Hackers from Anonymous have threatened attacks against the computer systems that run factories, power stations, chemical plants, and water and sewage facilities, according to the Department of Homeland Security (DHS).

“While Anonymous recently expressed intent to target [industrial control software], they have not demonstrated a capability to inflict damage to these systems,” according to a bulletin issued from the department’s National Cybersecurity and Communications Integration Center.

3 Face Hacking Charges in AZ, CA
UK Police Bust Hackers
Attackers Prey on Small Organizations
Accused LulzSec Hacker Out on Bail

Industrial control software (ICS) systems, also known as Supervisory Control And Data Acquisition (SCADA) systems, are among the most dangerous targets for hackers because successful attacks could damage or destroy the industrial equipment they control — blowing up power generators, releasing clouds of dangerous chemicals or polluting water supplies.

The bulletin, which is unclassified but restricted “For Official Use Only,” said hackers from Anonymous have posted computer code and other material that show an interest in ICS computer programs, and some ability to get access to ICS systems.

Schneider Bold

It also warns the group’s hackers “could be able to develop capabilities to gain access and trespass on [ICS] networks very quickly,” although they have not yet carried out any attacks.

The bulletin says oil and gas companies might be at particular risk because of what it calls a “green energy” agenda on the part of Anonymous, highlighting the campaign the group has supported against the trans-continental Keystone XL oil pipeline and the Alberta Tar Sands project in Canada.

“This targeting could likely extend beyond Anonymous to the broader [hacker activist] community, resulting in larger-scope actions against energy companies,” warns the bulletin, issued last month and posted Monday by the website Public Intelligence.

The bulletin notes tools used by “white hat” and “black hat” hackers to search for holes in computer security are increasingly able to look at ICS equipment.

Such tools “can be directly used with novice level skills in hacking and little to no background in control systems,” the bulletin states.

“In addition, there are control systems that are currently accessible directly from the Internet and easy to locate through Internet search engine tools and applications. These systems could be easily located and accessed with minimal skills in order to trespass, carry out nefarious activities, or conduct reconnaissance activities to be used in future operations,” the bulletin said.

The bulletin urges “owners and operators of critical infrastructure control systems … to engage in addressing the security needs of their [ICS] assets.”

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest

Share This