Iran Disrupts US Critical Infrastructure Via Exposed PLCs

submitted by

www.darkreading.com/ics-ot-security/iranian-thr…

4
47

Log in to comment

4 Comments

Programmable Logic Controllers


Yep that’s what I though, this looks like payback from that.

The Dark reading article seems to be quite detailed but isn’t very serious though. Near the end it suggest these countermeasures:

to remove PLCs from direct Internet exposure and implement secure gateways and firewalls

place the physical mode switch on the controller into the “run” position

All I can offer is surprised Pikachu face.

I’ve not worked with infrastructure PLCs but have some familiarity with industrial PLCs.

The mode switch probably actually is an effective countermeasure. It’s common to leave machinery in Setup Mode all the time as you can’t change the program or parameters in Run Mode. I.E. you usually trust your crew not poke buttons they shouldn’t. Only in large factories do you find Run Mode being used, even large shops often leaves it in Setup.

As to gateways and firewalls, the amount of machinery exposed rawdog to the entire interwebs is truly frightening. A lot of industrial equipment have exposed ports that are completely unsecured. Think RS-232 style comms that allow program and even parameter editing.

I would imagine that many sewage trearment facilities are even less technologically sophisticated than a medium size machine shop.




Insert image