These hackers just showed how easy it is to target critical infrastructure
“OPC UA is used everywhere in the industrial world as a connector between systems,” says Keuper. “It’s such a central component of typical industrial networks, and we can bypass authentication normally required to read or change anything. That’s why people found it to be the most important and interesting. It took just a couple of days to find.”
The 2012 iPhone hack took three weeks of focused work. In contrast, the OPC UA hack was a side project, a distraction from Keuper and Alkemade’s day jobs. But its impact is outsized.
There are immense differences between the consequences of hacking an iPhone and breaking into critical-infrastructure software. An iPhone can be easily updated, and a new phone is always right around the corner.
On the contrary, in critical infrastructure, some systems can last for decades. Some known security flaws can’t be fixed at all. Operators often can’t update their technology for security fixes because taking a system offline is out of the question. It’s not easy to turn a factory on and off again like a light switch—or like a laptop.
“In industrial control systems, the playing field is completely different,” Keuper says. “You have to think about security differently. You need different solutions. We need game changers.”
Despite their success this week, Keuper and Alkemade are not under any delusion that industrial security problems have been instantly solved. But for these two, it’s a good start.
“I do research for public benefit to help make the world a little bit safer,” Alkemade says, “We do stuff that gets a lot of attention so that people listen to us. It’s not about the money. It’s the excitement and to demonstrate what we can do.”
“Hopefully we made the world a safer place,” says Keuper.
Meanwhile, the Pwn2Own competitions rumble on, having given away $2 million last year. Next month, hackers will gather in Vancouver to celebrate the 15th anniversary of the show. One of the targets? A Tesla car.
0 Technology Way Americas Group Technology Basic Hr Compliance & Technology Blast Technology Vs Tms Bmw Twinpower Technology Explained California Institute Of Technology Film Computer Technology Background Wallpaper Crosspointe Technology Group Csia 310 Siem Technology David Zhou Technology Dynapack International Technology Corp. Emulsion Technology Companies Erie Institiute Of Technology College Honeywell Technology Abn How Has Technology Harmed Society Ihb603b Built In Bluetooth Technology Information Technology Integration Information Technology System Administrator Certificate Julie Grush Technology Lauran Technology Corp Nj Massachusetts Institute Of Technology Area Minghe Technology Tang Shan Napa Nepa Innovative Technology Pregnancy Latest Technology Printer Technology Cartoons Professional Technology Use R Certificate In Automotive Technology Regulations Environmental Bank Information Technology Sciecne And Technology Entry Program Science And Technology Speech Seagate Technology Cusip Shenyang Ocean Technology Co.Ltd Sintec Optronics Technology Pte Ltd Sixth Wave Technology Sni Technology Westover Tx Southington Schools Technology Department Stone Technology Company Student Centered Technology Strategies Examples Sunrise Instruments Technology Inc. Universities That Specialize In Technology University Technology Office Asu Email Us Bea State Technology Exports Uwb Ultra Wide Band Technology Vanderbilt Computer Technology Program W3hat Is Induction Technology Wearable Technology Healthcare Emr Wearable Technology Speed Hpw To Web Technology Jobs Jacksonville Nc Will Socialized Medicine Disincentivize Technology Wuhan Easy Space Information Technology
- SwitchBot Curtain Rod 2 review: This smart curtain controller gets a streamlined design
- Dodge Co. cold case solved using new DNA technology sparks privacy concerns
- Two key secondary players are back in Lubbock
- Machine Learning Trends Impacting Businesses In 2022
- Every free game on Netflix (May 2022)