º£½Ç´óÉñ

Worried about cyberattacks on US power grid? Stop taking selfies at work

Experts warn that malicious hackers gain valuable insight when companies and employees reveal too much information on the Web – especially when they work at sensitive facilities. 

Reuters

January 15, 2016

The world’s governments are on notice that their critical infrastructure is vulnerable after an apparentÌýcyberattack darkened 80,000 households in three regions of Ukraine last month.

But on the question of safeguarding utilities, operators of power plants, water treatment facilities, and other industrial operations might do well to worry more about Instagram than hackers, according to a cybersecurity firm.

Social media oversharing is wellspring ofÌýinformation that could be useful to attackersÌýinterested in compromising critical infrastructure, said Sean McBride, senior threat intelligence analyst atÌýiSight Partners.ÌýAmong the valuable information he's found online: workplace selfies on Instagram and Facebook that reveal details ofÌýsupervisory control and data acquisition, or SCADA, systems.

"No SCADA selfies!" said Mr. McBride at the S4 Conference in MiamiÌýThursday. "Don’t make an adversary’s job easier."

iSight has found numerous examples of SCADA selfies at sensitive facilities and warns that such photos may unwittingly reveal critical information that operators would prefer to keep secret. The firm's researchers have also discovered panoramic pictures of control room and video walk-throughs of facilities.

In addition to posting videos and photos on the Web, corporateÌýwebsitesÌýcanÌýdivulgeÌývaluable information to adversaries. For instance,Ìýorganization charts or lists of employees with contact information accessible viaÌýtheÌýutility website are valuableÌýsources of information for would-be attackers, says McBride.

These kinds of easily accessible images have aided critical infrastructure attacks in the past. Photographs published in 2008 by former Iranian President Mahmoud Ahmadinejad's press office provided western nuclear analysts with detailed views of the insides of the Natanz facility and Iran’s uranium enrichment operation – what an expert once described as

In 2011, industrial control systems expert Ralph Langner of a SCADA control system monitor in one of the photos to match the configuration of the Natanz centrifuges to configuration information in the Stuxnet malicious software created to hobble the facility.

Lesotho makes Trump’s polo shirts. He could destroy their garment industry.

Today, McBride said that he and fellowÌýresearchers have used open-source information from media, government, and private sources to identify 15 facilities in the US that are critical to the operation of the electric grid.

McBride suggested that critical infrastructure operators think like hackers before posting photos online: "Ask yourself, 'What do my adversaries know about me and the organizations I support.' "

Ìý