SlideShare a Scribd company logo
1 of 17
Maroochy SCADA attack, 2013 Slide 1
Cybersecurity Case Study
Maroochy water breach
http://www.slideshare.net/sommervi/cs5032-
case-study-maroochy-water-breach
Maroochy SCADA attack, 2013 Slide 2
Maroochy Shire
Image credit:
http://www.hinterlandtourism.com.au/attractions/the-maroochy-river/
Maroochy SCADA attack, 2013 Slide 3
Maroochy shire sewage system
• SCADA controlled system with 142 pumping
stations over 1157 sq km installed in 1999
• In 2000, the area sewage system had 47
unexpected faults causing extensive sewage
spillage
Maroochy SCADA attack, 2013 Slide 4
SCADA setup
Typical SCADA-controlled sewage system
This is not the system that was attacked
Maroochy SCADA attack, 2013 Slide 5
SCADA sewage control
• Special-purpose control computer at each
station to control valves and alarms
• Each system communicates with and is
controlled by central control centre
• Communications between pumping stations
and control centre by radio, rather than wired
network
Maroochy SCADA attack, 2013 Slide 6
What happened
More than 1m litres of untreated sewage released
into waterways and local parks
Maroochy SCADA attack, 2013 Slide 7
Technical problems
• Sewage pumps not operating when they
should have been
• Alarms failed to report problems to control
centre
• Communication difficulties between the
control centre and pumping stations
Maroochy SCADA attack, 2013 Slide 8
Insider attack
• Vitek Boden worked for Hunter Watertech
(system suppliers) with responsibility for the
Maroochy system installation.
• He left in 1999 after disagreements with the
company.
• He tried to get a job with local Council but
was refused.
Maroochy SCADA attack, 2013 Slide 9
Revenge!
• Boden was angry and decided to take
revenge on both his previous employer and
the Council by launching attacks on the
SCADA control systems
– He hoped that Hunter Watertech would be blamed
for the failure
• Insiders don’t have to work inside an
organisation!
Maroochy SCADA attack, 2013 Slide 10
What happened?
Image credit:
http://www.pimaweb.org/conference/april2003/pdfs/MythsAndF
actsBehindCyberSecurity.pdf
Maroochy SCADA attack, 2013 Slide 11
How it happened
• Boden stole a SCADA configuration program
from his employers when he left and installed
it on his own laptop
• He also stole radio equipment and a control
computer that could be used to impersonate a
genuine machine at a pumping station
• Insecure radio links were used to
communicate with pumping stations and
change their configurations
Maroochy SCADA attack, 2013 Slide 12
Incident timeline
• Initially, the incidents were thought to have
been caused by bugs in a newly installed
system
• However, analysis of communications
suggested that the problems were being
caused by deliberate interventions
• Problems were always caused by a specific
station id
Maroochy SCADA attack, 2013 Slide 13
Actions taken
• System was configured so that that id was not
used so messages from there had to be
malicious
• Boden as a disgruntled insider fell under
suspicion and put under surveillance
• Boden’s car was stopped after an incident
and stolen hardware and radio system
discovered
Maroochy SCADA attack, 2013 Slide 14
Causes of the problems
• Installed SCADA system was completely
insecure
– No security requirements in contract with
customer
• Procedures at Hunter Watertech were
inadequate to stop Boden stealing hardware
and software
• Insecure radio links were used for
communications
Maroochy SCADA attack, 2013 Slide 15
Causes of the problems
• Lack of monitoring and logging made
detection more difficult
• No staff training to recognise cyber attacks
• No incident response plan in place at
Maroochy Council
Maroochy SCADA attack, 2013 Slide 16
Aftermath
• On October 31, 2001 Vitek Boden was
convicted of:
– 26 counts of willfully using a computer to cause
damage
– 1 count of causing serious environment harm
• Jailed for 2 years
Maroochy SCADA attack, 2013 Slide 17
Finding out more
http://www.pimaweb.org/conference/april2
003/pdfs/MythsAndFactsBehindCyberSec
urity.pdf
http://harbor2harbour.com/?p=144
http://www.ifip.org/wcc2008/site/IFIPSampleChapter.p
df
http://csrc.nist.gov/groups/SMA/fisma/ics/documents/M
aroochy-Water-Services-Case-Study_report.pdf

More Related Content

What's hot

Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...
Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...
Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...
Zero Science Lab
 
Introduction et Presentation du bastion Wallix WAB/WABAM/Password Manager
Introduction et Presentation du bastion Wallix WAB/WABAM/Password ManagerIntroduction et Presentation du bastion Wallix WAB/WABAM/Password Manager
Introduction et Presentation du bastion Wallix WAB/WABAM/Password Manager
Stéphane DECK
 
Alienvault how to build a security operations center (on a budget) (2017, a...
Alienvault   how to build a security operations center (on a budget) (2017, a...Alienvault   how to build a security operations center (on a budget) (2017, a...
Alienvault how to build a security operations center (on a budget) (2017, a...
Asep Syihabuddin
 

What's hot (20)

Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASB
 
Project report on Iot Based Garbage Monitoring System
Project report on Iot Based Garbage Monitoring System  Project report on Iot Based Garbage Monitoring System
Project report on Iot Based Garbage Monitoring System
 
Aircrack
AircrackAircrack
Aircrack
 
Smart irrigation system using Internet Of Things
Smart irrigation system using Internet Of ThingsSmart irrigation system using Internet Of Things
Smart irrigation system using Internet Of Things
 
Honeynet architecture
Honeynet architectureHoneynet architecture
Honeynet architecture
 
Keyloggers.ppt
Keyloggers.pptKeyloggers.ppt
Keyloggers.ppt
 
Automatized railway gate controller
Automatized railway gate controllerAutomatized railway gate controller
Automatized railway gate controller
 
Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...
Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...
Безбедност: МК сајбер простор и инфраструктура - Отстранување на национална с...
 
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
 
Session Hijacking
Session HijackingSession Hijacking
Session Hijacking
 
Introduction et Presentation du bastion Wallix WAB/WABAM/Password Manager
Introduction et Presentation du bastion Wallix WAB/WABAM/Password ManagerIntroduction et Presentation du bastion Wallix WAB/WABAM/Password Manager
Introduction et Presentation du bastion Wallix WAB/WABAM/Password Manager
 
Botnet
BotnetBotnet
Botnet
 
Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking Security
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 
IDS Evasion Techniques
IDS Evasion TechniquesIDS Evasion Techniques
IDS Evasion Techniques
 
Alienvault how to build a security operations center (on a budget) (2017, a...
Alienvault   how to build a security operations center (on a budget) (2017, a...Alienvault   how to build a security operations center (on a budget) (2017, a...
Alienvault how to build a security operations center (on a budget) (2017, a...
 
Ataques informáticos
Ataques informáticosAtaques informáticos
Ataques informáticos
 
Career in Ethical Hacking
Career in Ethical Hacking Career in Ethical Hacking
Career in Ethical Hacking
 
Coin based mobile charger using rfid with pv for public usage
Coin based mobile charger using rfid with pv for public usageCoin based mobile charger using rfid with pv for public usage
Coin based mobile charger using rfid with pv for public usage
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 

Viewers also liked

CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breach
Ian Sommerville
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflow
Ian Sommerville
 

Viewers also liked (20)

Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
CS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breachCS5032 Case study Maroochy water breach
CS5032 Case study Maroochy water breach
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflow
 
Rapid elearning tools and techniques
Rapid elearning tools and techniquesRapid elearning tools and techniques
Rapid elearning tools and techniques
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Infrastructure control
Infrastructure controlInfrastructure control
Infrastructure control
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systems
 
Critical national infrastructure
Critical national infrastructureCritical national infrastructure
Critical national infrastructure
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
System safety
System safetySystem safety
System safety
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Warsaw airbus accident
Warsaw airbus accidentWarsaw airbus accident
Warsaw airbus accident
 
Reuse landscape
Reuse landscapeReuse landscape
Reuse landscape
 
Intro to requirements eng.
Intro to requirements eng.Intro to requirements eng.
Intro to requirements eng.
 

Similar to Maroochy water breach

APPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCY
APPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCYAPPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCY
APPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCY
iQHub
 
Cyber Security for SCADA
Cyber Security for SCADACyber Security for SCADA
Cyber Security for SCADA
Richard Umbrino
 
Wireless Water Monitoring System
Wireless Water Monitoring SystemWireless Water Monitoring System
Wireless Water Monitoring System
Praveen Sharma
 
scada-130512133852-phpapp01.pptx
scada-130512133852-phpapp01.pptxscada-130512133852-phpapp01.pptx
scada-130512133852-phpapp01.pptx
surangagw
 

Similar to Maroochy water breach (20)

LFI18-Solving the challenges of commissioning a wireless lighting infrastruc...
LFI18-Solving the challenges of commissioning  a wireless lighting infrastruc...LFI18-Solving the challenges of commissioning  a wireless lighting infrastruc...
LFI18-Solving the challenges of commissioning a wireless lighting infrastruc...
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
 
Io t based water level monitoring system of dams in
Io t based water level monitoring system of dams inIo t based water level monitoring system of dams in
Io t based water level monitoring system of dams in
 
APPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCY
APPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCYAPPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCY
APPLYING DIGITAL METERING & REMOTE SENSORS TO DELIVER OPERATIONAL EFFICIENCY
 
Final presentation es1
Final presentation es1Final presentation es1
Final presentation es1
 
THE SMART BRIDGE ECE.pptx
THE SMART BRIDGE ECE.pptxTHE SMART BRIDGE ECE.pptx
THE SMART BRIDGE ECE.pptx
 
Cyber Security for SCADA
Cyber Security for SCADACyber Security for SCADA
Cyber Security for SCADA
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyes
 
Remote monitoring of noxious gases and automated control
Remote monitoring of noxious gases and automated controlRemote monitoring of noxious gases and automated control
Remote monitoring of noxious gases and automated control
 
Tollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
Tollgrade LightHouse Asset Management Techniques Using Smart Grid SensorsTollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
Tollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
 
IRJET - Smart Drainage Management System
IRJET - Smart Drainage Management SystemIRJET - Smart Drainage Management System
IRJET - Smart Drainage Management System
 
Intern PPT on signal and telecommunication
Intern PPT on signal and  telecommunicationIntern PPT on signal and  telecommunication
Intern PPT on signal and telecommunication
 
Wireless Water Monitoring System
Wireless Water Monitoring SystemWireless Water Monitoring System
Wireless Water Monitoring System
 
Mini Project Presentaion
Mini Project Presentaion Mini Project Presentaion
Mini Project Presentaion
 
VIP Water Success Story
VIP Water Success StoryVIP Water Success Story
VIP Water Success Story
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System
 
Power Theft Detection Using IOT
Power Theft Detection Using IOTPower Theft Detection Using IOT
Power Theft Detection Using IOT
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System
 
Scada security
Scada securityScada security
Scada security
 
scada-130512133852-phpapp01.pptx
scada-130512133852-phpapp01.pptxscada-130512133852-phpapp01.pptx
scada-130512133852-phpapp01.pptx
 

More from sommerville-videos

System of systems classification
System of systems classificationSystem of systems classification
System of systems classification
sommerville-videos
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
sommerville-videos
 

More from sommerville-videos (20)

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classification
 
Scaling agile
Scaling agileScaling agile
Scaling agile
 
User stories
User storiesUser stories
User stories
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processes
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineering
 
Why se script
Why se scriptWhy se script
Why se script
 
Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
Airbus Flight Control System
Airbus Flight Control SystemAirbus Flight Control System
Airbus Flight Control System
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concerns
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processes
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
System security
System securitySystem security
System security
 
System dependability
System dependabilitySystem dependability
System dependability
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Maroochy water breach

  • 1. Maroochy SCADA attack, 2013 Slide 1 Cybersecurity Case Study Maroochy water breach http://www.slideshare.net/sommervi/cs5032- case-study-maroochy-water-breach
  • 2. Maroochy SCADA attack, 2013 Slide 2 Maroochy Shire Image credit: http://www.hinterlandtourism.com.au/attractions/the-maroochy-river/
  • 3. Maroochy SCADA attack, 2013 Slide 3 Maroochy shire sewage system • SCADA controlled system with 142 pumping stations over 1157 sq km installed in 1999 • In 2000, the area sewage system had 47 unexpected faults causing extensive sewage spillage
  • 4. Maroochy SCADA attack, 2013 Slide 4 SCADA setup Typical SCADA-controlled sewage system This is not the system that was attacked
  • 5. Maroochy SCADA attack, 2013 Slide 5 SCADA sewage control • Special-purpose control computer at each station to control valves and alarms • Each system communicates with and is controlled by central control centre • Communications between pumping stations and control centre by radio, rather than wired network
  • 6. Maroochy SCADA attack, 2013 Slide 6 What happened More than 1m litres of untreated sewage released into waterways and local parks
  • 7. Maroochy SCADA attack, 2013 Slide 7 Technical problems • Sewage pumps not operating when they should have been • Alarms failed to report problems to control centre • Communication difficulties between the control centre and pumping stations
  • 8. Maroochy SCADA attack, 2013 Slide 8 Insider attack • Vitek Boden worked for Hunter Watertech (system suppliers) with responsibility for the Maroochy system installation. • He left in 1999 after disagreements with the company. • He tried to get a job with local Council but was refused.
  • 9. Maroochy SCADA attack, 2013 Slide 9 Revenge! • Boden was angry and decided to take revenge on both his previous employer and the Council by launching attacks on the SCADA control systems – He hoped that Hunter Watertech would be blamed for the failure • Insiders don’t have to work inside an organisation!
  • 10. Maroochy SCADA attack, 2013 Slide 10 What happened? Image credit: http://www.pimaweb.org/conference/april2003/pdfs/MythsAndF actsBehindCyberSecurity.pdf
  • 11. Maroochy SCADA attack, 2013 Slide 11 How it happened • Boden stole a SCADA configuration program from his employers when he left and installed it on his own laptop • He also stole radio equipment and a control computer that could be used to impersonate a genuine machine at a pumping station • Insecure radio links were used to communicate with pumping stations and change their configurations
  • 12. Maroochy SCADA attack, 2013 Slide 12 Incident timeline • Initially, the incidents were thought to have been caused by bugs in a newly installed system • However, analysis of communications suggested that the problems were being caused by deliberate interventions • Problems were always caused by a specific station id
  • 13. Maroochy SCADA attack, 2013 Slide 13 Actions taken • System was configured so that that id was not used so messages from there had to be malicious • Boden as a disgruntled insider fell under suspicion and put under surveillance • Boden’s car was stopped after an incident and stolen hardware and radio system discovered
  • 14. Maroochy SCADA attack, 2013 Slide 14 Causes of the problems • Installed SCADA system was completely insecure – No security requirements in contract with customer • Procedures at Hunter Watertech were inadequate to stop Boden stealing hardware and software • Insecure radio links were used for communications
  • 15. Maroochy SCADA attack, 2013 Slide 15 Causes of the problems • Lack of monitoring and logging made detection more difficult • No staff training to recognise cyber attacks • No incident response plan in place at Maroochy Council
  • 16. Maroochy SCADA attack, 2013 Slide 16 Aftermath • On October 31, 2001 Vitek Boden was convicted of: – 26 counts of willfully using a computer to cause damage – 1 count of causing serious environment harm • Jailed for 2 years
  • 17. Maroochy SCADA attack, 2013 Slide 17 Finding out more http://www.pimaweb.org/conference/april2 003/pdfs/MythsAndFactsBehindCyberSec urity.pdf http://harbor2harbour.com/?p=144 http://www.ifip.org/wcc2008/site/IFIPSampleChapter.p df http://csrc.nist.gov/groups/SMA/fisma/ics/documents/M aroochy-Water-Services-Case-Study_report.pdf