Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Encryption Earth Security Science Technology

Nuclear Plants Leak Critical Alerts In Unencrypted Pager Messages (arstechnica.com) 79

mdsolar quotes a report from Ars Technica: A surprisingly large number of critical infrastructure participants -- including chemical manufacturers, nuclear and electric plants, defense contractors, building operators and chip makers -- rely on unsecured wireless pagers to automate their industrial control systems. According to a new report, this practice opens them to malicious hacks and espionage. Earlier this year, researchers from security firm Trend Micro collected more than 54 million pages over a four-month span using low-cost hardware. In some cases, the messages alerted recipients to unsafe conditions affecting mission-critical infrastructure as they were detected. A heating, venting, and air-conditioning system, for instance, used an e-mail-to-pager gateway to alert a hospital to a potentially dangerous level of sewage water. Meanwhile, a supervisory and control data acquisition system belonging to one of the world's biggest chemical companies sent a page containing a complete "stack dump" of one of its devices. Other unencrypted alerts sent by or to "several nuclear plants scattered among different states" included:

-Reduced pumping flow rate
-Water leak, steam leak, radiant coolant service leak, electrohydraulic control oil leak
-Fire accidents in an unrestricted area and in an administration building
-Loss of redundancy
-People requiring off-site medical attention
-A control rod losing its position indication due to a data fault
-Nuclear contamination without personal damage
Trend Micro researchers wrote in their report titled "Leaking Beeps: Unencrypted Pager Messages in Industrial Environments": "We were surprised to see unencrypted pages coming from industrial sectors like nuclear power plants, substations, power generation plants, chemical plants, defense contractors, semiconductor and commercial manufacturers, and HVAC. These unencrypted pager messages are a valuable source of passive intelligence, the gathering of information that is unintentionally leaked by networked or connected organizations. Taken together, threat actors can do heavy reconnaissance on targets by making sense of the acquired information through paging messages. Though we are not well-versed with the terms and information used in some of the sectors in our research, we were able to determine what the pages mean, including how attackers would make use of them in an elaborate targeted attack or how industry competitors would take advantage of such information. The power generation sector is overseen by regulating bodies like the North American Electric Reliability Corporation (NERC). The NERC can impose significant fines on companies that violate critical infrastructure protection requirements, such as ensuring that communications are encrypted. Other similar regulations also exist for the chemical manufacturing sector."
This discussion has been archived. No new comments can be posted.

Nuclear Plants Leak Critical Alerts In Unencrypted Pager Messages

Comments Filter:
  • Mr. Burns (Score:4, Funny)

    by s1d3track3D ( 1504503 ) on Wednesday October 26, 2016 @02:09AM (#53152383)
    Smithers! fire that Simpson fellow!
  • by Anonymous Coward on Wednesday October 26, 2016 @02:10AM (#53152385)

    Nuclear Power - Check
    Poster mdsolar - Check

    Into the trash it goes.

    • Re:Analyzing... (Score:5, Insightful)

      by TheRealHocusLocus ( 2319802 ) on Wednesday October 26, 2016 @03:20AM (#53152521)

      No action or even credible threat items here. Pager network originally chosen for its (local) reliability of coverage and assurance of message delivery, not for sensitivity of content. Potential terrorists could learn more with a set of binoculars on the ridge overlooking the plant.

      The goofballs who use smartphones want everyone to use smartphones, or else Something Is Wrong With You. Soon we'll be wiping our asses with them.

      Likewise, encryption can be yet another point of failure, The nuclear Permissive Action Link was set to 00000000 for years because military brass decided (smartly) that the system was fail-safe enough. Arbitrary complexity is worse when its use-by-mandate is effectively a mandate to use the public Internet. Or even private virtual Internets using Internet hardware or infrastructure, or requires transport on congested radio bands.

      I'm not saying pager is da bomb either. When I carried one in the early 80s I saw voice message queue delay time grow to five minutes at times because its one-channel system was over-sold. Data only pagers busted this problem for awhile but pager companies are dissolving all over the place. Your entire world is dangling from a cellphone tower now. Hope it works out.

      I just saw a "live feed" from a campaign rally dissolve into no-audio, choppy video and spans because, as a voice-over form their control room said, "We're experiencing bandwidth issues because too many people at the rally are on their phones." Lie down with infrastructure dogs and you wind up with infrastructure fleas.

      • by AHuxley ( 892839 )
        It really depends on what is still kept working for such devices. Readers might recall the US and the Galaxy IV issue when it was discovered that one network was the pager network.
        https://en.wikipedia.org/wiki/... [wikipedia.org]
        Hope that everyone needed has a sat phone, the pager device is very different now and the POTS works :)
        • Satellite communication is only required for long distance pager networks. A pager network with a local coverage can be done on site along with the other IT infrastructure. The antenna can even be installed on site as well depending on the coverage needs. Pager networks do not require public infrastructure at all.

          • Also, pagers are allowed in restricted areas. That smartphone likely isn't allowed in a reactor building, but a one-way pager is just fine.

      • ditch the pager crap. disconnect from the web. use a mediator system and if the local politicians want to meddle, tell them you'll install a siren that goes past 11 to 35.

    • Heaven forbid that a scientist would submit a tech website's story about issues relating to tech to another tech website.

      • Re:Analyzing... (Score:5, Insightful)

        by Xenographic ( 557057 ) on Wednesday October 26, 2016 @04:39AM (#53152703) Journal

        This is a BS summary saying that they have pagers that get alerts telling operators to check things that's basically nuclear fear mongering. Which is basically all mdsolar ever writes as a story. It's to the point where I know who wrote it just by looking at the headline.

        • Re:Analyzing... (Score:5, Interesting)

          by monkeyman.kix ( 4487805 ) on Wednesday October 26, 2016 @05:04AM (#53152771)

          This is a BS summary saying that they have pagers that get alerts telling operators to check things that's basically nuclear fear mongering. Which is basically all mdsolar ever writes as a story. It's to the point where I know who wrote it just by looking at the headline.

          This. So much. It baffles me the number of stories of FUD about nuclear power that mdsolar gets published here. I am not sure who is promoting and publishing their stories but you are right...see the headline, guess that mdsolar wrote it and then confirm via the rest of the text.

          Why Slashdot?

          • BeauHD is either a clickbait tool or simply ignorant as she has proven that she can't distinguish agenda driven troll pieces from actual news or fact based articles.
        • Looks to me like a pretty accurate summary of the article that's been published on Ars.
          And a case of "Waaaaaah! Someone said something less than worshipful of nuclear power!"

          If you think the article's inaccurate, maybe you should post some actual evidence of that. And maybe you should post that to Ars where the people who actually wrote the story can benefit from your feedback.

        • Re: Analyzing... (Score:2, Interesting)

          by Anonymous Coward

          Another example of how anti nukers have to rely on misleading FUD , as the facts don't support their position.

          Yet this crap will be parroted by the ignorant press as well.

        • by Anonymous Coward

          This is a BS summary saying that they have pagers that get alerts telling operators to check things that's basically nuclear fear mongering. Which is basically all mdsolar ever writes as a story.

          The story is worded to imply that pager messages are actually used to control some devices, then of course all the examples are precisely not that at all...

    • Here is how to encrypt your pager/SMS outgoing messages using RFC822 over TLS.

      # grep smtps /etc/services
      smtps 465/tcp # SMTP over SSL (TLS)

      # openssl s_client -connect mail.yoursmtpserver.com:465

      helo 1.2.3.4
      mail from: someuser@someplace.com
      rcpt to: 1234567890@vtext.com
      data
      here is my pager/SMS message
      .
      quit

      Nobody on the wire will be reading that.

  • If the messages are unencrypted, are they not authenticated either? What's to stop someone spoofing messages that induce the operators to shut the plant down? Or even worse to take some course of action that damages the plant with the wrong action, or by ignoring warnings they think were cancelled?

    I'm sure the regulations say they should check, but we know how often those are ignored in this industry.

    • Re: (Score:3, Insightful)

      by Anonymous Coward

      Other than the fact that these are just alerting an operator to a potential condition that they need to verify before acting on?

      There's no automated responses, just waking someone up.

    • by AHuxley ( 892839 )
      What spoofing? A nuclear shift is called back to work at night due to the night shift having issues. Thats the text. Night shift if its daytime.
      The staff know to get to work without delay and help with an issue.
      Most staff also got a POTS phone that was only to be used for work in many related areas with unique skills. The phone rings, a message is given, drive to work. Re "by ignoring warnings they think were cancelled"
      The only code is to drive to work to help the night or day shift if the work POTS
      • You completely missed the whole point. If I can spoof a page then I can get the entire staff to come in to work for nothing. Once is annoying, but keep doing it and people so responding. DOS by page.
        • by AHuxley ( 892839 )
          As the AC mentioned, the problem would then be one fake call out to all staff and it would be fixed.
          • But not necessarily. In this case they don't know for sure it is spoofed, and they may well spend time troubleshooting the problem before they determine what is really going on.
    • by hawguy ( 1600213 )

      If the messages are unencrypted, are they not authenticated either? What's to stop someone spoofing messages that induce the operators to shut the plant down? Or even worse to take some course of action that damages the plant with the wrong action, or by ignoring warnings they think were cancelled?

      I'm sure the regulations say they should check, but we know how often those are ignored in this industry.

      When I get paged from work, the first thing I do is check independent monitoring systems to see if the problem that's reported is actually occurring since False alarms sometimes happen. I don't just blindly reboot a server because I get a page saying that it has a problem, I make sure that problem exists before I "fix" it.

      I'd like to think that nuclear plant workers do the same and don't vent steam from the reactor just because their pager said that pressure is high, I'd hope that they verify from multiple

      • "Core temperature normal."
        "Vent radioactive gas." YES / NO?
        "Venting prevents explosion."
        "Vent radioactive gas." YES / NO?

    • by swb ( 14022 )

      I'm pretty sure nuclear plants aren't run by just one guy who logs in when he gets a pager message and then hits the "shut down plant" button.

      There's an entire staff and it would take spoofing all of them and making the on site people not believe the actual plant control systems to take an action that would be "wrong".

  • by SeaFox ( 739806 ) on Wednesday October 26, 2016 @02:53AM (#53152467)

    No clickbait headlines here, no siree Bob.

    • Re: (Score:2, Funny)

      by BitZtream ( 692029 )

      The post if from mdsolar.

      He doesn't know how to do anything else. When it comes to anything that can any way be linked/related to solar power ... mdsolar says: solar power is good, or any other form of power is bad, will kill you, start WW3, starve the children and cause cancer well past the predicted end of the universe.

      If you look at his post history it becomes readily apparent that if solar power was generated by making babies cry, he'd be the first one to sign up, cattle prod in hand. Like wise, if it

      • by Anonymous Coward

        It's bitztream, the autism-hating Slashdot troll!

    • Army Vehicle Disappears (after being camouflaged)

      Porn Star Sues over Rear End Collision

      Oh Hail No

      There Will Be Hell Toupee

      The whole point of a headline is to be attention-getting. If you can make it clever, all the better. Nuclear Plants Leak is pure gold. Don't pretend people don't make jokes about how wind farms are hot air yuk yuk yuk. On the other hand, if you're a bit sensitive about jokes about nuclear plants leaking, well... u mad, bro?

      • The whole point of a headline is to be attention-getting. If you can make it clever, all the better. Nuclear Plants Leak is pure gold. Don't pretend people don't make jokes about how wind farms are hot air yuk yuk yuk. On the other hand, if you're a bit sensitive about jokes about nuclear plants leaking, well... u mad, bro?

        LIke "Thousands killed by solar power"? Which, by the way, is true. Getting killed falling off a roof while installing solar panels is a more common way of dying than from a nuclear acc

        • Getting killed falling off a roof while installing solar panels is a more common way of dying than from a nuclear accident

          That's true! Being a handyman is much more dangerous than being a cop. Handyman lives matter!

          On the other hand, if we embrace more large-scale solar, the deaths will go down, because those deaths are primarily from small-scale installations.

  • mdsolar clickbait (Score:4, Interesting)

    by Anonymous Coward on Wednesday October 26, 2016 @03:14AM (#53152503)

    ...strikes again. Except in extremely rare situations (the stack dump), which was of questionable usefulness to an attacker, most of this stuff is fairly benign.

    Pagers still have superior range, penetration through walls, and resistance to electrical noise compared to other technologies. If you think pager messages are bad you should see some of the wireless industrial control stuff out there. Electric grids don't use encryption because the encryption delay can be the difference between an overload or a switching command. Most industrial control stuff is horribly insecure. (eg SCADA, automotive CANs, etc)

  • Not nuke plants (Score:4, Informative)

    by Anonymous Coward on Wednesday October 26, 2016 @07:43AM (#53153463)

    I can't speak for chemical plants etc, but I do currently work at a nuclear power plant as an engineer.

    Pagers are not used for any control function of the plant. Any digital control system is scrutinized for cyber security.

    The only use of pagers is as part of a call out system, so that in case of a plant event, people are alerted to come in to resolve the issue. This is rarely used. As part of this system they also call people on the phone. No specific plant information is ever transmitted as part of this call, just the classification of the plant event. I know this because I function as a communicator in the Emergency Response Organization.

    I wish people would stop spreading lies about nukes. There are certainly some negative aspects of nuclear power. If you don't think it is worth it, then fine that is your opinion, and feel free to defend it in a rational, intellectually honest way. That people have to make stuff up to justify that opinion is telling about how strong their position is.

    • We need nuclear power that can be shut down at a moment's notice, with no further intervention necessary by the operators.

      Gen 1 designs require 30 days of cooling post-shutdown before daughter nuclei decay stops producing massive heat.

      I am looking for a salt plug that melts and scrams the core in a boron bath.

      The TESCO employees were desperate for batteries for the cooling system, because they knew what was about to happen. I have the same reactor design 50 miles away. It's colossally dumb, and we need thes

  • Park your car some 2km from a typical nuclear facility or chemical plant with a simple radio scanner. You can pick up complete operational information. Most of it will be gibberish. Alarms and notifications sent over pagers are equally useless. Without in-depth information of the inner workings of the plant this information gains you nothing, and if you have the supporting information some pager messages are the least of a plant's "espionage" worries.

    Or just wait a day and read about the upset or incident i

  • Pager is unencrypted and unauthenticated. It is trivial to spoof the messages. Pager also suffers from undetected bit errors. In my testing we had a 0.4% chance per message of a single bit error.

    There are several hospitals in Eastern Ontario that use pager for patient room transfers. Watching the pager messages you can see who is being moved and between which rooms. While this is a big privacy problem I'm also concerned that the bit errors have caused patients to be sent to the wrong room.
  • by Anonymous Coward on Wednesday October 26, 2016 @08:58AM (#53154037)

    What the fuck do they want them to do? Get a non-descript pager message telling them to go find a computer and log into their encrypted 'alert portal' to securely view the message? Yeah, because that's exactly the sort of shit they should waste their time on when getting an alert like that. You know what they'd probably do in that case? Call someone at the plant. And have an insecure conversation that could be eavesdropped on. Because, you know, security is more important than a swift response to a fucking nuclear reactor malfunction.

    I myself work in telecom. When critical infrastructure mucks up, we get paged. Nowadays it means we get text messages on our mobiles. And yes, there is some pretty important information in those sometimes. Being a security-conscious organization, we considered the potential leak of information and less informative messages. We concluded that being immediately made aware of exactly what the problem was, in a business where downtime is to be kept to less than a thousandth of a percent, was more important than a well-funded or equipped bad actor being able to determine minor facts about our infrastructure. I should hope business which handle nuclear or toxic materials, or those which are responsible for keeping the lights on and keeping people alive would have similar priorities.

    And seriously, who are you talking about securing this shit against? The guy who stole the on-call tech's pager? The gov agent with a stingray? A foreign power who's eavesdropping on the pager network (which would be dumb, as it would be a lot of effort for terribly little gain)? The terrists (who aren't that adept anyways)? You want to know the REAL threat to your security? Look at your HR dept. I GUARANTEE the lowliest drone in your organization can, within 3 months of employment, scurry off with more sensitive data than someone could get by mining your pager messages for years.

    So, security panic, clickbait, yadda yadda. This is really a back-asswards non-story.

  • Unless they're sending access codes or something sensitive like that, what's the issue? You get a page that valve #2 or tower #3 is malfunctioning, so go in and fix it. Is that really overly useful information to third parties?

    Perhaps they're worried that attackers will be able to use these to verify their attacks are working? Sorry, but if an attacker is able to remotely access systems to cause a "reactor leak" then he/she can probably see any internal statuses beyond the pagers.

    There's a trade-off between

  • Trend Micro relies on unsecured anti-virus [digitaltrends.com] to protect all their customer's computers.
  • The actual weak points are physical.

    You're doing it wrong.

  • Satellite pagers (and in more modern times, texts over the cellular network) are the most reliable way to get alarms out to field and on-call personal. Sure, someone could send a malicious fake page or text, but these alarms are mainly just heads-up to personal who are not in the operations center that something is amis. The main board will always be checked / personal will always call in and double check before anyone actually pushes any buttons.

    This is a really stupid article.

    -Matt

Promising costs nothing, it's the delivering that kills you.

Working...