Search


  • Categories


  • Archives

    « Home

    Washington Post: Cyber search engine Shodan exposes industrial control systems to new risks

    The Washington Post continues its in-depth report on the security of electronic data and vulnerabilities that allow for digital attacks. Part One is here. In Part Two, the Post reports:

    After tinkering with code for nearly a decade, [computer programmer John] Matherly eventually developed a way to map and capture the specifications of everything from desktop computers to network printers to Web servers.

    He called his fledgling search engine Shodan, and in late 2009 he began asking friends to try it out. He had no inkling it was about to alter the balance of security in cyberspace. […]

    Matherly and other Shodan users quickly realized they were revealing an astonishing fact: Uncounted numbers of industrial control computers, the systems that automate such things as water plants and power grids, were linked in, and in some cases they were wide open to exploitation by even moderately talented hackers.

    Control computers were built to run behind the safety of brick walls. But such security is rapidly eroded by links to the Internet. Recently, an unknown hacker broke into a water plant south of Houston using a default password he found in a user manual. A Shodan user found and accessed the cyclotron at the Lawrence Berkeley National Laboratory. Yet another user found thousands of unsecured Cisco routers, the computer systems that direct data on the networks. […]

    The rise of Shodan illuminates the rapid convergence of the real world and cyberspace, and the degree to which machines that millions of people depend on every day are becoming vulnerable to intrusion and digital sabotage. It also shows that the online world is more interconnected and complex than anyone fully understands, leaving us more exposed than we previously imagined.

    Over the past two years, Shodan has gathered data on nearly 100 million devices, recording their exact locations and the software systems that run them. […]

    Homeland security officials have warned that the obscurity that had protected many industrial control systems was fast dis­appearing in a flood of digital light. […]

    The number of intrusions and attacks in the United States is rising fast. From October to April, the DHS received 120 incident reports, about the same as for all of 2011. But no one knows how often breaches have occurred or how serious they have been. Companies are under no obligation to report such intrusions to authorities.

     Read the full article to learn more about issues of security in cyberspace.

    Leave a Reply