{"id":40,"date":"2020-01-24T10:11:03","date_gmt":"2020-01-24T09:11:03","guid":{"rendered":"https:\/\/darcherif.fr\/?p=40"},"modified":"2021-01-30T10:35:59","modified_gmt":"2021-01-30T09:35:59","slug":"industry-4-0-corrupted-smart-factories-examples","status":"publish","type":"post","link":"https:\/\/www.darcherif.fr\/index.php\/2020\/01\/24\/industry-4-0-corrupted-smart-factories-examples\/","title":{"rendered":"Industry 4.0 : Corrupted Smart Factories examples"},"content":{"rendered":"<h2><span style=\"font-weight: 400;\">Corrupted smart factories<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In reality, hackers haven\u2019t waited around and it has been a while since they are trying to breach in the supposedly most secure facilities such as Nuclear Plant. Some of them have been successful.\u00a0<\/span><\/p>\n<div id=\"attachment_41\" style=\"width: 836px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-41\" class=\"wp-image-41\" src=\"https:\/\/darcherif.fr\/wp-content\/uploads\/2020\/01\/Nuclearplant-300x133.png\" alt=\"\" width=\"826\" height=\"366\" srcset=\"https:\/\/www.darcherif.fr\/wp-content\/uploads\/2020\/01\/Nuclearplant-300x133.png 300w, https:\/\/www.darcherif.fr\/wp-content\/uploads\/2020\/01\/Nuclearplant-1024x453.png 1024w, https:\/\/www.darcherif.fr\/wp-content\/uploads\/2020\/01\/Nuclearplant-768x340.png 768w, https:\/\/www.darcherif.fr\/wp-content\/uploads\/2020\/01\/Nuclearplant.png 1439w\" sizes=\"auto, (max-width: 826px) 100vw, 826px\" \/><p id=\"caption-attachment-41\" class=\"wp-caption-text\">Frequency of cyber-incident at Nuclear Facilities<\/p><\/div>\n<p>Nuclear and energy facilities are supposed to be the most secure factories because of the risk they present for the life of citizens. Yet, many of them were hacked or hijacked in the past years.<\/p>\n<h3>Power Plant infected by Malware from a consultant\u2019s PC<\/h3>\n<p><span style=\"font-weight: 400;\">The Davis-Besse nuclear power plant in Ohio (USA) was infected with the Slammer worm-along with 75,000 servers worldwide within 10 minutes of its release in 2003-after a consultant connected to the plant&rsquo;s corporate network. The worm did not carry a malicious payload; rather, it overwhelmed the server by scanning random IP addresses in search of new hosts in which to propagate.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Because the corporate network was connected to the plant process control system without any type of firewall, the worm was able to jump onto plant systems and take up huge amounts of bandwidth. This shut down the safety parameter display system (SPDS) for nearly five hours, and prevented operators from seeing sensitive information about the reactor core. Fortunately, the plant was not running-however, had it been operating, this malfunction could have caused a serious problem.<\/span><\/p>\n<h3>Iranian facility infected by nation-state hacker<\/h3>\n<p><span style=\"font-weight: 400;\">The United States and Israel are reported to have jointly developed the Stuxnet virus, which was deployed in two stages and destroyed nearly 1,000 of Iran&rsquo;s 9,000 IR-1-type gas centrifuges. The first stage, reportedly released as early as 2005, was active between 2007 and 2009. This version targeted Siemens programmable logic controllers (PLCs) at the Iranian Natanz uranium-enrichment facility and attempted to disrupt uranium enrichment by closing the valves that fed uranium hexafluoride gas into the centrifuges. This version of Stuxnet ceased operation in July 2009.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second version of the Stuxnet virus was reportedly released into Natanz in June 2009 and was revealed in 2010. This version attempted to disrupt uranium enrichment by altering the rotational speed of the gas centrifuges at Natanz. It is likely that this version of Stuxnet was introduced to a computer at the Iranian Natanz uranium enrichment facility through a USB stick, demonstrating that even facilities disconnected from the Internet are vulnerable to attack.<\/span><\/p>\n<h3>Korean Nuclear plant infected by Anti-Nuclear Hacktivists<\/h3>\n<p><span style=\"font-weight: 400;\">Korea Hydro and Nuclear Power Co., which operates 23 of South Korea&rsquo;s nuclear reactors, was hacked in December 2014. The hackers, claiming to be an anti-nuclear group based in Hawaii, used phishing e-mails to introduce malware into the commercial network. They then were able to steal the blueprints and manuals for two nuclear power plants, believed to be the Gori and Wolseong plants in South Korea. The hackers also obtained radiation-exposure estimates for surrounding areas, personal data for 10,000 employees, and electricity flow charts. These data were leaked via Twitter, and the hackers threatened \u00ab\u00a0destruction\u00a0\u00bb if Korea Hydro and Nuclear Power Co. did not shut down three reactors.<\/span><\/p>\n<h3>Isolated German Nuclear Plant infected by a malware<\/h3>\n<p><span style=\"font-weight: 400;\">In April 2016, reports surfaced that the Gundremmingen Nuclear Power Plant in Bavaria was infected with malware. The discovery was made in the plant\u2019s B unit, in a computer system that had been retrofitted in 2008 with data-visualization software accompanying equipment for moving nuclear fuel rods. Viruses have also infected 18 removable data drives associated with computers not connected to the plant\u2019s operating systems. There was no apparent damage.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Two of the viruses found on the plant\u2019s fuel rod\u2013 monitoring system and on the removable data drives were W32.Ramnit and Conficker. W32.Ramnit targets Microsoft Windows software systems and is designed to steal files and allow an attacker to remotely control a system that is connected to the Internet. It is often spread using removable data sticks. Conficker, which can spread through networks and jump onto removable data drives, was designed to obtain login information and financial data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The station\u2019s operator stated that the viruses \u201cappear not to have posed a threat to the facility\u2019s operations because it is isolated from the Internet.\u201d This statement raises questions about how the \u201cisolated\u201d plant became infected and why the malware went undetected for so long.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Corrupted smart factories In reality, hackers haven\u2019t waited around and it has been a while since they are trying to breach in the supposedly most secure facilities such as Nuclear Plant. Some of them have been successful.\u00a0 Nuclear and energy facilities are supposed to be the most secure factories because of the risk they present&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/www.darcherif.fr\/index.php\/2020\/01\/24\/industry-4-0-corrupted-smart-factories-examples\/\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":47,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,6],"tags":[5,4,2,3],"class_list":["post-40","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-industry-4-0","tag-cps","tag-cyber-security","tag-industry-4-0","tag-iot"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.darcherif.fr\/index.php\/wp-json\/wp\/v2\/posts\/40","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.darcherif.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.darcherif.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.darcherif.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.darcherif.fr\/index.php\/wp-json\/wp\/v2\/comments?post=40"}],"version-history":[{"count":6,"href":"https:\/\/www.darcherif.fr\/index.php\/wp-json\/wp\/v2\/posts\/40\/revisions"}],"predecessor-version":[{"id":48,"href":"https:\/\/www.darcherif.fr\/index.php\/wp-json\/wp\/v2\/posts\/40\/revisions\/48"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.darcherif.fr\/index.php\/wp-json\/wp\/v2\/media\/47"}],"wp:attachment":[{"href":"https:\/\/www.darcherif.fr\/index.php\/wp-json\/wp\/v2\/media?parent=40"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.darcherif.fr\/index.php\/wp-json\/wp\/v2\/categories?post=40"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.darcherif.fr\/index.php\/wp-json\/wp\/v2\/tags?post=40"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}