Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Power News

Hackers Broke Into Brazil Power Grid Operator's Website Last Thursday 85

An anonymous reader writes "A week ago, 60 Minutes had a story (we picked it up too) claiming that hackers had caused power outages in Brazil. While this assertion is now believed to be in error, hackers were inspired by the story actually to do what was claimed. Last Thursday, they broke into ONS, the operator of the grid (Google translation; Portuguese original). DarkReading has specific details on the SQL injection vulnerabilities the hackers probably used."
This discussion has been archived. No new comments can be posted.

Hackers Broke Into Brazil Power Grid Operator's Website Last Thursday

Comments Filter:
  • full disclosure (Score:1, Insightful)

    by sopssa ( 1498795 ) * <sopssa@email.com> on Tuesday November 17, 2009 @07:41PM (#30137212) Journal

    And, two days after the blackout, the systems analyst Maycon Vitali, 23, revealed in the blog "Hack'n'roll" to a login page of the ONS revealed error in the validation data. The flaw could allow a hacker to send command to the database and find sensitive data from ONS.

    The failure was published in the newspaper Folha de S. Paulo on Monday (16).

    This is exactly why full disclosure is not good.

  • Really.... (Score:4, Insightful)

    by Darkness404 ( 1287218 ) on Tuesday November 17, 2009 @07:50PM (#30137340)
    Really -no- critical system be it power, heating, cooling, etc. should be on the internet. A local network is sufficient with the main computer controlling the other computers not being connected to the internet. How hard is it to understand?
  • Or maybe... (Score:3, Insightful)

    by Monkeedude1212 ( 1560403 ) on Tuesday November 17, 2009 @07:53PM (#30137372) Journal

    They were so good the first time they left no trace of their doings and even framed it on some other probable cause.

    One of the hackers (I'm guessing the one who likes polo shirts) obviously thought it'd be way cooler to take public credit. They have now revoked his invitation to DEF CON.

  • Re:SQL injection? (Score:1, Insightful)

    by etinin ( 1144011 ) * <alexandrebfariasNO@SPAMgmail.com> on Tuesday November 17, 2009 @08:10PM (#30137572)
    Not if they have been politically appointed, something very common in brazilian state-run companies.
  • Re:Really.... (Score:5, Insightful)

    by Itninja ( 937614 ) on Tuesday November 17, 2009 @08:17PM (#30137642) Homepage
    Keeping a few connected computers off the larger WAN is easy enough. But as those computer grow in number it can become more difficult to prevent someone, somewhere from opening up ssh, ftp, rdp, or some other connection-type. Then the whole LAN becomes susceptible to the evils of WAN baddies.

    And don't even get me started on the lack of physical security on 'secure' systems. If you can touch it, it's insecure.
  • Re:full disclosure (Score:5, Insightful)

    by mr exploiter ( 1452969 ) on Tuesday November 17, 2009 @08:20PM (#30137676)

    And, two days after the blackout, the systems analyst Maycon Vitali, 23, revealed in the blog "Hack'n'roll" to a login page of the ONS revealed error in the validation data. The flaw could allow a hacker to send command to the database and find sensitive data from ONS.

    The failure was published in the newspaper Folha de S. Paulo on Monday (16).

    This is exactly why full disclosure is not good.

    How so? If two days after the vulnerabilty was exploited causing millions of dollars of damage they *still* don't fix it, then the public has the right to know how much the security of the systems sucks. It may be the only way to prevent this from happening again.

  • by Anonymous Coward on Tuesday November 17, 2009 @08:20PM (#30137680)

    This is ridiculous. You can easily hack into their corporate website, but there is no way hackers got into the Brazilian power grid management system, because there is no such automated system in the first place! The central agency controlling the grid Operador Nacional do Sistema (ONS) operates the center by calling their buddies on generating station over private phone lines. Unless you are a very good voice impersonator and know all the necessary protocols, you will not get very far. That's when lack of technology is a plus.

  • Re:full disclosure (Score:3, Insightful)

    by cosm ( 1072588 ) <thecosm3@gma i l .com> on Tuesday November 17, 2009 @08:35PM (#30137816)
    Seriously? You must work for the government..

    Your solution: Hide or pretend the vulnerability doesn't exist, or ignore the possible ramifications of its exploitation and further promote shoddy programming practices.
    The better solution: Make the vulnerability public so that the company is forced to do something about it immediately, hence preventing any threats (pending their programming practices improving).

    Full disclosure puts the responcibility on the company to keep their products/services secure, as to keeping it a secret, which puts the burden on whistleblowers fearing prosecution.

    Which world do you prefer?
  • Re:full disclosure (Score:3, Insightful)

    by Runaway1956 ( 1322357 ) * on Tuesday November 17, 2009 @10:01PM (#30138504) Homepage Journal

    Agreed. Sometimes the only way to motivate people to fix a problem is to embarrass them in public. FFS, no part of any critical operation should ever be exposed to the internet, period. If is't sensitive, keep it isolated from everyone - including your billing departement, public relations, sales, and even the company officers. Whenever they need to see something sensitive, they can pick their lead arses up, and move to an office dedicated to the internal workings of the company. When they are ready to put on their happy power hats, and interface with the world, they can return to their own office.

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...