PDA

View Full Version : Россия, Китай занимаются шпионажем и саботажем в американской электрической сети



In2HiDef
04-08-2009, 08:39 AM
WASHINGTON -- Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials.

The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls. The intruders haven't sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war.

"The Chinese have attempted to map our infrastructure, such as the electrical grid," said a senior intelligence official. "So have the Russians."

The espionage appeared pervasive across the U.S. and doesn't target a particular company or region, said a former Department of Homeland Security official. "There are intrusions, and they are growing," the former official said, referring to electrical systems. "There were a lot last year."
Discuss

Many of the intrusions were detected not by the companies in charge of the infrastructure but by U.S. intelligence agencies, officials said. Intelligence officials worry about cyber attackers taking control of electrical facilities, a nuclear power plant or financial networks via the Internet.

Authorities investigating the intrusions have found software tools left behind that could be used to destroy infrastructure components, the senior intelligence official said. He added, "If we go to war with them, they will try to turn them on."

Officials said water, sewage and other infrastructure systems also were at risk.

"Over the past several years, we have seen cyberattacks against critical infrastructures abroad, and many of our own infrastructures are as vulnerable as their foreign counterparts," Director of National Intelligence Dennis Blair recently told lawmakers. "A number of nations, including Russia and China, can disrupt elements of the U.S. information infrastructure."

Officials cautioned that the motivation of the cyberspies wasn't well understood, and they don't see an immediate danger. China, for example, has little incentive to disrupt the U.S. economy because it relies on American consumers and holds U.S. government debt.

But protecting the electrical grid and other infrastructure is a key part of the Obama administration's cybersecurity review, which is to be completed next week. Under the Bush administration, Congress approved $17 billion in secret funds to protect government networks, according to people familiar with the budget. The Obama administration is weighing whether to expand the program to address vulnerabilities in private computer networks, which would cost billions of dollars more. A senior Pentagon official said Tuesday the Pentagon has spent $100 million in the past six months repairing cyber damage.

Overseas examples show the potential havoc. In 2000, a disgruntled employee rigged a computerized control system at a water-treatment plant in Australia, releasing more than 200,000 gallons of sewage into parks, rivers and the grounds of a Hyatt hotel.

Last year, a senior Central Intelligence Agency official, Tom Donohue, told a meeting of utility company representatives in New Orleans that a cyberattack had taken out power equipment in multiple regions outside the U.S. The outage was followed with extortion demands, he said.

The U.S. electrical grid comprises three separate electric networks, covering the East, the West and Texas. Each includes many thousands of miles of transmission lines, power plants and substations. The flow of power is controlled by local utilities or regional transmission organizations. The growing reliance of utilities on Internet-based communication has increased the vulnerability of control systems to spies and hackers, according to government reports.

The sophistication of the U.S. intrusions -- which extend beyond electric to other key infrastructure systems -- suggests that China and Russia are mainly responsible, according to intelligence officials and cybersecurity specialists. While terrorist groups could develop the ability to penetrate U.S. infrastructure, they don't appear to have yet mounted attacks, these officials say.

It is nearly impossible to know whether or not an attack is government-sponsored because of the difficulty in tracking true identities in cyberspace. U.S. officials said investigators have followed electronic trails of stolen data to China and Russia.

Russian and Chinese officials have denied any wrongdoing. "These are pure speculations," said Yevgeniy Khorishko, a spokesman at the Russian Embassy. "Russia has nothing to do with the cyberattacks on the U.S. infrastructure, or on any infrastructure in any other country in the world."

A spokesman for the Chinese Embassy in Washington, Wang Baodong, said the Chinese government "resolutely oppose[s] any crime, including hacking, that destroys the Internet or computer network" and has laws barring the practice. China was ready to cooperate with other countries to counter such attacks, he said, and added that "some people overseas with Cold War mentality are indulged in fabricating the sheer lies of the so-called cyberspies in China."

Utilities are reluctant to speak about the dangers. "Much of what we've done, we can't talk about," said Ray Dotter, a spokesman at PJM Interconnection LLC, which coordinates the movement of wholesale electricity in 13 states and the District of Columbia. He said the organization has beefed up its security, in conformance with federal standards.

In January 2008, the Federal Energy Regulatory Commission approved new protection measures that required improvements in the security of computer servers and better plans for handling attacks.

Last week, Senate Democrats introduced a proposal that would require all critical infrastructure companies to meet new cybersecurity standards and grant the president emergency powers over control of the grid systems and other infrastructure.

Specialists at the U.S. Cyber Consequences Unit, a nonprofit research institute, said attack programs search for openings in a network, much as a thief tests locks on doors. Once inside, these programs and their human controllers can acquire the same access and powers as a systems administrator.

The North American Electric Reliability Corporation on Tuesday warned its members that not all of them appear to be adhering to cybersecuirty requirements. Read the letter.

The White House review of cybersecurity programs is studying ways to shield the electrical grid from such attacks, said James Lewis, who directed a study for the Center for Strategic and International Studies and has met with White House reviewers.

The reliability of the grid is ultimately the responsibility of the North American Electric Reliability Corp., an independent standards-setting organization overseen by the Federal Energy Regulatory Commission.

The NERC set standards last year requiring companies to designate "critical cyber assets." Companies, for example, must check the backgrounds of employees and install firewalls to separate administrative networks from those that control electricity flow. The group will begin auditing compliance in July.

Sixteen
04-08-2009, 09:13 AM
а еще китайцы могут одновременно по приказу партии отравить всю китайскую еду на территории США

смешно
04-08-2009, 11:11 AM
кто бы сомневался, ведь у нас системы защиты и обслуживание на низком уровне, нету хороших спецов.

crazy-mike
04-08-2009, 11:32 AM
кто бы сомневался, ведь у нас системы защиты и обслуживание на низком уровне, нету хороших спецов.
Я уже это заметил - когда тестил кусочек своего веб-краулера. :grum:
Возвращать по gethostbyaddr DNS-адреса абонентов со статическими "внешними" IP-адресами в ответ на запрос с любого хоста - это очень большая глупость!!!! Правда таких идиотов и в Европе , и в России предостаточно. :grum:
А в сетях HomePlug AV вообще-то даже довольно удобно "заниматься шпионажем".

In2HiDef
04-08-2009, 12:16 PM
Возвращать по gethostbyaddr DNS-адреса абонентов со статическими "внешними" IP-адресами в ответ на запрос с любого хоста - это очень большая глупость!!!!
Почему?

crazy-mike
04-08-2009, 12:21 PM
Почему?
Во-первых практически бесплатно любой желающий может получит информацию о сетях интернет-провайдеров практически тупым перебором адресов подсетей в убывающем порядке и использованием функции gethostbyaddr() - поскольку DNS-сервера почему-то вообще не проверяют "источника запроса" .
Ну делаете ping www.cia.gov а потом что-то похожее на:
./fuck 191 198 129
:grum:
Во-вторых - все машины клиентов открыты для DoS-атак и датаграммного флуда.
...
Ну и т.д.


#include <sys/types.h>
#include <sys/time.h>
#include <sys/resource.h>
#include <sys/stat.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <netdb.h>
#include <libpq-fe.h>

static PGconn *con=NULL;
static PGresult *res=NULL;

void doStart()
{ con=PQconnectdb("hostaddr=127.0.0.1 user=postgres dbname=www");
if(PQstatus(con)!=CONNECTION_OK) {
exit(0); return;
};
}

void doEnd()
{ PQfinish(con);
}

int isHost(char* ip)
{ char b[256]; int rc;
rc=0;
sprintf(b,"select xip from xhosts where xip='%s'::inet\0",ip);
res=PQexec(con,b);
if(res!=NULL) rc=PQntuples(res);
PQclear(res);
return rc;
}

void addHost(char* ip,char* hn)
{ char b[512];
char bn[1024];
char* t; int le;
le=0;
t=PQescapeByteaConn(con,hn,strlen(hn),&le);
bcopy(t,bn,le),bn[le]=0; PQfreemem(t);
sprintf(b,"insert into xhosts(xip,xname) values('%s'::inet,'%s')\0",ip,bn);
res=PQexec(con,b);
if(res!=NULL) printf("==>%s %s\n",ip,hn);
PQclear(res);
}

void doIt(int a1,int a2,int a3,int a4)
{ char v[128]; char* vh; int j,k,i1,i2,i3,i4; struct in_addr aa;
struct hostent *he; char** ha;
i1=a1; i2=a2; i3=a3; i4=a4;
sethostent(1);
while(i1>=0) {
while(i2>=0) {
while(i3>=0) {
while(i4>0) {
sprintf(v,"%d.%d.%d.%d\0",i1,i2,i3,i4);
printf("?%s\n",v);
k=isHost(v);
if(k==0) {
inet_aton(v,&aa);
he=gethostbyaddr(&aa,sizeof aa,AF_INET);
if(he!=NULL) {
vh=he->h_name;
addHost(v,vh);
} else {
endhostent();
sethostent(1);
};
} else printf("!!%s\n",v); /* if k=0 */
i4--;
};
i4=254;
i3--;
};
i3=254;
i2--;
};
i2=254;
i1--;
};
endhostent();
}


int main(int argc,char** argv)
{ int a1,a2,a3,a4;
if(argv[1]==NULL) a1=254,a2=254,a3=254,a4=254;
else {
a1=atoi(argv[1]);
if(argv[2]==NULL) a2=254,a3=254,a4=254;
else {
a2=atoi(argv[2]);
if(argv[3]==NULL) a3=254,a4=254;
else {
a3=atoi(argv[3]);
if(argv[4]==NULL) a4=254; else a4=atoi(argv[4]);
};
};
};
doStart();
doIt(a1,a2,a3,a4);
doEnd();
return 0;
}

Только это "голая правда на C" - а не PHP. На C всё работает раза в четыре быстрее и не так "напрягает" свою машину как PHP.
Ну и есть всякие там библиотеки типа libupnp - когда удалённый хост в этом случае может имитировать дивайс - работающий по DLNA или UPnP. Его впустят в сеть и ...:grum:

In2HiDef
04-08-2009, 12:30 PM
Во-первых практически бесплатно любой желающий может получит информацию о сетях интернет-провайдеров практически тупым перебором адресов подсетей в убывающем порядке и использованием функции gethostbyaddr()
И что? Конечно, я понимаю, что [security by obscurity] имеет свое место.


Во-вторых - все машины клиентов открыты для DoS-атак и датаграммного флуда.

Вот с этого и начинать надо

crazy-mike
04-08-2009, 12:33 PM
Вот с этого и начинать надо
"Шпионское действие" - это ведь "сбор сведений" , а не "вульгарный датаграммный флуд". :grum:
Использование стандартов DLNA и UPnP (и библиотеки libupnp :grum: ) скорее всего открывает в этом случае довольно интересные возможности.
Просто UPnP очень удобно использовать в HomePlug AV (в сетях по электропроводке)...

In2HiDef
04-08-2009, 12:34 PM
"Шпионское действие" - это ведь "сбор сведений" , а не "вульгарный датаграммный флуд".
Простая картография сети тоже не дает возможность оставить "подарочек"–вирус.

crazy-mike
04-08-2009, 12:37 PM
Простая картография сети тоже не дает возможность оставить "подарочек"–вирус.
Не совсем так - вообще-то "даёт" в некоторых случаях (по DNS-имени пользователя часто можно очень точно узнать его emal и прислать ему "сувенир на память" :grum:).