.

[rev_slider_vc alias=”cyber-security”]

Why Energy and SCADA Meters for Utility, Industrial and Commercial Applications Need Cyber Secure Encryption

Over the past few decades, cyber security has become a serious concern of banks and large commercial corporations. Many of these corporations have seen large scale breaches that have affected millions of consumers worldwide. Some of these breaches have had long lasting negative effects on the customers and the core business models.

But what about the energy sector? There are considerable numbers of power and energy meters, protective relays, switches and controls in power plants and substations. These devices are used to report on power flow, protect electrical feeders and provide safety controls to apparatus. Many of these were designed years ago, and as such have only basic password protection that could be vulnerable to cyber-attacks causing outages, interrupting service, or even worse, inflicting permanent damage to the power distribution. In October of 2017, the U.S government issued a rare public warning that sophisticated hackers were targeting energy and industrial firms ā€“ the latest sign that cyber-attacks present an increasing threat to the power industry and other public infrastructure.

In the 2015 Global State of Information Security Survey, it was reported that power companies and utilities around the world saw a six fold increase in the number of detected cyber incidents over the previous year. That year, there were a total of 46 incidents reported in the energy sector, accounting for 16% of the incidents among all sectors in the US, alone. More recently, energy and electric utilities have suffered an increase in cyber-attacks according to a survey by Tripwire, a digital security firm. Over 75% percent of the 150 information technology personnel surveyed in the oil, natural gas and electricity sectors had experienced at least one successful cyber-attack within the previous 12 months. These attacks consisted of an attacker successfully infiltrating a firewall, anti-virus program or other protections at the utility. Almost half of those surveyed had seen an increase in attacks over the previous year, and more than 80% percent expected an attack that would harm physical infrastructure, that year.

``Itā€™s tempting to believe that this increase in attacks is horizontal across industries, but the data shows that energy organizations are experiencing a disproportionately large increase when compared to other industries. At the same time, energy organizations face unique challenges in protecting industrial control systems and SCADA assets.``

Cyber-attackers are no longer motivated solely by monetary gain. Their primary motivation is cyber-warfare. Cyber-warfare is a computer or network based conflict involving attacks by one nation against another in an attempt to disrupt the activities of organizations. These attackers or hackers are becoming the 21st century soldiers. Infiltrating a power grid would allow them to disrupt a nationā€™s economy, distract from a simultaneous military attack or create national trauma. Moreover, since power equipment often take long period of time to rebuild, this could have lasting effects on consumers concerning power reliability. Compromising safety controls in power distribution equipment could not only cause dangerous catastrophic failures, but may also leave the energy provider with few options to restore reliable energy flow.

Some hackersā€™ maliciousness is intended for recognition and respect within the hacking community: the bigger the intrusion and disruption, the greater the recognition from their peers. With this increase in black hat hackers looking for personal gain and recognition, and growth in cyber-attacks on utilities, significantly greater measures need to be undertaken within the energy sector to better secure power grids worldwide. Utility and industrial companies fight cyber-attacks with firewalls, data loss prevention (DLP) systems and Intrusion Prevention and Detection systems (IPS/IDS), but what about the power and energy meters in your facility or in the field at utility substations?

What can an attacker do if they gain control of a power meter?

ā€¢ Ā  By gaining access to a power meter and changing its configuration, an attacker has the ability to fool a SCADA master into thinking that energy flow is working, while then maliciously triggering operations on protective systems or disabling safety controls.

ā€¢ Ā  Changing the configuration of a power meter could also cause a circuit to look like it is out when power is actually flowing. This could trigger false control schemes and automatic restoration attempts. These false conditions could have catastrophic effects on power system equipment, making quick restoration very difficult. Moreover, attacks like this would provide dangerous working conditions for utility line restoration and maintenance employees.

ā€¢ Ā  Results from these attacks could result in financial loss, and even the loss of human life ā€“ for example, if a hospital were to lose their main and backup power systems. These attacks could also result in sanctions or fines from governmental regulators.

ā€¢ Ā  Relying on only one source of communicating data, such as mere relay data or power meter data alone, invites undetected attacks, especially without cybersecurity integrated into the equipment. Power metersā€™ and other power system sensing equipmentā€™s identification data should be confirmed as matching before any control schemes are initiated.

ā€¢ Ā  Country espionage can occur through theft of the energy data of private facilities, such as military installations or data server farms, by determining what they may be producing or cooling.

How can you stop a cyber-attack?

1. Ā Encrypted Configuration Power Meters ā€“ To protect against cyber-attacks, the substation equipment must utilize a cyber secured scheme for authenticating configuration requests. Cyber Secure power meters, such as the Electro Industries/GaugeTech NexusĀ® 1450 energy meter, provide 128 bit AES encryption on all configuration and control functions, significantly increasing the difficulty of a successful cyber-attack. 128-bit encryption refers to the length of the encryption or decryption key.

It is considered secure because it would take massive computation to defeat through brute force attacks. For example, it would take 2128 different combinations to break the encryption key, which is out of reach for all but the most sophisticated computers. This means a power meter with a cyber-secure encrypted configuration cannot be accessed by brute force attacks, during anyoneā€™s lifetime. Moreover, the meters have a programmed timeout period after 3 password fails, making the task infinitely more difficult.

2. Ā Training on Social Engineering Attacks ā€“ Social Engineering hacking occurs when the one weakness in an organization can be exploited, that is, human psychology. By utilizing social media, phone calls, emails and human interaction, attackers will often trick workers into giving them access to sensitive information. Frequent training is required to educate workers to look out for these attempts to gain access to a companyā€™s network or hardware.

3. Ā Digital Signatures for Firmware Verificationā€“ When firmware is uploaded to a power meter or any other technological device, it should be signed and verified. This means that the specific device leaves the factory with its own signature, and any subsequent firmware updates for the device must have the correct matching signature for the device to allow it to be uploaded.

4. Limitation of Access ā€“ Hardware and software security should offer role based access. This allows the administrator to limit access to what the user can view, edit, reset, download, etc., by setting up roles with those restrictions and assigning the user to the appropriate role.

5. Better Requirements for Passwords ā€“ It takes an attacker 4 minutes to hack into an account with a 4 character password. A password of 30 characters would take 4 nonillion years (thatā€™s 32 zeros). Better password requirements and increased frequency of password changing will greatly increase an organizationā€™s protection.

As the rate of intrusions of utilities and industrials grows exponentially in the coming years, so does the need to secure power grids around the world by taking effective action before it is too late. Cyber security is often thought to be handled only by firewalls and IPS/IDS systems, but as technology grows in the utility and industrial sectors, the cyber threat to other devices including power meters, switches and relays needs to be recognized and proactively prevented. EIG provides cyber secured configuration on most of its popular products to help utilities design substation that are safe and secure from malicious attempt to load harmful firmware or configure meters to provide false data.

Other Related Products

SharkĀ® 50 Multifunction Electrical Switchboard Meter

SharkĀ® 50Multifunction Electrical Switchboard Meter0.5% Class Accuracy MeasurementsBuilt-in Test Pulse for Accuracy VerificationMeets Both Revenue Metering Accuracy and Environmental StandardsOptional RS485 with Modbus ProtocolLarge, Bright Red, Easy to Read LED Display% of Load Bar for Analog Meter PerceptionFits Both ANSI and DIN CutoutsGreat for Retrofit and New Switchboard Meter ApplicationsUses Minimal Panel Space and Depth [...]

SharkĀ® 100 Multifunction Power and Energy Meter

SharkĀ® 100Multifunction Power and Energy Meter0.2% Revenue Grade Class AccuracyMeasures Voltage, Current, Power, Frequency, Energy, and Max DemandOptional KYZ Pulse and Standard IrDA PortPower Quality Measurements - THD and Alarm LimitsEasy to Read Display with Intuitive NavigationOptional 100BaseT EthernetOptional RS485 Modbus and DNP3 ProtocolsSuperior Quality - Rugged DesignFits both ANSI and DIN Cutouts High Accuracy [...]

SharkĀ® 200 Data Logging Power and Energy Meter

SharkĀ® 200Data Logging Power and Energy MeterCertified ANSI C12.20 0.2 Accuracy Class and IEC 62053-22 0.2S Energy Measurements0.007 Hz Precision Frequency MeasurementsProgrammable Alarm Limits, THD, and Harmonics AnalysisWaveform Recording of up to 512 Samples/Cycle, 170 EventsModbus, DNP3, and IEC 61850 ProtocolsDual, Independent Ethernet Ports with Embedded Web Servers, Email on Alarm, Exclusive Client Feature, and [...]