Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities

Throwback Attack: Ethical hackers take down a Google office building

  • Gary Cohen
  • April 28, 2022
Courtesy of Brett Sayles
Total
0
Shares
0
0
0
0

While much of cybersecurity focuses on protecting information technology (IT) systems, data and intellectual property, digital transformation has changed the game. As more systems are connected to the internet through the Industrial Internet of Things (IIoT), sectors like critical manufacturing, energy, chemical and water/wastewater need to be concerned about protecting their operational technology (OT) assets. One key sector that often gets overlooked, despite being listed as part of the Cybersecurity and Infrastructure Security Agency’s (CISA) critical infrastructure sectors, is commercial facilities.

In 2013, one of the most tech savvy companies on the planet, Google, had their building control system hacked at their offices in Sydney, Australia. This feat was accomplished by two security researchers, considered ethical hackers, who claimed that hundreds of other buildings had similar vulnerabilities and could easily have suffered the same fate. Of course, it stands to reason that if a company like Google was vulnerable, almost anyone would be.

Commercial facilities hacking

In early April, CISA and other government agencies put out a joint cybersecurity advisory warning that advanced hackers had proven they could take control of several programmable logic controllers (PLCs) that are used to run manufacturing plants and energy facilities. The dangers of attacks on many critical infrastructure sectors are quite clear. If an attacker can take control of an energy grid, a water/wastewater facility (as they did with Oldsmar in Florida) or a nuclear plant, they can cause serious damage to public health and safety as well as the environment.

While perhaps not as outwardly frightening, an attack on the commercial facilities sector can do the same thing. Now that everything from elevators to HVAC to camera and alarm systems are connected to the internet, threat actors have the ability to digitally disrupt physical systems. Imagine someone tampering with the elevators in a high rise, causing a boiler to explode or simply locking the doors and raising the heat to dangerous levels.

According to CISA, the commercial facilities sector is especially susceptible to attack because it operates on the principle of open public access. People are able to move freely, and “the majority of these facilities are privately owned and operated, with minimal interaction with the federal government and other regulatory entities.”

The commercial facilities sector consists of eight subsectors: entertainment and media (e.g., motion picture studios, broadcast media), gaming (e.g., casinos), lodging (e.g., hotels, motels, conference centers), outdoor events (e.g., theme and amusement parks, fairs, campgrounds, parades), public assembly (e.g., arenas, stadiums, aquariums, zoos, museums, convention centers), real estate (e.g., office and apartment buildings, condominiums, mixed use facilities, self-storage), retail (e.g., retail centers and districts, shopping malls) and sports leagues (e.g., professional sports leagues and federations).

The Google Wharf 7 hack

The Google hack started with two U.S.-based IT security researchers, Billy Rios and Terry McCorkle of security firm Cylance, who were able to easily hack into the building control system for Google’s Wharf 7 office headquarters, located on the water in the Pyrmont section of Sydney. Building control systems are computer-based systems that control and monitor a facility’s mechanical and electrical equipment — things like HVAC, fire protection and lighting. The duo found that the Australian building was vulnerable after locating it on the Shodan search engine, a popular hacker site that maps out vulnerable devices on the internet.

The Wharf 7 facility was using a building management system built on the Tridium Niagara AX platform, a platform that had been shown to have serious security issues, according to an article on the incident in Wired. Tridium had released a patch for the system at the time, but Google had not run it, a common security issue that accounts for many cyber intrusions. The researchers were thus able to obtain the administrative password (anyonesguess), giving them access to building control panels.

The system they hacked was running off a DSL line and controlled only the building’s heating and air conditioning, but it still it showed water lines and buttons marked “active overrides,” “active alarms,” “alarm console,” “LAN Diagram,” “schedule” and the building management system key. Because the pair was not out to do damage, they did not disrupt any of Google’s systems and quickly reported to issue to the tech giant.

“We didn’t want to exercise any of the management functionality on the device itself. It’s pretty fragile, and we don’t want to take that thing down,” said Rios in the Wired article.

“From that point, we could have actually installed a rootkit,” said McCorkle in the same article. “We could have taken over the operating system and accessed any other control systems that are on the same network as that one. We didn’t do that because that wasn’t the intent. … But that would be the normal path if an attacker was actually looking to do that.”

While the unpatched vulnerabilities gave the ethical hackers tremendous access — including blueprints to the floor and roof plans and diagrams of the water pipes in the building — a Google spokesperson said that the hacked system was not connected to any of the other building automation systems, other than HVAC.

Remediation of the Google hack

After being contacted by the researchers, Google confirmed the Wharf 7 breach and said it had disconnected the control system from the internet.

“We’re grateful when researchers report their findings to us,” the spokesperson told Wired. “We took appropriate action to resolve this issue.”

McCorkle, who first located the Google building on Shodan, created a spreadsheet listing all the Tridium-based control systems connected to the internet. There were more than 25,000. By searching the Tridium website, Wired found that these included a government office building in Chicago, a British Army training facility, Boeing’s manufacturing facilities, the Changi airport in Singapore, the Four Points Sheraton hotel in Sydney, and many other facilities spanning the globe.

Despite the fact that a patch existed for the Tridium vulnerability, Google — again, presumably one of the most tech-forward companies on the planet — had not implemented the patch. This likely does not bode well for the other 25,000 vulnerable systems. In fact, Rios told the Sydney Morning Herald that they had discovered thousands of building control systems on the internet that were just as exploitable, including “hospitals, banks and government buildings.”

Given that commercial facilities generally draw huge crowds, it’s essential that their systems have robust cybersecurity in place. Hackers of a commercial facility can do a lot more damage than simply ransoming company data; they can take aim at human and environmental safety.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Gary Cohen

Gary Cohen is senior editor/product manager at CFE Media.

Related Topics
  • CFE Content
  • Featured
  • news
Previous Article
  • Strategies

Cybersecurity awareness metrics: What to measure and how

  • Lance Spitzner
  • April 28, 2022
Read More
Next Article
Courtesy of: Verve Industrial
  • Strategies

Six steps to effective patch management

  • John Livingston
  • May 2, 2022
Read More
You May Also Like
Courtesy: A3/Siemens
Read More

Industrial robot utilization requires cybersecurity strategy

Courtesy: Brett Sayles
Read More

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

Read More

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

Courtesy: CFE Media and Technology
Read More

Lack of qualified cybersecurity personnel for critical infrastructure

Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
Read More

Cybersecurity-centered systems and fundamentals

Read More

Port and maritime cybersecurity vulnerabilities are getting more focus

Figure 1: For smaller organizations with limited network resources, it can be tempting to plug your machine directly into the business network. Courtesy: DMC
Read More

Securing your facility

Courtesy: Trekkor
Read More

Bridging the IT and OT gap for a power service company

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT