Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A panel of aviation security professionals has named cyberattacks as the second largest threat to airlines, after natural disasters.
Speaking at the Asia-Pacific AVSEC 2011 conference this week, penetration tester Ty Miller said hackers with custom malware could remotely commandeer on-board electronics, including navigation and anti-collision systems.
Miller told conference attendees about how the Stuxnet worm targeted a specific combination of industrial control systems to cripple a nuclear enrichment facility in Iran.
According to security vendor Symantec, the Iranian attack would have required access to the facility’s design schematics, private keys of two Taiwanese manufacturers, a team of up to ten malware writers, and six months of work.
Miller expected an attack on avionics systems to be as complex for a five- to ten-person team, requiring six months of coding, and an additional “couple of years” of work to obtain aircraft schematics, flight plans and access codes via corporate espionage.
“If you can infect things like maintenance systems, and work your way to control the avionics systems of the aircraft, you could potentially control the aircraft,” the Pure Hacking CTO told iTnews.
“The likelihood of this sort of threat is low, because of the complexity, but the impact is extreme.”
In a recent, scheduled penetration test against an airline network, Miller said he was able to gain control of the network within a day from a single, physical network port with no access rights.
He escalated his privileges to a level that allowed him to access credit cards, documents, plans, communications, and databases – information that would tempt not only cybercriminals, but also competitors, he noted.
Reiterating comments he made at the Cards and Payments Australasia conference earlier this week, Miller urged organisations to deploy network access control technology to curb risks posed by rogue employees and external parties.
But he did not expect many organisations to heed his advice, telling iTnews that tighter role-based access controls would require more network administration.
While he had not yet witnessed a successful avionics attack, Miller said it was “possible” that relevant malware was in the works.
“There is no doubt that targeted hacking attacks are on the rise, however sophisticated conspiracies to steal data and takeover networks from either nation state, terrorist or individual are occurring more rapidly across the board in every industry,” he said.
“The stereotypical Die Hard 2 airport attack where aircraft controls can be taken over is no longer just a movie script ... It's an actual reality.”
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.