by Josh Meyer
As most Americans are still learning about the hacking-for-cash crime of ransomware, the nation’s top homeland security official is worried about an even more dire digital danger: killware, or cyberattacks that can literally end lives.
The Colonial Pipeline ransomware attack in April galvanized the public’s attention because of its consumer-related complications, including long lines at gas stations, Homeland Security Secretary Alejandro Mayorkas said in an interview with USA TODAY’s Editorial Board last week.
But “there was a cyber incident that very fortunately did not succeed,” he added. “And that is an attempted hack of a water treatment facility in Florida, and the fact that that attack was not for financial gain but rather purely to do harm.”
That attack on the Oldsmar, Florida, water system in February was intended to distribute contaminated water to residents, “and that should have gripped our entire country,” Mayorkas said.
USA TODAY and others reported on that hack, but it came amid a flurry of bigger cyberattacks such as the SolarWinds intrusion (https://www.bloomberg.com/news/articles/2021-01-13/solarwinds-hack-followed-years-of-warnings-of-weak-cybersecurity) into U.S. government agencies, technology firms such as Microsoft and cybersecurity companies.
Mayorkas and cybersecurity experts said the Oldsmar intrusion was one of many indications that malicious hackers increasingly are targeting critical parts of the nation’s infrastructure – everything from hospitals and water supplies to banks, police departments and transportation – in ways that could injure or even kill people.
“The attempted hack of this water treatment facility in February 2021 demonstrated the grave risks that malicious cyber activity poses to public health and safety,” Mayorkas told USA TODAY in a follow-up exchange. “The attacks are increasing in frequency and gravity, and cybersecurity must be a priority for all of us.
Weaponized technology
Like Mayorkas, private-sector computer security experts warn that so-called cyber-physical security incidents involving a wide range of critical national infrastructure targets could lead to loss of life. Those include oil and gas manufacturing and other elements of the energy sector, as well as water and chemical systems, transportation and aviation and dams.
The rise of consumer-based products such as smart thermostats and autonomous vehicles means Americans live in a “ubiquitous cyber-physical systems world” that has become a potential minefield of threats, said Wam Voster, senior research director at the security firm Gartner.
In a report July 21, Gartner said there is enough evidence of increasingly debilitating and dangerous attacks to expect that by 2025, “cyber attackers will have weaponized operational technology environments to successfully harm or kill humans.”
“The attack on the Oldsmar water treatment facility shows that security attacks on operational technology are not just made up in Hollywood anymore,” Voster wrote in an accompanying article.
Another example, Voster wrote, was the Triton malware that was first identified in December 2017 on the operational technology systems of a petrochemical facility. It was designed to disable the safety systems put in place to shut down the plant in case of a hazardous event.
“If the malware had been effective, then loss of life was highly likely,” Voster wrote. “It is not unreasonable to assume that this was an intended result. Hence ‘malware’ has now entered the realm of ‘killware.’”
A frightening target: Hospitals
Few incidents have come to light in which hackers shut down parts of the nation’s critical infrastructure in ways that might have contributed to someone’s death or serious injury.
However, U.S. officials are concerned about the rash of ransomware attacks on hospitals, which have had to divert patients and cancel or defer critical surgeries, tests and other medical procedures, as was the case in a nationwide cyberattack on Universal Health Services (https://eu.usatoday.com/story/tech/2020/09/28/health-care-provider-united-health-services-hit-cyberattack/3565533001/), one of the largest U.S. health care providers, in September 2020.
In hospital hacks, patients could die or suffer life-threatening complications, but it would be nearly impossible to find out unless medical centers offered that information, said a senior Department of Homeland Security official speaking on the condition of anonymity because he was not authorized to discuss security concerns.
A year ago, the FBI, DHS and the Department of Health and Human Services issued a warning about attacks (https://us-cert.cisa.gov/ncas/alerts/aa20-302a) on hospitals, describing the tactics, techniques and procedures used by cybercriminals to infect systems with ransomware for financial gain.
“CISA (the Cybersecurity and Infrastructure Security Agency), FBI, and HHS have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers,” the alert said. “CISA, FBI, and HHS are sharing this information to provide warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats.”
Authorities suspect the problem may be larger than has been reported, in part because private companies and even government agencies often don’t report ransomware hacks of their operational systems. Failure to report such attacks fuels the fast-growing criminal market in ransomware attacks, which can bring hackers millions in payouts, the DHS official said, “and it doesn’t help us learn the latest techniques and tactics used by the hackers.”
In Alabama, a woman sued a hospital this year, alleging that its failure to disclose a cyberattack on its systems resulted in diminished care that caused her baby’s death.
Last year, a hacker attack caused the failure of information technology systems at a major hospital in Germany. That forced a woman who needed urgent admission to be taken to another city for treatment, where she died.
In both cases, the hospitals and doctors involved denied allegations that they were responsible, and no proven link between the hacks and the deaths was established.
Liability for loss of life
Cybersecurity experts warn government and corporate leaders that they could be held financially or legally liable if breaches of computerized systems they oversee are found to have had a human impact.
“In the U.S., the FBI, NSA and Cybersecurity and Infrastructure Security Agency (CISA) have already increased the frequency and details provided around threats to critical infrastructure-related systems, most of which are owned by private industry,” Katell Thielemann, research vice president at Gartner, said in a report in September 2020. “Soon, CEOs won’t be able to plead ignorance or retreat behind insurance policies.”
The firm estimated that the financial impact of cyber-physical security attacks resulting in fatalities will surpass $50 billion within a few years.
“Even without taking the actual value of a human life into the equation,” Gartner concluded, “the costs for organizations in terms of compensation, litigation, insurance, regulatory fines and reputation loss will be significant.”
Who are the hackers?
While ransomware attacks dominate the headlines, Mayorkas has begun sounding the alarm about cyber intrusions such as the one in Florida in which money wasn’t the primary motive.
“U.S. cybersecurity officials have long known that water facilities and other critical infrastructure have been vulnerable for many, many years,” a senior DHS official said on condition of anonymity. “What made this one different was that there was an intruder who consciously exploited that vulnerability with malicious intent.
“It is also significant because it is one of the few incidents where malicious cyberactivity is crossing the line and can actually threaten the lives of people,” the official said, by increasing the level of potentially toxic chemicals in the water supply, for instance. He said Mayorkas has mentioned the attack in meetings with state and local security officials.
Homeland Security officials would not comment on who might have been behind the Florida attack, including whether it was linked to a foreign power.
Several nations, including Iran, Russia and China, have penetrated elements of critical U.S. infrastructure, but there have been few instances of them taking any action.
U.S. officials suspect more foreign governments and nonstate actors are engaging in malicious cyberactivity – sometimes together – in ways that make it nearly impossible to attribute the attacks or to determine whether they were driven by profit, political motives or both.
In 2015, an Iranian hacktivist group claimed responsibility for a cyberattack two years earlier that gave it access to the control system for a dam in the suburbs of New York. In a criminal indictment, the Justice Department (https://www.justice.gov/opa/file/834996/download) said seven Iranian hackers penetrated the computer-guided controls of the dam on behalf of that country’s military-affiliated Revolutionary Guards Corps as part of a broader cyberattack against 46 of the largest U.S. financial institutions.
DHS officials told USA TODAY that the water treatment facility indicated that the malicious actor attempted to change chemical mixtures to unsafe levels as part of the water treatment process. An operator detected the changes and corrected the system before it affected the water supply, the officials said.
“Independent of who was behind it, the fact that someone decided to exploit that vulnerability and was able to do it means that other attackers would be able to do it as well,” a DHS official said.
Source: https://www.msn.com/en-us/news/us/the-next-big-cyberthreat-isnt-ransomware-its-killware-and-its-just-as-bad-as-it-sounds/ar-AAPpD7A