," he continued. "We don't believe that to be true; it was not that hard to create these problems."

Beresford came up with the attacks in less than three months with a budget of $2,000 to $3,000 dollars, according to NSS.

NSS has shared its findings with the US and Germany-based Siemens, which downplayed concerns that an attack could be pulled off outside the lab and said it was working to address the vulnerabilities.

Explore further: UN General Assembly OKs digital privacy resolution

add to favorites email to friend print save as pdf

Related Stories

World's first 'cyber superweapon' attacks China

Sep 30, 2010

A computer virus dubbed the world's "first cyber superweapon" by experts and which may have been designed to attack Iran's nuclear facilities has found a new target -- China.

Stuxnet worm rampaging through Iran: IT official

Sep 27, 2010

The Stuxnet worm is mutating and wreaking further havoc on computerised industrial equipment in Iran where about 30,000 IP addresses have already been infected, IRNA news agency reported on Monday. ...

Recommended for you

Digital dilemma: How will US respond to Sony hack?

5 hours ago

The detective work blaming North Korea for the Sony hacker break-in appears so far to be largely circumstantial, The Associated Press has learned. The dramatic conclusion of a Korean role is based on subtle ...

UN General Assembly OKs digital privacy resolution

8 hours ago

The U.N. General Assembly has approved a resolution demanding better digital privacy protections for people around the world, another response to Edward Snowden's revelations about U.S. government spying.

Online privacy to remain thorny issue: survey

9 hours ago

Online privacy will remain a thorny issue over the next decade, without a widely accepted system that balances user rights and personal data collection, a survey of experts showed Thursday.

Spain: Google News vanishes amid 'Google Tax' spat

Dec 16, 2014

Google on Tuesday followed through with a pledge to shut down Google News in Spain in reaction to a Spanish law requiring news publishers to receive payment for content even if they are willing to give it away.

User comments : 3

Adjust slider to filter visible comments by rank

Display comments: newest first

spectator
not rated yet May 20, 2011
You know...

This is not the sort of thing I want to hear about.

Whenever you consult someone to help identify security risks, you shouldn't then go on the internet and broadcast to the world that you actually have security risks.

"Hey everybody, we're vulnerable!"

Seriously.
AJaremko
not rated yet May 20, 2011
Interesting use of a photo of a nuclear power plant to illustrate a story about risks at many kinds of industrial facilities. Do we remember Bhopal? I'd suggest plants manufacturing phosgene or chorine might be a greater hazard. But then, there's a nuclear=catastrophe conditioned reflex the media have learned to reinforce and use.
COCO
1 / 5 (1) May 24, 2011
is it true that the Stuxnet virus was released by Al Ciada causing much of this worry and maybe the malfunctions in Japan?

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.