<node id="673261">
  <nid>673261</nid>
  <type>news</type>
  <uid>
    <user id="27446"><![CDATA[27446]]></user>
  </uid>
  <created>1709215146</created>
  <changed>1709215145</changed>
  <title><![CDATA[Critical Infrastructure Systems Are Vulnerable to a New Kind of Cyberattack]]></title>
  <body><![CDATA[<p>In recent years, browser and web-based technology has become a powerful tool for operators of infrastructure and industrial systems. But it also has opened a new pathway for bad actors to seize control of these systems, potentially endangering critical power, water, and other infrastructure.</p>

<p>Georgia Tech researchers have found a way to hijack the computers that control these physical systems. Called programmable logic controllers (PLCs), they increasingly have embedded webservers and are accessed on site via web browsers. Attackers can exploit this approach and gain full access to the system.</p>

<p>That means they could spin motors out of control, shut off power relays or water pumps, disrupt internet or telephone communication, or steal critical information. They could even launch weapons — or stop the launch of weapons.</p>

<p>“We think there is an entirely new class of PLC malware that's just waiting to happen. We're calling it web-based PLC malware. And it gives you full device and physical process control,” said Ryan Pickren, a Ph.D. student in the <a href="https://ece.gatech.edu/">School of Electrical and Computer Engineering</a> (ECE) and the lead author of a new study describing the malware and its implications.</p>

<p>The research team will <a href="https://www.ndss-symposium.org/ndss-paper/compromising-industrial-processes-using-web-based-programmable-logic-controller-malware/">present their findings Feb. 29</a> at the <a href="https://www.ndss-symposium.org/ndss2024/">2024 Network and Distributed Systems Security Symposium</a>.</p>

<p><a href="https://coe.gatech.edu/news/2024/02/critical-infrastructure-systems-are-vulnerable-new-kind-cyberattack"><strong>Get the full story on the College of Engineering website.</strong></a></p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2024-02-29T00:00:00-05:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Engineers and computer scientists show how bad actors can exploit browser-based control systems in industrial facilities with easy-to-deploy, difficult-to-detect malware.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Engineers and computer scientists show how bad actors can exploit browser-based control systems in industrial facilities with easy-to-deploy, difficult-to-detect malware.</p>
]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="673257">
            <nid>673257</nid>
            <type>image</type>
            <title><![CDATA[Industrial Control Screen (iStock)]]></title>
            <body><![CDATA[<p>Instead of a dedicated terminal or control pad running custom software specific to the device, manufacturers for industrial and infrastructure systems have turned to web-based management. Now, devices often have embedded web servers. The human-machine interfaces — think keypads or control panels like this — are actually mini web browsers rendering a web page with readouts of the current status and digital visualizations of the controls. This web-based architecture is opening the door to a new kind of malware attack that could give bad actors full control of critical infrastructure or other industrial systems.</p>
]]></body>
                          <field_image>
                <item>
                  <fid>256625</fid>
                  <filename><![CDATA[Industrial-Control-Screen-iStock-1208173993-t.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/2024/02/29/Industrial-Control-Screen-iStock-1208173993-t.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2024/02/29/Industrial-Control-Screen-iStock-1208173993-t.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[A finger nearly touching a control screen on an industrial system. The screen shows a visualization of the various components of the system.]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[jstewart@gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p><a href="mailto:jstewart@gatech.edu">Joshua Stewart</a><br />
College of Engineering</p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1237</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Engineering]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>145</tid>
        <value><![CDATA[Engineering]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
          <item>
        <tid>71881</tid>
        <value><![CDATA[Science and Technology]]></value>
      </item>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1237</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Engineering]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>192784</tid>
        <value><![CDATA[industrial security]]></value>
      </item>
          <item>
        <tid>177569</tid>
        <value><![CDATA[critical infrastructure]]></value>
      </item>
          <item>
        <tid>67741</tid>
        <value><![CDATA[Raheem Beyah]]></value>
      </item>
          <item>
        <tid>191069</tid>
        <value><![CDATA[Saman Zonouz]]></value>
      </item>
          <item>
        <tid>174361</tid>
        <value><![CDATA[Ryan Pickren]]></value>
      </item>
          <item>
        <tid>187915</tid>
        <value><![CDATA[go-researchnews]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
