SlideShare une entreprise Scribd logo
1  sur  17
Maroochy SCADA attack, 2013 Slide 1
Cybersecurity Case Study
Maroochy water breach
http://www.slideshare.net/sommervi/cs5032-
case-study-maroochy-water-breach
Maroochy SCADA attack, 2013 Slide 2
Maroochy Shire
Image credit:
http://www.hinterlandtourism.com.au/attractions/the-maroochy-river/
Maroochy SCADA attack, 2013 Slide 3
Maroochy shire sewage system
• SCADA controlled system with 142 pumping
stations over 1157 sq km installed in 1999
• In 2000, the area sewage system had 47
unexpected faults causing extensive sewage
spillage
Maroochy SCADA attack, 2013 Slide 4
SCADA setup
Typical SCADA-controlled sewage system
This is not the system that was attacked
Maroochy SCADA attack, 2013 Slide 5
SCADA sewage control
• Special-purpose control computer at each
station to control valves and alarms
• Each system communicates with and is
controlled by central control centre
• Communications between pumping stations
and control centre by radio, rather than wired
network
Maroochy SCADA attack, 2013 Slide 6
What happened
More than 1m litres of untreated sewage released
into waterways and local parks
Maroochy SCADA attack, 2013 Slide 7
Technical problems
• Sewage pumps not operating when they
should have been
• Alarms failed to report problems to control
centre
• Communication difficulties between the
control centre and pumping stations
Maroochy SCADA attack, 2013 Slide 8
Insider attack
• Vitek Boden worked for Hunter Watertech
(system suppliers) with responsibility for the
Maroochy system installation.
• He left in 1999 after disagreements with the
company.
• He tried to get a job with local Council but
was refused.
Maroochy SCADA attack, 2013 Slide 9
Revenge!
• Boden was angry and decided to take
revenge on both his previous employer and
the Council by launching attacks on the
SCADA control systems
– He hoped that Hunter Watertech would be blamed
for the failure
• Insiders don’t have to work inside an
organisation!
Maroochy SCADA attack, 2013 Slide 10
What happened?
Image credit:
http://www.pimaweb.org/conference/april2003/pdfs/MythsAndF
actsBehindCyberSecurity.pdf
Maroochy SCADA attack, 2013 Slide 11
How it happened
• Boden stole a SCADA configuration program
from his employers when he left and installed
it on his own laptop
• He also stole radio equipment and a control
computer that could be used to impersonate a
genuine machine at a pumping station
• Insecure radio links were used to
communicate with pumping stations and
change their configurations
Maroochy SCADA attack, 2013 Slide 12
Incident timeline
• Initially, the incidents were thought to have
been caused by bugs in a newly installed
system
• However, analysis of communications
suggested that the problems were being
caused by deliberate interventions
• Problems were always caused by a specific
station id
Maroochy SCADA attack, 2013 Slide 13
Actions taken
• System was configured so that that id was not
used so messages from there had to be
malicious
• Boden as a disgruntled insider fell under
suspicion and put under surveillance
• Boden’s car was stopped after an incident
and stolen hardware and radio system
discovered
Maroochy SCADA attack, 2013 Slide 14
Causes of the problems
• Installed SCADA system was completely
insecure
– No security requirements in contract with
customer
• Procedures at Hunter Watertech were
inadequate to stop Boden stealing hardware
and software
• Insecure radio links were used for
communications
Maroochy SCADA attack, 2013 Slide 15
Causes of the problems
• Lack of monitoring and logging made
detection more difficult
• No staff training to recognise cyber attacks
• No incident response plan in place at
Maroochy Council
Maroochy SCADA attack, 2013 Slide 16
Aftermath
• On October 31, 2001 Vitek Boden was
convicted of:
– 26 counts of willfully using a computer to cause
damage
– 1 count of causing serious environment harm
• Jailed for 2 years
Maroochy SCADA attack, 2013 Slide 17
Finding out more
http://www.pimaweb.org/conference/april2
003/pdfs/MythsAndFactsBehindCyberSec
urity.pdf
http://harbor2harbour.com/?p=144
http://www.ifip.org/wcc2008/site/IFIPSampleChapter.p
df
http://csrc.nist.gov/groups/SMA/fisma/ics/documents/M
aroochy-Water-Services-Case-Study_report.pdf

Contenu connexe

Tendances

How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)Executive Leaders Network
 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104pgmaynard
 
1.3.3.2 Menggunakan prosedur keselamatan komputer yang betul
1.3.3.2 Menggunakan prosedur keselamatan komputer yang betul1.3.3.2 Menggunakan prosedur keselamatan komputer yang betul
1.3.3.2 Menggunakan prosedur keselamatan komputer yang betulJoudrey Joel
 
What is Assembly & Procedural Programming Languages?
What is Assembly & Procedural Programming Languages?What is Assembly & Procedural Programming Languages?
What is Assembly & Procedural Programming Languages?MinoshWijayarathne
 
Threat modeling web application: a case study
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case studyAntonio Fontes
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deceptionmilad saber
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
Estrategias de Ciberseguridad para enfrentar Amenzas Emergentes
Estrategias de Ciberseguridad para enfrentar Amenzas EmergentesEstrategias de Ciberseguridad para enfrentar Amenzas Emergentes
Estrategias de Ciberseguridad para enfrentar Amenzas EmergentesSecpro - Security Professionals
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatMotorola Solutions
 
How to Prevent RFI and LFI Attacks
How to Prevent RFI and LFI AttacksHow to Prevent RFI and LFI Attacks
How to Prevent RFI and LFI AttacksImperva
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 
DDoS Saldırıları ve Korunma Yolları
DDoS Saldırıları ve Korunma YollarıDDoS Saldırıları ve Korunma Yolları
DDoS Saldırıları ve Korunma YollarıBGA Cyber Security
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 

Tendances (20)

How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104
 
1.3.3.2 Menggunakan prosedur keselamatan komputer yang betul
1.3.3.2 Menggunakan prosedur keselamatan komputer yang betul1.3.3.2 Menggunakan prosedur keselamatan komputer yang betul
1.3.3.2 Menggunakan prosedur keselamatan komputer yang betul
 
What is Assembly & Procedural Programming Languages?
What is Assembly & Procedural Programming Languages?What is Assembly & Procedural Programming Languages?
What is Assembly & Procedural Programming Languages?
 
Threat modeling web application: a case study
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case study
 
BAB 10 Perkakasan komputer
BAB 10   Perkakasan komputer BAB 10   Perkakasan komputer
BAB 10 Perkakasan komputer
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Password Security
Password SecurityPassword Security
Password Security
 
Bettercap
BettercapBettercap
Bettercap
 
Introduction to ICS/SCADA security
Introduction to ICS/SCADA securityIntroduction to ICS/SCADA security
Introduction to ICS/SCADA security
 
Estrategias de Ciberseguridad para enfrentar Amenzas Emergentes
Estrategias de Ciberseguridad para enfrentar Amenzas EmergentesEstrategias de Ciberseguridad para enfrentar Amenzas Emergentes
Estrategias de Ciberseguridad para enfrentar Amenzas Emergentes
 
Gpg basics
Gpg basicsGpg basics
Gpg basics
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
How to Prevent RFI and LFI Attacks
How to Prevent RFI and LFI AttacksHow to Prevent RFI and LFI Attacks
How to Prevent RFI and LFI Attacks
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
DDoS Saldırıları ve Korunma Yolları
DDoS Saldırıları ve Korunma YollarıDDoS Saldırıları ve Korunma Yolları
DDoS Saldırıları ve Korunma Yolları
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 

En vedette

Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systemssommerville-videos
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachIan Sommerville
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecuritysommerville-videos
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflowIan Sommerville
 
Rapid elearning tools and techniques
Rapid elearning tools and techniquesRapid elearning tools and techniques
Rapid elearning tools and techniquesSteve Rayson
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecuritysommerville-videos
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systemssommerville-videos
 
Critical national infrastructure
Critical national infrastructureCritical national infrastructure
Critical national infrastructuresommerville-videos
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecuritysommerville-videos
 

En vedette (20)

Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breach
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflow
 
Rapid elearning tools and techniques
Rapid elearning tools and techniquesRapid elearning tools and techniques
Rapid elearning tools and techniques
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Infrastructure control
Infrastructure controlInfrastructure control
Infrastructure control
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systems
 
Critical national infrastructure
Critical national infrastructureCritical national infrastructure
Critical national infrastructure
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
System safety
System safetySystem safety
System safety
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Warsaw airbus accident
Warsaw airbus accidentWarsaw airbus accident
Warsaw airbus accident
 
Reuse landscape
Reuse landscapeReuse landscape
Reuse landscape
 
Intro to requirements eng.
Intro to requirements eng.Intro to requirements eng.
Intro to requirements eng.
 

Similaire à Maroochy water breach

LFI18-Solving the challenges of commissioning a wireless lighting infrastruc...
LFI18-Solving the challenges of commissioning  a wireless lighting infrastruc...LFI18-Solving the challenges of commissioning  a wireless lighting infrastruc...
LFI18-Solving the challenges of commissioning a wireless lighting infrastruc...Silvair
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentationguest85a34f
 
Io t based water level monitoring system of dams in
Io t based water level monitoring system of dams inIo t based water level monitoring system of dams in
Io t based water level monitoring system of dams insangamesh kumbar
 
APPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCY
APPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCYAPPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCY
APPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCYiQHub
 
Final presentation es1
Final presentation es1Final presentation es1
Final presentation es1Waed Shagareen
 
THE SMART BRIDGE ECE.pptx
THE SMART BRIDGE ECE.pptxTHE SMART BRIDGE ECE.pptx
THE SMART BRIDGE ECE.pptxAryanPandita10
 
Cyber Security for SCADA
Cyber Security for SCADACyber Security for SCADA
Cyber Security for SCADARichard Umbrino
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyesThousandEyes
 
Remote monitoring of noxious gases and automated control
Remote monitoring of noxious gases and automated controlRemote monitoring of noxious gases and automated control
Remote monitoring of noxious gases and automated controlPINAKI ROY
 
Tollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
Tollgrade LightHouse Asset Management Techniques Using Smart Grid SensorsTollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
Tollgrade LightHouse Asset Management Techniques Using Smart Grid SensorsTollgrade Communications
 
IRJET - Smart Drainage Management System
IRJET - Smart Drainage Management SystemIRJET - Smart Drainage Management System
IRJET - Smart Drainage Management SystemIRJET Journal
 
Intern PPT on signal and telecommunication
Intern PPT on signal and  telecommunicationIntern PPT on signal and  telecommunication
Intern PPT on signal and telecommunicationthaangu2003
 
Wireless Water Monitoring System
Wireless Water Monitoring SystemWireless Water Monitoring System
Wireless Water Monitoring SystemPraveen Sharma
 
Mini Project Presentaion
Mini Project Presentaion Mini Project Presentaion
Mini Project Presentaion Sai Mani
 
VIP Water Success Story
VIP Water Success StoryVIP Water Success Story
VIP Water Success StoryJoel Gil
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA SystemInductive Automation
 
Power Theft Detection Using IOT
Power Theft Detection Using IOTPower Theft Detection Using IOT
Power Theft Detection Using IOTSWAPNILCHAVAN28596
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA SystemInductive Automation
 

Similaire à Maroochy water breach (20)

LFI18-Solving the challenges of commissioning a wireless lighting infrastruc...
LFI18-Solving the challenges of commissioning  a wireless lighting infrastruc...LFI18-Solving the challenges of commissioning  a wireless lighting infrastruc...
LFI18-Solving the challenges of commissioning a wireless lighting infrastruc...
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
 
Io t based water level monitoring system of dams in
Io t based water level monitoring system of dams inIo t based water level monitoring system of dams in
Io t based water level monitoring system of dams in
 
APPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCY
APPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCYAPPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCY
APPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCY
 
Final presentation es1
Final presentation es1Final presentation es1
Final presentation es1
 
THE SMART BRIDGE ECE.pptx
THE SMART BRIDGE ECE.pptxTHE SMART BRIDGE ECE.pptx
THE SMART BRIDGE ECE.pptx
 
Cyber Security for SCADA
Cyber Security for SCADACyber Security for SCADA
Cyber Security for SCADA
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyes
 
Remote monitoring of noxious gases and automated control
Remote monitoring of noxious gases and automated controlRemote monitoring of noxious gases and automated control
Remote monitoring of noxious gases and automated control
 
Tollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
Tollgrade LightHouse Asset Management Techniques Using Smart Grid SensorsTollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
Tollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
 
IRJET - Smart Drainage Management System
IRJET - Smart Drainage Management SystemIRJET - Smart Drainage Management System
IRJET - Smart Drainage Management System
 
Intern PPT on signal and telecommunication
Intern PPT on signal and  telecommunicationIntern PPT on signal and  telecommunication
Intern PPT on signal and telecommunication
 
Wireless Water Monitoring System
Wireless Water Monitoring SystemWireless Water Monitoring System
Wireless Water Monitoring System
 
Mini Project Presentaion
Mini Project Presentaion Mini Project Presentaion
Mini Project Presentaion
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
VIP Water Success Story
VIP Water Success StoryVIP Water Success Story
VIP Water Success Story
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System
 
Power Theft Detection Using IOT
Power Theft Detection Using IOTPower Theft Detection Using IOT
Power Theft Detection Using IOT
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System
 
Scada security
Scada securityScada security
Scada security
 

Plus de sommerville-videos

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systemssommerville-videos
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems scriptsommerville-videos
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classificationsommerville-videos
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processessommerville-videos
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activitiessommerville-videos
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineeringsommerville-videos
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernssommerville-videos
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processessommerville-videos
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challengessommerville-videos
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systemssommerville-videos
 

Plus de sommerville-videos (20)

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classification
 
Scaling agile
Scaling agileScaling agile
Scaling agile
 
User stories
User storiesUser stories
User stories
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processes
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineering
 
Why se script
Why se scriptWhy se script
Why se script
 
Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
Airbus Flight Control System
Airbus Flight Control SystemAirbus Flight Control System
Airbus Flight Control System
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concerns
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processes
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
System security
System securitySystem security
System security
 
System dependability
System dependabilitySystem dependability
System dependability
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Maroochy water breach

  • 1. Maroochy SCADA attack, 2013 Slide 1 Cybersecurity Case Study Maroochy water breach http://www.slideshare.net/sommervi/cs5032- case-study-maroochy-water-breach
  • 2. Maroochy SCADA attack, 2013 Slide 2 Maroochy Shire Image credit: http://www.hinterlandtourism.com.au/attractions/the-maroochy-river/
  • 3. Maroochy SCADA attack, 2013 Slide 3 Maroochy shire sewage system • SCADA controlled system with 142 pumping stations over 1157 sq km installed in 1999 • In 2000, the area sewage system had 47 unexpected faults causing extensive sewage spillage
  • 4. Maroochy SCADA attack, 2013 Slide 4 SCADA setup Typical SCADA-controlled sewage system This is not the system that was attacked
  • 5. Maroochy SCADA attack, 2013 Slide 5 SCADA sewage control • Special-purpose control computer at each station to control valves and alarms • Each system communicates with and is controlled by central control centre • Communications between pumping stations and control centre by radio, rather than wired network
  • 6. Maroochy SCADA attack, 2013 Slide 6 What happened More than 1m litres of untreated sewage released into waterways and local parks
  • 7. Maroochy SCADA attack, 2013 Slide 7 Technical problems • Sewage pumps not operating when they should have been • Alarms failed to report problems to control centre • Communication difficulties between the control centre and pumping stations
  • 8. Maroochy SCADA attack, 2013 Slide 8 Insider attack • Vitek Boden worked for Hunter Watertech (system suppliers) with responsibility for the Maroochy system installation. • He left in 1999 after disagreements with the company. • He tried to get a job with local Council but was refused.
  • 9. Maroochy SCADA attack, 2013 Slide 9 Revenge! • Boden was angry and decided to take revenge on both his previous employer and the Council by launching attacks on the SCADA control systems – He hoped that Hunter Watertech would be blamed for the failure • Insiders don’t have to work inside an organisation!
  • 10. Maroochy SCADA attack, 2013 Slide 10 What happened? Image credit: http://www.pimaweb.org/conference/april2003/pdfs/MythsAndF actsBehindCyberSecurity.pdf
  • 11. Maroochy SCADA attack, 2013 Slide 11 How it happened • Boden stole a SCADA configuration program from his employers when he left and installed it on his own laptop • He also stole radio equipment and a control computer that could be used to impersonate a genuine machine at a pumping station • Insecure radio links were used to communicate with pumping stations and change their configurations
  • 12. Maroochy SCADA attack, 2013 Slide 12 Incident timeline • Initially, the incidents were thought to have been caused by bugs in a newly installed system • However, analysis of communications suggested that the problems were being caused by deliberate interventions • Problems were always caused by a specific station id
  • 13. Maroochy SCADA attack, 2013 Slide 13 Actions taken • System was configured so that that id was not used so messages from there had to be malicious • Boden as a disgruntled insider fell under suspicion and put under surveillance • Boden’s car was stopped after an incident and stolen hardware and radio system discovered
  • 14. Maroochy SCADA attack, 2013 Slide 14 Causes of the problems • Installed SCADA system was completely insecure – No security requirements in contract with customer • Procedures at Hunter Watertech were inadequate to stop Boden stealing hardware and software • Insecure radio links were used for communications
  • 15. Maroochy SCADA attack, 2013 Slide 15 Causes of the problems • Lack of monitoring and logging made detection more difficult • No staff training to recognise cyber attacks • No incident response plan in place at Maroochy Council
  • 16. Maroochy SCADA attack, 2013 Slide 16 Aftermath • On October 31, 2001 Vitek Boden was convicted of: – 26 counts of willfully using a computer to cause damage – 1 count of causing serious environment harm • Jailed for 2 years
  • 17. Maroochy SCADA attack, 2013 Slide 17 Finding out more http://www.pimaweb.org/conference/april2 003/pdfs/MythsAndFactsBehindCyberSec urity.pdf http://harbor2harbour.com/?p=144 http://www.ifip.org/wcc2008/site/IFIPSampleChapter.p df http://csrc.nist.gov/groups/SMA/fisma/ics/documents/M aroochy-Water-Services-Case-Study_report.pdf