Skip Links

Target attack shows danger of remotely accessible HVAC systems

Qualys says about 55,000 Internet-connected heating systems, including one at the Sochi Olympic arena, lack adequate security

By Jaikumar Vijayan, Computerworld
February 07, 2014 07:21 AM ET

Computerworld - The massive Target breach led to revelations that many companies use Internet-connected heating, ventilation, and air conditioning (HVAC) systems without adequate security, giving hackers a potential gateway to key corporate systems, a security firm warned Thursday.

Cloud security service provider Qualys said that its researchers have discovered that most of about 55,000 HVAC systems connected to the Internet over the past two years have flaws that can be easily exploited by hackers. Such a flaw was used by hackers in the Target breach.

HVAC systems connect to networks at various retail companies, government buildings and even hospitals, according to the security firm. HVAC vendors and other third parties often have remote access right to these systems for administrative and support purposes.

Hackers can exploit these systems to gain access to enterprise networks and leapfrog onto other corporate systems, Qualys said.

The recent breach at Target, which resulted in the theft of data on 40-million credit and debit cards, is believed to have occurred in this way. According to security blogger Brian Krebs, who first reported the massive breach, hackers gained access to the Target network using login credentials stolen from a company that provides HVAC services to the retailer.

The HVAC firm apparently had access rights to Target's network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The Target data thieves used the remote access rights to gain a foothold on the retailer's network and subsequently leapfrog onto the company's payment systems.

Most companies have no idea HVAC systems are connected to the Internet and can serve as gateways into the corporate network and sensitive data, said Billy Rios director of intelligence at Qualys, in an email.

"This breach doesn't just affect Target. There are many other control systems for other companies that are exposed," Rios said.

After the disclosure about how attackers accessed the Target network, Qualys did some network scanning and found that that the HVAC system at Target's headquarters is still visible online. So too is the HVAC and energy management systems at the Sochi Olympics arena, he said.

"The Sochi system doesn't even require a password, so if you know the IP address, you're in. We've contacted the integrator to warn them of this problem," Rios noted.

Often, the companies that have remote access to HVAC systems fail to realize that the systems can be used as a gateway to sensitive corporate networks. So they typically tend to have lax security measures, he said. For instance, many HVAC management companies use the same password to access systems belonging to multiple customers, he said.

Qualys has been working with the DHS on this issue for three years, so the threat is not unknown to all, Rios said. "Most people just don't know about it yet," he added.

Boatner Blankenstein, senior director of solutions engineering at Bomgar, a company that provides tools for securing remote access, said the Target breach shows why companies need to implement measures for controlling what third-parties can do on their networks.

Originally published on www.computerworld.com. Click here to read the original story.

Our Commenting Policies
Latest News
rssRss Feed
View more Latest News