佛罗里达州的水骇行动突显了没有适当安全保护的远程访问工作的风险

网络安全专家长期以来一直警告说,不安全的远程工作软件是造成黑客攻击的主要弱点.

该问题在2月得到了彻底解决。 5, when hackers gained access to a Florida water treatment facility by using a dormant remote access software and then tried to poison the water supply. The hack was quickly caught by a human operator at the facility, but the incident highlights a potential economy-wide problem as the Covid-19 pandemic has pushed millions of workers to work from home.
The problem is not the fact that remote software existed. I think the problem is that an adversary got hold of the credentials such that the adversary was able to access it,” said Damon Small, Technical Director of Security Consulting at NCC Group North America.
What it underscores, speaking as an information security professional, is the need for strong authentication when critical infrastructures are going to use these sorts of remote access systems.
    CNN has reported, the treatment plant had used multiple computers running an aging version of Microsoft Windows to monitor the facility remotely. All of the computers shared a single password to access an apparently disused version of the plant’s remote management software.
    According to Pinellas County Sheriff Bob Gualtieri and a Massachusetts government advisory to public water suppliers, 黑客通过称为TeamViewer的远程访问软件获得了对水务设施控制系统的访问权限.
    马丁娜·迪尔(Martina Dier), TeamViewer的发言人, 说调查发现平台上没有可疑活动的证据.

    Why remote work can lead to hacks

    The rise of remote work has provided flexibility for people to work without risking large gatherings of coworkers. But it has also left workers more vulnerable to targeted attacks. 和, in some cases, it has put previously secured work functions online, accessible to anyone with the right credentials.
    Eric Cole, a former CIA cybersecurity expert and author of the upcoming bookCyber Crisis,” said that many critical infrastructure systems like water treatment plants were built as closed-loop systems and intentionally kept off the wider Internet.
    You had to get past the guards with the guns, the fences, the video cameras, all the physical security measures in order to get access,” 他解释.
    But starting several years ago, many utility companies began putting their systems online to pave the way for remote work. The pandemic has only sped up that processbut the heightened security needed with putting these systems online has not always followed.
    These systems were never designed for that purpose, and proper security was never put in place,” 他说.
    Damon Small, who works with oil and gas companies with far-flung locations, said there are perfectly appropriate business reasons to set these systems up to work remotely.
    It can be done securely, 太. He offered three recommendations for shoring up these systems: 1) no shared accounts; 2) multi-factor authentication; 和 3) Virtual Private Network (VPN) technology so that the systems are not directly exposed to the Internet.
    Yet he acknowledged these tips were easier said than done and take time and money.
    The problem is you can’t upgrade something like a water treatment plant as easily as an email system in a business because a water treatment plant has to be functioning all the time,” 他说.
    We have to help all these critical infrastructures as much as we can knowing we don’t have the benefit of closing down at 5 o’clock every day. How do you upgrade these things and make a system that might have been deployed two or three decades agohow do you make it resilient against 21st century attacks?”
    Until those upgrades are made, 虽然, similar hacks can be expected going forward at critical infrastructure facilities, Cole warned.
      They are more vulnerable than the average person or the average citizen would believe or like to believe,” Cole said.
      I think what this shows us is it doesn’t matter who you are, whether you’re an individual, a small company or a large company, if you have vulnerabilities you’re going to be discovered, and you are a target, and cybersecurity is your responsibility.

      评论被关闭.