The United States invaded Venezuela’s power grid on January 3, causing power outages. That could happen here too


This blackout was not caused by bombed transmission towers or cut wires; Precise and invisible manipulation Industrial control systems that manage electrical current. The synchronization of traditional military operations with advanced cyber warfare represents a new chapter in international conflict, in which computer code that manipulates critical infrastructure is one of the most potent weapons.

To understand how a nation can extinguish the lights on its adversaries without firing a shot, you have to gain a deep understanding of the controls that regulate modern infrastructure. They are the digital brains responsible for opening valves, spinning turbines and delivering electricity.

For decades, controller devices were considered simple and isolated. However, grid modernization has transformed them into complex networked computers. as a Cybersecurity researcherI track how advanced cyber forces are leveraging this modernization by using digital technologies to control the physical behavior of machines.

My colleagues and I have demonstrated how malware can compromise controllers Create a divided reality. The malware intercepts legitimate commands sent by grid operators and replaces them with malicious instructions designed to destabilize the system.

For example, malware can send commands to quickly turn circuit breakers on and off, a technique known as flutter. This operation can cause large transformers or generators to overheat or become out of sync with the grid, causing them physical damage. These actions can lead to fires or explosions that can take months to repair.

At the same time, the malware calculates what the sensor readings should look like when the grid is operating normally and feeds these fake values ​​back to the control room. Even in the real world when a transformer is overloaded and a circuit breaker trips, the operator may see a green light and a steady voltage reading on the screen. This separation of digital images from physical reality blinds defenders, Unable to diagnose or react Until it’s too late.

People wearing hard hats standing in front of electrical equipment the size of small houses
Today’s power transformers are easily exploited by hackers. high

Historical examples of such attacks include Stuxnet Malware targeting Iran’s nuclear enrichment plants. The malware destroyed centrifuges in 2009, causing them to spin at dangerous speeds while feeding operators false “normal” data.

Another example is industrialist 2016 Russian attack on Ukraine’s energy sector. The Industroyer malware targets the Ukrainian power grid, exploiting the grid’s own industrial communication protocols to directly open circuit breakers and cut power to Kyiv.

recent, Volta Typhoon The Chinese attacks on U.S. critical infrastructure that came to light in 2023 were a campaign focused on pre-positioning. Unlike traditional sabotage, these hackers infiltrate networks to remain dormant and undetected, gaining the ability to disrupt U.S. communications and power systems during future crises.

To defend against such attacks, the U.S. military’s Cyber ​​Command has adopted “defensive lineman” strategy to proactively hunt for foreign cyber threats before they reach U.S. soil.

Domestically, the Cybersecurity and Infrastructure Security Agency promotes “security by design” principles, urging manufacturers to eliminate default passwords and utilities to implement “Zero trust” Architecture that assumes the network has been compromised.

supply chain vulnerability

Today, there is a vulnerability lurking in cybersecurity. The supply chain of the controller itself. Dissection of firmware from major international vendors revealed a heavy reliance on third-party software components to support modern features such as encryption and cloud connectivity.

This modernization comes at a cost. Many critical devices run on outdated software libraries, some of which are years old past their end of life supportmeaning they are no longer supported by the manufacturer. This creates a shared vulnerability across the industry. single vulnerability, Ubiquitous libraries like OpenSSL – an open source software toolkit used by nearly all network servers and connected devices around the world to encrypt communications – can expose controllers from multiple manufacturers to the same attack methods.

Modern controllers have become web-enabled devices, often hosting their own management website. These embedded web servers provide an often overlooked entry point for attackers.

An attacker could infect the controller’s web application, allowing malware to execute in the web browser of any engineer or operator logged into the managed plant. This execution enables malicious code to exploit legitimate user sessions, bypass firewalls, and issue commands to the physical machine without having to crack the device’s password.

The scale of the vulnerability is so large that the potential damage extends far beyond the grid, including transportation, manufacturing and water treatment system.

Using automated scanning tools, my colleagues and I discovered a significant increase in the number of industrial controllers exposed on the public internet. Higher than industry expectations. Anyone with the right search criteria can see thousands of critical devices, from hospital equipment to substation relays. This exposure provides adversaries with rich hunting grounds to conduct reconnaissance and identify vulnerable targets that can serve as entry points into deeper, more protected networks.

The success of recent U.S. cyber operations has forced a difficult conversation about America’s vulnerabilities. The disturbing truth is that the U.S. power grid relies on the same technology, protocols, and supply chains as the compromised systems abroad. https://www.youtube.com/embed/wnhCuYRYCdM?wmode=transparent&start=0 The U.S. power grid is vulnerable to hackers.

Regulatory misalignment

However, domestic risks are exacerbated by a regulatory framework that struggles to address grid realities. My colleagues and I conducted a comprehensive survey of the U.S. electric power industry and found that Serious misalignment Between compliance with regulations and actual safety. Our research finds that while regulations establish a baseline, they often foster a checklist mentality. Utility companies are burdened with a plethora of documentation requirements that divert resources from effective safety measures.

This regulatory lag is particularly concerning given the rapid development of technologies that connect customers to the grid. The widespread adoption of distributed energy resources, such as residential solar inverters, creates massive, dispersed vulnerabilities that current regulations barely touch.

Analysis supported by the Department of Energy shows that these devices often insecure. My colleagues and I discovered that by compromising a relatively small proportion of inverters, attackers could manipulate their power output causing severe instability the entire distribution network. Unlike centralized power plants, which are protected by guards and security systems, these facilities are located in private homes and businesses.

physical accounting

Defending America’s infrastructure requires going beyond the compliance checklist that currently dominates the industry. Now, defense strategies need to match the level of sophistication of the attack. This represents a fundamental shift in security measures, taking into account How attackers manipulate physical machines.

The integration of internet-connected computers with power grids, factories and transportation networks is creating a world where the lines between code and physical destruction are irrevocably blurred.

Ensuring the resiliency of critical infrastructure requires accepting this new reality and building defenses that validate every component, rather than trusting software and hardware without question — or a green light on a control panel.

Salman Zonuzassociate professor of cybersecurity and privacy and electrical and computer engineering, Georgia Institute of Technology

This article is reproduced from dialogue Licensed under Creative Commons. read Original article.

dialogue



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *