Marnerides, A. K. , Giotsas, V. and Mursch, T. (2019) Identifying Infected Energy Systems in the Wild. In: e-Energy '19: Proceedings of the Tenth ACM International Conference on Future Energy Systems, Phoenix AZ, USA, 25-28 June 2019, pp. 263-267. (doi: 10.1145/3307772.3328305)
Full text not currently available from Enlighten.
Abstract
The 2016 Mirai outbreak established an entirely new mindset in the history of large-scale Internet attacks. A plethora of Mirai-like variants have emerged in the last two years that are capable to infiltrate any type of device. In this paper we provide a 7-month retrospective analysis of Internet-connected energy systems that are infected by Mirai-like malware variants. By utilizing network measurements from several Internet vantage points, we demonstrate that a number of energy systems on a global scale were infected during the period of our observation. While past works have studied vulnerabilities and patching practises of ICS and energy systems, little information has been available on actual exploits of such vulnerabilities. Hence, we provide evidence that energy systems relying on ICS networks are often compromised by vulnerabilities in non-ICS devices (routers, servers and IoT devices) which provide foothold for lateral network attacks. Our work offers a first look in compromised energy systems by malware infections, and offers insights on the lack of proper security practices for systems that are increasingly dependent on internet services and more recently the IoT. In addition, we indicate that such systems were infected for relatively large periods, thus potentially remaining undetected by their corresponding organizational units.
Item Type: | Conference Proceedings |
---|---|
Status: | Published |
Refereed: | Yes |
Glasgow Author(s) Enlighten ID: | Marnerides, Dr Angelos |
Authors: | Marnerides, A. K., Giotsas, V., and Mursch, T. |
College/School: | College of Science and Engineering > School of Computing Science |
Published Online: | 15 June 2019 |
Related URLs: |
University Staff: Request a correction | Enlighten Editors: Update this record