CONTROL NEWS YOU CAN USE SINCE 2006

Search
Close this search box.

Do You Know How and What Your Smart Building Devices Are Connected To?

Okay… Your control system was installed a couple of years ago and you were handed riser diagrams, As-Builts, mechanical drawings, etc. and you were good to go.  Right?

Maybe…

Up until recently the standard implementation for a controls network was created by the integrator and given either a 192.168.X.X or 10.0.X.X IP schema.  In some cases the only way to access the system was from a PC on the same network.  In other cases the control network did not touch the corporate network, but it was accessible remotely.  This was done by purchasing a router/VPN from a big box electronic store and your ISP (internet service provider) supplied you with a public IP to access your front-end from anywhere in the world.

But is that still the way it is setup?

If it is, it is the right way?  Or it may have been set up correctly, but because of zero change management and oversight, your control network and corporate network have converged or holes have been punched in your security.

The following examples are possible representations of what a control network may look like or maybe what is has become after a few years of “a change here” and “a change there”.  It is important that you know your control system network configuration and keep your documentation up-to-date.

Example 1 – The control network was originally air gapped (physically separated from the corporate network) and the only access was via a public IP to front end.  The public IP put the control system in jeopardy by itself.  At some point in time a second network card was added to the front-end and connected directly to the corporate network.  By doing this there is now a hole punched into the corporate network and it can be used as a pivot point to access company systems.

20160418 - Attack Examples01

 

Example 2 – The control network and corporate network are air gapped.  There is no physical connection between the two. However, the control system is exposed to the world with a public IP.  The leaves the control system vulnerable to have infected payloads ready and waiting for anyone who accesses the system.

20160418 - Attack Examples02

Example 3 – Everything in this example is behind the corporate firewall and is seemingly safe.  It has been my experience in some cases that the control system front-end is highly accessible and is used to check email, social media, etc.  This practice can either cause the front-end crash or a means for a threat actor to inject malware for data mining, command & control, etc.

20160418 - Attack Examples03

Example 4 – This example is little different in that there is a mix of public and private IP’s.  Certain parts of the system are exposed and some would think that others are not.  Depending on the system you have, most will allow tunneling, which means if the bad guy can get to a controller with attached devices, they can tunnel and command or damage the end devices.

20160418 - Attack Examples04

Example 5 – This example deals with the physical security of a control network.  In the example below, equipment with IP connectivity has been added to the network outside of the building.  Because typically there is never traffic monitoring of a control network, the bad guy connects something either inline to remotely access the network from the comfort of their home or temporarily connect and inject malicious software to perform whatever task they have chosen.

20160418 - Attack Examples05

Example 6 – In this final example, there is a segment of the control network that is exposed with a public IP and the other segment is on an internal, private network.  At some point someone wanted or needed to get data from the internal networked control equipment the other network or vice versa, so they introduce a BBMD to route the traffic across the different subnet.   Using Shodan, Censys, or ZoomEye the bad will more than likely find the BBMD and then with FREE Bacnet software scan the network and find the devices on the other side.  With this FREE Bacnet software they now have unrestricted, no password needed, command and control of these devices.

20160418 - Attack Examples06

If you haven’t reviewed your control system network architecture in a while, I suggest you do.  If you don’t have change management in place, you need to.  If you have any segment of your control network exposed to the world, work with IT and get it behind a high quality firewall.

The BlackHats are looking and probing and they have plenty of tools available to them to find you.  Let’s not make it too easy for them.

BlackHat4

 

Facebook
Twitter
LinkedIn
Pinterest

Leave a Reply

Your email address will not be published. Required fields are marked *

Stay In The Know. Join The Control Trends Newsletter.