Skip to main content

Hackers can take over nuclear power plants thanks to Industrial Ethernet Switches

faa bans drone flights over nuclear sites plant
Image used with permission by copyright holder
Thought large government agencies were the most alarming entities to fall victim to a cyberattack? Think again. According to new research set to be fully released at the Black Hat cybersecurity conference in Las Vegas next week, Industrial Ethernet Switches (IES), which are responsible for maintaining the internal networks of today’s factories, refineries, ports, and other industrial organizations, are vulnerable to hackers and cyberattacks. As the Daily Dot reported, these lapses in security could allow ill-intentioned individuals to “gain access to the network, take full control, and cause potentially fatal damage.” But don’t worry — researchers and scientists may or may not be working on fixing that.

The IES, which are rarely used in the everyday home setting but are commonplace in large-scale operations, especially those that could cause catastrophic damage in the case of a cyberattack, has a number of potential pitfalls that could prove problematic in certain scenarios. These pitfalls include the frequent use of “default passwords, hard-coded encryption keys, and a lack of proper authentication for firmware updates.” In combination with one another, these so-called “fundamental failures of security” form a hacker’s trifecta, making it relatively simple for attackers to access the systems in question.

Robert Lee, a security researcher and and active-duty U.S. Air Force Cyber Warfare Operations Officer told the Daily Dot, “Anything that the facility is capable of in its natural operating system, you’re [an attacker] capable of doing — and doing damage with if you control the network. With a power station, you can have major repercussions. With a hydroelectric dam, if you don’t monitor processes in a normal situation, it’ll spin out of control. Everything you have can be manipulated.”

While Lee is working with risk researcher Eireann Leverett to address these shortcomings and assuage public fears about such issues, the process is an arduous one. Leverett told the Daily Dot, “All these vulnerabilities are pervasive and endemic. Most vendors haven’t done the basics,” particularly because when the equipment was initially installed, many of today’s threats were simply not yet present in the cybersecurity landscape.

But now that hackings have grown ever more common and robust, the time is rife for a complete security overhaul, especially among companies and infrastructure that need it most. “What we don’t have is awareness,” said Lee. “There is a massive lack of security awareness in the industrial control systems community,” and that’s where attention needs to be focused first.

Lulu Chang
Former Digital Trends Contributor
Fascinated by the effects of technology on human interaction, Lulu believes that if her parents can use your new app…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more