Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
IT firm baits hackers with online model train set
By Frank ZELLER
Hanover, Germany (AFP) March 17, 2015


Somewhere on Earth a computer hacker types a malicious command and hits enter. Half a world away, an urban commuter train speeds out of control, derails and crashes into a building.

Happily the kind of scenario that makes for Hollywood blockbusters and keeps public security officials awake at night would, in this case, only damage a model train set at a German IT industry fair.

Internet security experts have set up "Project Honey Train" with an online railway control system as bait, hoping to "get inside the heads of cyber criminals" -- but without the real-life casualties.

"The goal is to provide an environment where we can study how people may try to attack public infrastructure projects where they could put public safety at risk," said Chester Wisniewski, of security company Sophos.

"I suspect that this is a pretty good copy of some of the worst of public security that we see in real life... systems that were designed in a simpler time when people weren't trying to attack them, which is what makes them vulnerable."

Their miniature rail system at the CeBIT IT business fair in Hanover is built on a scale of 1:87 and set in a fictitious German city, with street names chosen from the board game Monopoly.

To an online attacker it's all meant to look real, with original software components and inbuilt vulnerabilities which are advertised in known hackers' chatrooms.

- Critical infrastructure -

Online users have long been exposed to risks from ID theft, "phishing" and scams by mafia groups, to mass data collection by social media giants and snooping by secret services.

But some fear we haven't seen the worst of it yet, in an age when urban transport systems, chemical plants and power stations are considered potentially vulnerable to digital sabotage.

"I'm surprised that not more has happened already," said Christoph Meinel, head of German IT university the Hasso Plattner Institute.

"It's urgently necessary to do something about this. Some say 'don't worry, it won't happen', but that's the wrong approach. Once someone has done it successfully, you can quickly expect to see copycats."

Security experts have warned of vulnerabilities in the systems that run, for example, factories, oil pipelines and water networks -- the so-called supervisory control and data acquisition or SCADA systems.

A real-life example is the computer worm Stuxnet, which was used to clandestinely attack Iran's nuclear programme in 2010 by ordering centrifuges to speed up and spin out of control until they ripped apart.

In his 2012 best-selling novel "Blackout", journalist Mark Elsberg describes how hackers attack European power grids, sparking the collapse of transport, communication and food distribution and even triggering a nuclear reactor meltdown.

Marco di Filippo, of Sophos, said he considers the book's premise and technical explanations "very valid".

"The greatest vulnerability is that automation now speaks TCP/IP and has ended up online, unprotected," he said, referring to the communication standard Transmission Control Protocol/Internet Protocol.

"This includes everything, be it power grids, power stations, wind farms, dams but also traffic management systems."

- 'Bad guys' -

Andrey Nikishin, head of future technologies at Moscow-based software security group Kaspersky Lab, agreed there were theoretical risks but said a successful attack was difficult.

"If something is connected to the Internet it is theoretically possible to hack it," he said.

But he stressed that governments are aware of risks to critical national infrastructure, take steps to protect it and that many systems have a manual backup.

"And you can't hack the manual switch, fortunately," he said.

Kaspersky Lab has identified four main types of attackers -- teenager hackers showing off, cyber criminals out for money, extremists seeking to sabotage, and state actors whose main goal is espionage.

While operating on the same technical basis, the big difference is the resources they have to hand, Nikishin said.

He added that potential threats would multiply in the era of the "Internet of Things", when not just PCs, laptops and phones but also houses, cars and appliances have IP addresses.

"The world is changing," he said, predicting however that one thing would stay the same -- "The actor, the bad guy... they have existed, they do exist, and they will exist."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
Operation to 'unblock' censored blogs in Russia, China
Paris (AFP) March 12, 2015
The Reporters Without Borders group on Thursday launched an operation to "unblock" censored websites in 11 countries, including China, Russia, Iran and Saudi Arabia. RSF said the project, dubbed "Operation Collateral Freedom", will be maintained "for several months." The group has created "mirror copies" of nine websites and placed them with hosts using cloud computing services provided ... read more


CYBER WARS
Russia's SMF Ready to Repel a 'Lightning-Speed' Nuclear Strike

Three rockets launched near-simultaneously in Aegis test

GaN-based AESA technology available for Patriot system users

BAE Systems providing support for Army's Space and Missile Defense Command

CYBER WARS
Nuclear Capable Missile Test-Fired in Pakistan

N. Korea fires seven surface-to-air missiles into sea

Anti-missile counter-measures system approved for export

N. Korea readying for medium-range missile test: report

CYBER WARS
Two Ton Drone: Russian Company Developing New Versatile Multipurpose UAV

NMSU Physical Science Lab tests new unmanned aircraft system with Vanilla Aircraft

New drone uses smart technology from Sweden

Pakistan tests homemade armed drone, missile: military

CYBER WARS
Navy satellite communications systems getting support services

Russia to Launch Two Military Satellites in February

Navy orders additional LCS mission modules

U.S. EA-18G Growlers getting new electronic warfare system

CYBER WARS
UT Dallas technology could make night vision, thermal imaging affordable

UT Dallas could make night vision, thermal imaging affordable

Raytheon wins support work for bomb carriages

Army develops new process for reusing artillery shell casings

CYBER WARS
China becomes world's number three arms exporter: study

Defence firm wants damages from Germany over blocked Russia contract

Saudi Arabia recalls ambassador to Sweden after military ties cut

Saudi Arabia becomes top arms importer: study

CYBER WARS
China's powerful Xi defies expectations two years on

Moscow Will Respond to NATO Military Buildup Near Russia's Border

Sweden raises military spending amid concerns over Russia

US to send Patriot missiles for drill in Poland

CYBER WARS
Are water treatment methods able to remove nanoparticles

The chameleon reorganizes its nanocrystals to change colors

Seeing tiny twins

Magnetic vortices in nanodisks reveal information




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.