{"id":17879,"date":"2017-08-02T06:12:08","date_gmt":"2017-08-02T10:12:08","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=17879"},"modified":"2019-11-15T06:45:55","modified_gmt":"2019-11-15T11:45:55","slug":"hacking-industrial-robots","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/hacking-industrial-robots\/17879\/","title":{"rendered":"Hacking industrial robots"},"content":{"rendered":"<p>As unpleasant as it is to see a ransomware message pop up on your monitor, <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-for-b2b\/16544\/\" target=\"_blank\" rel=\"noopener nofollow\">WannaCry<\/a> or <a href=\"https:\/\/www.kaspersky.com\/blog\/expetr-for-b2b\/17343\/\" target=\"_blank\" rel=\"noopener nofollow\">ExPetr\/NotPetya<\/a> are not worst-case scenarios. Researchers demonstrated far more physical cyberattacks <a href=\"https:\/\/www.blackhat.com\/us-17\/briefings.html#breaking-the-laws-of-robotics-attacking-industrial-robots\" target=\"_blank\" rel=\"noopener nofollow\">at the Black Hat hacking conference<\/a>.<\/p>\n<p>Thousands of factories around the world employ robots whose mechanical manipulators move boxes around, drill through parts, and perform other actions by following preprogrammed routines. These robots are quite complex, consisting of a computer (used for monitoring by an operator), a controller, and a mechanical manipulator. A program with logical operations, such as \u201clift the box\u201d or \u201cturn the arm,\u201d is created on the control computer, and the controller breaks it down into a series of smaller steps.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/02055706\/Black-Hat-Industrial-Robot-1.png\" alt=\"Industrial robot architecture\" width=\"1200\" height=\"669\" class=\"aligncenter size-full wp-image-17881\"><\/p>\n<p>The process is intricate, with many factors. For example, a box needs to be lifted smoothly and only to a certain height, and the pressing force of the \u201cfingers\u201d must remain at a certain value to hold the transported part firmly. The controller stores configuration files that contain data for applying a certain voltage to servomotors at a clearly specified moment, thus allowing the manipulator to lift the box correctly. <\/p>\n<h2>Managing cybersecurity<\/h2>\n<p>The developers of industrial robots have invested substantial efforts to ensure their inventions operate safely. Various safety devices, logical checks, and user manuals secure both factory and operators against physical damage and injury in case of operation problems or robot failures. At the same time, factory infrastructure is assumed to be \u201cfriendly\u201d; a robot fully trusts its control computer. <\/p>\n<p>However, that assumption is not always fair. Group of researchers from Polytechnic University of Milan and Trend Micro has discovered that some robots are directly connected to the Internet (for example, for receiving updates from the manufacturer or sending telemetry to company headquarters), or to an insufficiently isolated factory Wi-Fi network. This enables malefactors to discover robots with the help of a dedicated scanner. <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/02055927\/Black-Hat-Industrial-Robot-2.png\" alt=\"IRC5 control unit\" width=\"1200\" height=\"660\" class=\"aligncenter size-full wp-image-17882\"><\/p>\n<p>The robots are easy prey. With no encryption used when updating firmware, no digitally signed firmware at all, and default user names and passwords used, anyone who finds a robot\u2019s IP address can modify its configuration files and change its operation logic. <\/p>\n<h3>Why hack a robot?<\/h3>\n<p>Depending on a hacker\u2019s goals, these opportunities can be used for both espionage (downloading existing configuration files to discover manufacturing secrets) and sabotage. Researchers have demonstrated a crafty attack on a robot that was supposed to draw straight lines (in real-life applications, it could perform electric-welding). Hacked, the robot slightly shifted its manipulator by just a fraction of a millimeter, an error that was imperceptible to the naked eye but would render the resulting product defective. The robot\u2019s programming wasn\u2019t modified; the only thing affected was the controller\u2019s parameters.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/ufLyfUnzZRY?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span> <\/p>\n<p>Other attacks remain hypothetical, but some are dangerous for the operator. A movable robot can be reprogrammed with altered movement threshold values, for example, and that would be catastrophic.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/02060135\/Black-Hat-Industrial-Robot-3.png\" alt=\"Other attacks remain hypothetical, but some are dangerous for the operator\" width=\"1200\" height=\"684\" class=\"aligncenter size-full wp-image-17883\"><\/p>\n<p>In the short term, protection against such attacks comes down to increasing the security of existing robots to make them less accessible to the outer world as well as applying manufacturer patches that close known cybersecurity holes. In the longer term, robot manufacturers need to find new approaches and update their production standards, prioritizing not only requirements for physical safety and electrical safety but also cybersecurity. It is worth noting that Kaspersky Lab offers <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/industrial\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">critical infrastructure security solutions<\/a> to accomplish those goals.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Assembly robots are made with physical safety in mind, but hacking these machines is still frighteningly easy<\/p>\n","protected":false},"author":32,"featured_media":17880,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,5,3052,2683],"tags":[770,2587,2592,2485],"class_list":{"0":"post-17879","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-news","9":"category-smb","10":"category-threats","11":"tag-black-hat","12":"tag-black-hat-2017","13":"tag-ics-cybersecurity","14":"tag-industrial-cybersecurity"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hacking-industrial-robots\/17879\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hacking-industrial-robots\/11081\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hacking-industrial-robots\/12267\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hacking-industrial-robots\/11118\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hacking-industrial-robots\/14019\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hacking-industrial-robots\/14043\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hacking-industrial-robots\/18152\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hacking-industrial-robots\/3696\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hacking-industrial-robots\/9595\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/hacking-industrial-robots\/7187\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hacking-industrial-robots\/14314\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/hacking-industrial-robots\/8273\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hacking-industrial-robots\/17481\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hacking-industrial-robots\/17651\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/black-hat\/","name":"black hat"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=17879"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17879\/revisions"}],"predecessor-version":[{"id":29941,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17879\/revisions\/29941"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/17880"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=17879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=17879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=17879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}