Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A scheduled talk on vulnerabilities in industrial control systems was shelved at a security conference this week after the affected vendor was unable to develop a working fix.
Dillon Beresford, an analyst at security product testing company NSS Labs, and Brian Meixell, an independent researcher, planned to demonstrate at the TakeDownCon in Las Vegas how to build "industrial grade SCADA (supervisory control and data acquisition) malware without access to the target hardware," according to a conference news release.
However, the pair decided to pull the plug just hours before they were to hit the stage due to the potential of real-life harm that the research could have caused.
"Dillon decided to temporarily delay giving the talk due to the human risks and the fact that the mitigation offered by Siemens did not work," Rick Moy, president and CEO of NSS Labs said.
"We are working collaboratively with ICS-CERT (Industrial Control Systems Cyber Emergency Response Team) and the vendor and look forward to their response to the issues."
He said the researchers still plan to release their findings at a later date.
"Due to the serious physical, financial impact these issues could have on a worldwide basis, further details will be made available at the appropriate time," Moy said.
"NSS Labs is working with all parties to validate remediations for the issues."
Vulnerabilities that affected SCADA software and hardware products have been a research hotbed in recent years as these systems become interconnected with corporate data networks and the public internet, making them increasingly open to attack.
Products made by Siemens, a well-known SCADA manufacturer, were targeted by the vicious Stuxnet worm, considered the first malware written to specifically target industrial control systems.
Stuxnet exploits hit Iran's nuclear program, though no major damage occurred.
In March, an Italian researcher warned about 34 flaws in SCADA products that could allow people to monitor and control the various hardware sensors and mechanisms located in industrial environments, enabling attackers to remotely execute code via buffer and heap overflows.
A Siemens spokeswoman could not be immediately reached for comment yesterday.
Wrote Moy in a blog post: "Exploitation of vulnerabilities in systems can always have negative effects, such as loss of availability, productivity, data loss or compromise, and even result in identity theft and financial loss. However, unlike classic computer crime and exploitation, where data is remotely stolen or manipulated, attacks on industrial control systems can have devastating physical world implications such as loss of life and environmental impact."
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.