NYU Security Researchers at Black Hat Reveal How to Protect the Power Grid

By Ken Briodagh July 27, 2017

Cyberattacks against power grids and other critical infrastructure systems have long been considered a threat limited to nation-states due to the sophistication and resources necessary to mount them, and the increased implementations of IoT into the Smart grid. At the Black Hat USA 2017 conference in Las Vegas, a team of New York University researchers will challenge that notion by disclosing vulnerabilities in a component that combined with publicly available information provide sufficient information to model an advanced, persistent threat to the electrical grid.

Michail Maniatakos,  a research professor at the NYU Tandon School of Engineering and an assistant professor of electrical and computer engineering at NYU Abu Dhabi, will detail the discovery of a security flaw in the authentication mechanism of a legacy protective relay — a component that responds to changes in flow across the grid to isolate electrical faults. The vulnerability allows an attacker with local or remote access to extract and reverse-engineer the weakly encrypted and easily accessed passwords used to reprogram the relay's protective setpoints.

Maniatakos and his collaborators also will demonstrate how information about network topology and grid components may allow adversaries to create a model of the power system — information that can be used to pinpoint the most critical nodes of the system. Examples:

•           Some local energy commission meetings, disclosing critical power usage information, are available on YouTube (News - Alert).

•           Equipment suppliers market the sale of their critical equipment online, alerting potential adversaries to where their equipment is used.

•           The researchers were able to use Google (News - Alert) Earth to track power lines.

•           The team was able to purchase the relay on eBay (News - Alert) for about $1,000, and other equipment critical to the grid is also publicly available.

"It is essential that at each step, the energy industry considers the implications of their communication – disclosing information for the right reasons," Maniatakos said. "Some regulatory changes are clearly needed: We should never have been able to inexpensively purchase equipment critical to the power grid. But one of the most important lessons this study delivers is that cybersecurity must not be regarded as a simple issue of complying with regulations. It must be viewed as an integral element of design and operation."

The NYU researchers worked closely with GE, the manufacturer of the Multilin relay series, to release a patch to secure the vulnerability shortly after the NYU team disclosed the flaw to the company in 2016; they made only some of their findings public at Black Hat 2017 so that utilities and GE would have time to implement fixes. Their research is based on experiments in a laboratory setting, and their published findings neither instruct nor detail successful strategies for attacking existing infrastructure systems. Rather, the work highlights how such software vulnerabilities, along with publicly available yet sensitive information about the power grid, increases the potential for infrastructure attacks.

In addition to Maniatakos, the research team contributing to the Black Hat presentation includes NYU Tandon doctoral students Anastasis Keliris and Charalambos Konstantinou. Their findings will be published by Black Hat in a paper entitled GE Multilin SR Protective Relays Passcode Vulnerability. ICS-CERT (Industrial Control Systems Cyber Emergency Response Team), the U.S. cyber emergency response team, published the NYU-GE coordinated disclosure in April 2017.




Edited by Ken Briodagh


Original Page