Hacking the Lights Out
Hacking the Lights Out
IN BRIEF
MARK DUNCAN AP Photo (left); MARK PETERSON Redux Pictures (center); EBRAHIM NOROUZI AP Photo (right)
the country’s power supply. Even knowing all this, the average control system engineer
would have once dismissed out of hand the possibility of remote-
THE BREAK-IN ly launched malware getting close to critical controllers, arguing
a year ago i took part in a test exercise that centered on a ficti- that the system is not directly connected to the Internet. Then
tious cyberattack on the grid. Participants included representa- Stuxnet showed that control networks with no permanent con-
tives from utility companies, U.S. government agencies and the nection to anything else are still vulnerable. Malware can piggy-
military. (Military bases rely on power from the commercial grid, back on a USB stick that technicians plug into the control sys-
a fact that has not escaped the Pentagon’s notice.) In the test sce- tem, for example. When it comes to critical electronic circuits,
nario, malicious agents hacked into a number of transmission even the smallest back door can let an enterprising burglar in.
substations, knocking out the specialized and expensive devices Consider the case of a transmission substation, a waypoint
that ensure voltage stays constant as electricity flows across long on electricity’s journey from power plant to your home. Substa-
high-power transmission lines. By the end of the exercise half a tions take in high-voltage electricity coming from one or more
dozen devices had been destroyed, depriving power to an entire power plants, reduce the voltage and split the power into multi-
Western state for several weeks. ple output lines for local distribution. A circuit breaker guards
Computers control the grid’s mechanical devices at every each of these lines, standing ready to cut power in case of a
level, from massive generators fed by fossil fuels or uranium all fault. When one output line’s breaker trips, all of the power it
the way down to the transmission lines on your street. Most of would have carried flows to the remaining lines. It is not hard to
these computers use common operating systems such as Win- see that if all the lines are carrying power close to their capacity,
TIMELINE
Communication path
(Internet connection
or phone lines)
Botnet
City
Power lines
Information
connections
Distribution The control station must
Control station substation have up-to-the-second
Generating station Transmission The grid’s nerve centers, The last step before information about what is
It does not matter if the substation control stations monitor electricity goes into going on at every step of
fuel is coal, uranium or Electricity coming out conditions throughout. homes or businesses, the process for technicians
even solar—electricity of generating stations They are also where these substations might to make smart decisions
going into the U.S. power comes at very high supply meets demand. combine power coming about what to do next.
grid must alternate at 60 voltages—the better When demand goes up, in from a few different Hackers with access to
cycles a second, and it to avoid losses from prices follow, and a utility power stations and send thousands of ordinary
must enter perfectly electrical resistance might activate more it out on dozens or hun- computers—a so-called
aligned with the rhythm en route. Transmission power capacity to provide dreds of smaller lines. botnet—could direct
of the rest of the grid. substations are the first additional supplies. Al- Newer stations might these machines to send
An attacker might send step in bringing this though the operations be equipped with wire- messages that interrupt
instructions to a generator voltage down. Many center of a control station less communications the flow of ordinary
that throws its output off older stations have is not supposed to be equipment—either radio network traffic. Such a
by a half-step, the electrical dial-up modems so that connected to the Internet, signals or Wi-Fi. An denial-of-service attack
equivalent of throwing technicians can dial in and its business center must intruder who hides just would mean that control
your car into reverse while perform maintenance. be. A hacker might burrow outside a station’s walls operators would be mak-
heading down the highway Hackers can use these into the business side and could intercept traffic ing decisions based on old
at 50 miles per hour. devices to access and use links between that side and mimic legitimate information—something
The generator—like your change critical settings. and operations to infect instructions. akin to driving a car using
car’s transmission—will critical control systems. the information you had
end up a smoking heap. 10 seconds ago.
into contact with anything—a tree, a billboard, a house—it could mands to change substation control settings. Often these sta-
create a massive short circuit. tions are responsible for monitoring hundreds of substations
Protection relays typically prevent these shorts, but a cyber- spread over a good part of a state.
attack could interfere with the working of the relays, which Data communications between the control station and sub-
means damage would be done. Furthermore, a cyberattack could stations use specialized protocols that themselves may have vul-
also alter the information going to the control station, keeping nerabilities. If an intruder succeeds in launching a man-in-the-
operators from knowing that anything is amiss. We have all middle attack, that individual can insert a message into an ex-
seen the movies where crooks send a false video feed to a guard. change (or corrupt an existing message) that causes one or both
Control stations are also vulnerable to attack. These are com- of the computers at either end to fail. An attacker can also try
mand and control rooms with huge displays, like the war room just injecting a properly formatted message that is out of con-
in Dr. Strangelove. Control station operators use the displays to text—a digital non sequitur that crashes the machine.
monitor data gathered from the substations, then issue com- Attackers could also simply attempt to delay messages trav-