Home | Community | Message Board


This site includes paid links. Please support our sponsors.


Welcome to the Shroomery Message Board! You are experiencing a small sample of what the site has to offer. Please login or register to post messages and view our exclusive members-only content. You'll gain access to additional forums, file attachments, board customizations, encrypted private messages, and much more!

Shop: Mushroom-Hut Substrate Mix   North Spore Cultivation Supplies

Jump to first unread post Pages: 1
Invisibletdubz
Male User Gallery


Registered: 02/26/12
Posts: 5,586
Power Plants Are Hackable Because Employees Are Still Using Pagers
    #23772064 - 10/26/16 12:59 AM (7 years, 4 months ago)

https://motherboard.vice.com/read/power-plant-pager-security-risks-report

After hackers attacked several Ukrainian power companies in December of last year, the cybersecurity of critical infrastructure has faced increased scrutiny. But, according to a new report, workers at nuclear power plants, chemical plants, defense contractors and other infrastructure sectors are still communicating—at least in part—with pagers that transmit messages without encryption, leaving them exposed to even modestly-resourced hackers.

The sort of information that plant employees transmit using pagers includes diagnostics of plants, names, contact details, and other information that researchers say could be used to create effective social engineering attacks.

“Since pager messages are typically unencrypted, attackers can view pager messages even at a distance—the only thing attackers need is a combination of some know-how on software-defined radio (SDR) and US$20 for a dongle,” the new report, from cybersecurity company Trend Micro, reads.

"Since pager messages are typically unencrypted, attackers can view pager messages even at a distance."
Over a period of four months earlier this year, Trend Micro ran equipment and software at various critical infrastructure facilities in the US and Canada. In all, the company monitored nearly 55 million records of pages (pager messages), of which around a third were alphanumeric (some pages were simply tones, or just contained numeric information).

One of the main culprits behind heavy pager use are automatic alert systems, which flag issues to employees.

“During the course of this project, we saw multiple systems utilizing pagers for alarm functions. These alarms can leak out information about the buildings’ layout, products in use, as well as other company-specific information that should not be seen by anyone outside the company,” the report reads.

Plenty of pages, however, were written by employees themselves, especially those working at nuclear power plants.

Because pagers typically don't use encryption or authentication, it is also possible for an attacker to infect their own messages into pager conversations, without a target being able to verify whether the messages came from a trusted source or not.

As for who might want to take advantage of such weaknesses, there are obvious examples like state actors looking to sabotage or gain intelligence on a facility. But private competitors might be interested in some of the information as well, the report reads.

“Any company, especially the ones who are transmitting vital information through pagers, must be concerned once they realize that they are unknowingly transmitting vital information about their facility operations,” it adds.

For companies that are using pager communications, Trend Micro recommends that they do encrypt the messages, add authentication, and also audit any possible leakage when using an email-to-pager system.

Extras: Filter Print Post Top
OfflineEllis Dee
Archangel
Male User Gallery


Registered: 06/29/01
Posts: 13,104
Loc: Fire in the sky
Last seen: 4 years, 11 months
Re: Power Plants Are Hackable Because Employees Are Still Using Pagers [Re: tdubz]
    #23774925 - 10/26/16 09:56 PM (7 years, 4 months ago)

I don't really see the usefulness of this kind of pager data other than for surveillance and casing the place as a prelude in planning physical espionage. I don't think it sounds like much of a concern for a hack attack.

I will add that I totally oppose nuclear power at all. I don't think these plants should exist and they're just a disaster waiting to happen. Besides real accidents like at chernobyl or fukushima there's the potential for human espionage and negligence. Even a long time trusted employee can develop a drinking problem or have an ugly fight with his wife and cause a meltdown though negligence or intentionally.

The best way we can secure the security of nuclear power plants is to shut them down altogether and forever.


--------------------
"If the foundations be destroyed, what can the righteous do."-King Solomon

And there was war in heaven: Michael and his angels fought against the dragon; and the dragon fought and his angels,

Extras: Filter Print Post Top
Jump to top Pages: 1

Shop: Mushroom-Hut Substrate Mix   North Spore Cultivation Supplies


Similar ThreadsPosterViewsRepliesLast post
* Transmitting data to a moving vehicle -- Wardriving, basically
( 1 2 3 all )
Baby_Hitler 3,966 40 06/02/05 05:00 PM
by Baby_Hitler
* Alternative power? TODAY 653 4 11/14/05 05:56 AM
by iateshaggy
* Light Transmitting Concrete Edame 1,417 9 03/18/04 08:11 PM
by Joshua
* Switch-mode power supply questions trendalM 1,676 16 08/06/05 11:33 AM
by trendal
* Post deleted by Administrator
( 1 2 3 all )
Alien 8,905 51 11/12/02 04:21 PM
by Anonymous
* What powers a human being? Ego Death 849 18 03/03/05 12:52 PM
by gnrm23
* HELP!!! CPU, Motherboard or Power supply? Phychotron 2,006 15 10/03/05 07:26 PM
by Phychotron
* Wood powered cars. Baby_Hitler 1,086 14 09/23/05 04:06 PM
by DocPsilocybin

Extra information
You cannot start new topics / You cannot reply to topics
HTML is disabled / BBCode is enabled
Moderator: trendal, automan, Northerner
220 topic views. 0 members, 0 guests and 1 web crawlers are browsing this forum.
[ Show Images Only | Sort by Score | Print Topic ]
Search this thread:

Copyright 1997-2024 Mind Media. Some rights reserved.

Generated in 0.027 seconds spending 0.007 seconds on 14 queries.