<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Chinese Cyber Attacks – For Economic Gain or Cyber Invasion

November 12, 2014

In December of 2010, long before news broke regarding the Chinese attacks on US critical infrastructure, I got a call from a utility customer that quite simply said, “We’ve been hacked and I don’t know how bad. Can you help?”

I was on a plane the next day and over the next seven weeks we tracked a hacker on their internal network. When we finally caught our hacker, the first thing that caught us by surprise was that he was on site. We always suspected a team of foreigners, hired to provide support for a Smart Grid development contract, and in fact we had already confiscated one of their laptops. Still, we couldn’t prove any of them were part of the attack.

What we really believed was the contractors were the conduit through which some rogue agent or agents were able to plant malware and compromise systems. Surely the guys on site would not be so bold as to be actively hacking. After all, my client had sophisticated intrusion detection and prevention systems in place. What wasn’t a surprise, and was always considered a possible motive, was that our hacker was stealing Smart Grid technology and sending it back to China. We expected as much. 

A recent article in Bloomberg identified UglyGorilla as a Chinese Hacker who infiltrated a major utility company in the Northeastern United States. As a result, he gained access to dozens of documents that describe the technical details of a major part of the United State’s critical infrastructure, namely the pipeline system.

Armed with this information, UglyGorilla now has the necessary information to exploit vulnerabilities within the industrial control systems that manage the transport of much of our nation’s oil and natural gas. If UglyGorilla was a lone actor, we could minimize the level of threat associated with this activity, but UglyGorilla is part of China’s state sponsored hacking group known as Unit 61398, part of the Peoples Liberation Army (PLA). In other words, China has not only stolen the technical details to build their own sophisticated pipeline systems, but they now have the information they need to create a catastrophic event in the United States without using bombs, bullets or troops.

Industrial control systems (ICSs) have historically been separated from other networks, particularly the Internet. But in recent history, ICSs have been increasingly integrated with administrative networks including the Internet.

For at least the last two years, Unit 61398 has been hacking utility companies including electric utilities, oil and gas companies, and even water systems. In fact, they primarily target industries that are identified as strategic to China’s economic growth. The immediate benefit to China is of an economic nature. Why spend money on research when it is so much cheaper to steal the technology from U.S. companies? Because of this, up until recently strategists believed China’s hacking activity was economically motivated.

Today, we have to question China’s motivation. Much of the technology is readily available all over the world. Why would they need to steal technical documents regarding building Smart Grid or pipeline operations?

In the months following my customer’s attack, I began to ask myself some basic tactical questions. How did we really catch this guy? How could my customer be prepared to catch him quicker? How could they have prevented this from happening in the first place? In other words, what were the lessons to be learned? Today I ask myself even more questions that are more strategic in nature. Let me summarize.

Tactical Lessons Learned

  • Control of contractors and subcontractors is important
  • Control of internal devices including desktops, notebooks, mobile devices, etc. is important
  • Network monitoring is critical
  • Establishing a perimeter may be impossible
  • Never forget the attacker could be physically on your network

Strategic Questions

  • What are the real risks?
  • How can we protect our nations infrastructure?
  • What fundamental changes will have the greatest positive impact on national security?

While it is probably safe to say that the attack we discovered in 2011 was motivated by economic gain, could, or have Chinese hackers unlocked secrets to not only attack, but defeat the U.S. in war without bombs, bullets and troops?

This is a guest post by David Thomason, President/Founder of Thomason Technologies, LLC.

Think your network may be in danger of attack? Schedule a free network visibility consultation and let our engineers pinpoint (and correct) any potential holes in your network.

New Call-to-action

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES