The Offense: Smart Meter + Slot Machine Security

Mike Breslin


When Tommy Carmichael -- the world's greatest slot machine cheat -- wanted to illegally coax coins out of Las Vegas slot machines, his first step was to get his hands on the machine he wanted to cheat. He was successful at beating the best electronic security that slot machine engineers could design and milked hundreds of thousands of dollars before he got arrested.


Coincidentally, Las Vegas was the scene last July where the supposed security flaws of smart meters were unmasked. That event still has meter makers, utilities, standards organizations and federal regulators talking or hard at work improving security.


At the Black Hat security conference, Mike Davis, a senior security consultant for IOActive, demonstrated how his security team simulated the hacking of 16,000 out of 22,000 smart meters over a 24-hour period. They used a worm, a software patch, that gave IOActive the control to turn power on and off at one-second intervals at 16,000 homes.


"We could have put anything in that worm we wanted as a payload," said Davis. "We did not have enough room in the smart meter to fit our code so we had to dump some functionality out for our worm to work. The functionality we dumped was the ability to wirelessly update the devices. That would have locked out the utility from wirelessly updating the devices."


Like Tommy Carmichael, IOActive had to get its hands on a meter before starting to compromise it. In 2008, the first meters they examined came via a penetration test for a utility. "This is how we initially found some vulnerability," Davis explained. Later, IOActive bought different models on eBay, and got others by dumpster diving at the back of utility meter shops. The discarded meters provided all they needed -- radio communications and firmware. Since Black Hat, Davis no longer sees smart meters on eBay and noticed that defective units are now being sent to secure recycling facilities.







"As much as I'd like to say I am a professional, I'm really a geek at heart. I'm only in it to play with the toys," Davis admitted. IOActive used two smart meters to build the worm and it did not take expensive equipment. Davis confessed that the most valuable tool he used cost $200, a JTAG interface.


Davis reflected on industry reactions since Black Hat. "I'm sure someone inside our company assumed that if we are talking about this we would be the go-to guys for this particular issue. A lot of the feedback we got was that we were not telling the truth about the vulnerabilities, or no meter vendor would ever release their devices without encryption enabled, or even if this were possible, the propagation rate of the worm would be so slow that it would not matter. When our research hit the news it was about the same time the stimulus package came out with funding for meters. People acknowledged us, but no one really wanted to work with us. They just wanted to get their product out."


Of course, a malicious hacker would only have to rip a meter off a house to get started. And what could a criminal or terrorist with reverse engineering skills do? One feature in many devices is a remote disconnect that allows the utility to wirelessly disconnect an individual meter from the grid. "The nature of the worm we demonstrated is the danger that we were able to propagate it without the need for the utility. If we propagated it to hundreds of thousands of meters, we would have the ability to disconnect those," Davis said.


Hopping Mad


Because meters are wirelessly linked by radio frequency with a one- to two-mile range, worms or disabling viruses could hop from service area to service area on interoperable metering systems.


What are the consequences of hundreds of thousands without power? Someone would have to figure out how the meters are being exploited, create and test a corrective patch and, if firmware is compromised, individually deploy patches to every affected household. "We will continue our research as soon as I get my hands on another device. These devices were made to be sensors, not security devices, and that's what we are seeing in the state of hardware security everywhere, except for devices like XBox, or PlayStation(R) where they really care about tampering," Davis concluded.


But the major meter manufacturers are improving security. Philip Mezey, North American senior vice president and COO for Itron, had this to say: "Security of advanced metering and smart grid networks is very much something that Itron and the utility industry has taken, and will continue to take, seriously."
 

Energy Central

Copyright © 1996-2006 by CyberTech, Inc. All rights reserved.