YoVDO

Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors?

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Cryptanalysis Courses Cyber Attacks Courses Responsible Disclosure Courses

Course Description

Overview

Explore a critical cybersecurity talk from Black Hat USA 2017 that challenges the notion that power grid attacks are limited to nation-state actors. Delve into a live demonstration of exploiting a vulnerability in a feeder management relay, showcasing its potential impact on national infrastructure. Learn about mitigation strategies, including a specific firmware update addressing the vulnerability, and gain insights into future steps for securing power infrastructure. Discover the process of breaking encryption algorithms, accessing setpoints, and the responsible disclosure process. Understand the implications of cyber-attacks on smart cities and the importance of securing critical infrastructure components.

Syllabus

black hat USA 2017
Once upon a time... Understanding security and privacy for future smart cities Training and research environment
Model is there... How do you connect devices?
Accessing Setpoints From Front Panel Use buttons Over Modbus
Breaking the encryption algorithm Passcode/encrypted passcode pairs Manual cryptanalysis Chosen Plaintext Attack (CPA)
What can be done with this? Encrypted passcode is a setpoint Can change the passcode locking legitimate operators out
Responsible disclosure process We first reported this to the GE Product Security Incident Response Team in 2016 The firmware update for the affected device came out later in 2016
Mitigation GE's firmware update removes the ability to retrieve the encrypted passcode from the screen or Modbus


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube