Skip to content

Automatic translation from Russian to English. It may contain inaccuracies.

Posts

If you peer for a long time into an article about the safety of automated process control…

December 23, 2024 at 11:30 AMMax Knyazev is typing…Telegram mirror
Post image 1
If you peer for a long time into an article about the safety of automated process control systems, you can feel that it has begun to peer into you...

I came across a curious article on Habré, where the author offers a “guaranteed secure” method of transmitting automated process control system data to the Internet. The idea is not to get into the network with technological controllers, but to “take” readings through a video stream using SCADA, and then recognize all this and publish it outside

In the author's words:
No physical connection - no hacking


By the way, the article was downvoted. Because I'm a security guy ( this time ), automated process control system belongs to IIoT ( that's two ) and I like to speculate ( that's three ), I couldn't pass by. I decided to analyze the article in detail and give clear answers why the solution proposed by the author of the article is not actually safe ( many thanks to some commentators under his article for a couple of reasonable thoughts ) 👮‍♂

Let's start with the fact that any industrial system needs data integrity monitoring mechanisms. Classic solutions have special “unidirectional diodes” or clever segmentations where UDP packets go out but not back. Such channels are audited and implement verification methods (checksums, sequence numbers, etc.). And the author’s method of “parsing the image” has neither standards nor clear guarantees that the stream will not be replaced

Let's move on. The author believes that “since there is no network, there is nothing to hack.” In fact, attackers can attack the node that generates or processes this video stream. If you manage to get into it, then instead of real values, you can mix a fake signal - as a result, the external system will work with actually false data. So the risk doesn't disappear, it just moves to another level 🎁

Another disadvantage is the complete isolation from the ability to somehow influence the parameters, request history, and filter the necessary data. This “video approach” has no feedback. If something goes wrong, the operator cannot clarify, cannot manually request the necessary registers and receive them via the network protocol. This turns real industrial monitoring into a crutch 😵‍💫

Modern best practices for ICS protection include physical segmentation (DMZ, a dedicated zone for external services), data diode (hardware module that allows information to pass only in one direction), strict access control and encryption. These are proven and accepted methods. But “taking a screenshot” is clearly not a standard, and no one guarantees its safety 📸

Yes, formally we don't have it directly connection to controllers, but the whole idea of ​​“parsing a picture” looks as if we were putting a video camera in front of the monitor and then saying: “Now you can’t hack it!” Perhaps someone will someday use a similar trick in a narrow scenario, but such a solution is not suitable for serious industrial projects

As a result, the “count from the screen” approach seems more like a fun idea than a really applicable method in practice. It is better to use classic solutions from the world of cybersecurity: segment the network, use specialized monitoring tools, secure channels and certificates. Then both reliability and ease of use will be at the proper level, and will not depend on the recognition of numbers on the monitor matrix 💯

😩 The security of automated process control systems is, first of all, a set of measures. This is the only way to truly reduce risks and avoid unpleasant surprises 😲

What do you think about this? 🎄

#information_security
#internet_things
Open original post on Telegram

Connection graph

How this work connects to others

No explicit connections have been configured for this work yet. You can still open the full graph or the timeline of all works.

Hover over a line to see what connects one work to another.

Use the mouse wheel to zoom the graph and drag it like a map.

Post
100%

Discussion

Comments

Comments are available only to confirmed email subscribers. No separate registration or password is required: a magic link opens a comment session.

Join the discussion

Enter the same email that you already used for your site subscription. We will send you a magic link to open comments on this device.

There are no approved comments here yet.