Many of the sensors tested contained weaknesses ranging from poor cryptography keys, software flaws and configuration errors

Software vulnerabilities in sensors used by many oil and gas companies to monitor industrial processes are leaving these businesses vulnerable to potential remote attacks using radio waves, according to a computer security research firm.

Flaws in sensors used to monitor things such as temperature and pipeline pressure may even be fatal if exploited by attackers warned researchers at IOActive Inc., a Seattle, Wash-based security firm that specializes in smart grid technologies.

A Web-based compromise may result in monetary losses for an attack target, but the impact of a sensor attack on an energy company could result in loss of lives, warned Carlos Mario Panagos, a researcher for IOActive.

RELATED CONTENT

Panagos and fellow researcher Lucas Apa said that while the United States, Canada and other nations have been focusing in securing industrial control systems, many of these Internet-connected systems may not have gone through thorough security audits.

In a study of sensors manufactured by three major wireless automations systems makers, the they found that sensors typically communicate with a company’s network using radio transmitters on the 900MHz or 2.4Ghz bands. The sensors use the bands to report operation details on remote locations.

Many of the sensors tested contained weaknesses ranging from weak cryptography keys, software flaws and configuration errors.

In one instance, the researchers found that sensors shipped with identical cryptographic keys. This could lead to several companies using the device to sharing the same security keys.

The researchers also found that it was possible to modify monitor readings and disable sensors from up to 64 kilometers away.

Read the whole story here

Related Download
Cisco Secure Mobility Knowledge Hub Sponsor: Cisco
Cisco Secure Mobility Knowledge Hub
This Knowledge Hub provides an end-to-end look at what it takes to discover, plan, and implement a successful Secure Mobility strategy.
Learn More
Share on LinkedIn Share with Google+ Comment on this article