https://www.kaspersky.com/blog/hacking-agriculture-defcon29/42402/

Solutions for:

  * Home Products
  * Small Business 1-50 employees
  * Medium Business 51-999 employees
  * Enterprise 1000+ employees

 
Kaspersky official blog

  * CompanyAccount
  * GET IN TOUCH

  * Solutions
      + 
          o [RS-b-Cloud]Hybrid Cloud Security

            Learn more

          o [kl_IoT_Sec]Internet of Things & Embedded Security

            Learn more

          o [RS-b-KTMD]Threat Management and Defense

            Learn more

          o [kl_Industr]Industrial CyberSecurity

            Learn more

          o [RS-b-KFP]Kaspersky Fraud Prevention

            Learn more

      + 
          o Other solutions

          o Blockchain Security
          o Kaspersky for Security Operations Center
  * Industries
      + 
          o [kl_Nationa]National Cybersecurity

            Learn more

          o [ent-indust]Industrial Cybersecurity

            Learn more

          o [kl_Financi]Finance Services Cybersecurity

            Learn more

          o [kl_Healthc]Healthcare Cybersecurity

            Learn more

          o [kl_Transpo]Transportation Cybersecurity

            Learn more

          o [kl_Retail_]Retail Cybersecurity

            Learn more

      + 
          o Other industries

          o Telecom Cybersecurity
          o Blockchain Security
          o View all
  * Products
      + 
          o [KESB_black]Kaspersky Endpoint Security for Business

            Learn more

          o [kl_Endpoin]Kaspersky Endpoint Detection and Response

            Learn more

          o [kl_Endpoin]Kaspersky Endpoint Detection and Response
            Optimum

            Learn more

          o [RS-b-KATA]Kaspersky Anti Targeted Attack Platform

            Learn more

          o [kl_Managed]Kaspersky Managed Detection and Response

            Learn more

          o [kl_Sandbox]Kaspersky Sandbox

            Learn more

      + 
          o Other Products

          o Kaspersky Security for Mail Server
          o Kaspersky Security for Internet Gateway NEW
          o Kaspersky Embedded Systems Security
          o Kaspersky Hybrid Cloud Security for AWS
          o Kaspersky Hybrid Cloud Security for Azure
          o View all
  * Services
      + 
          o [kl_Cyberse]Cybersecurity Services

            Learn more

          o [KAOT_icon]Kaspersky Adaptive Online Training

            Learn more

          o [kl_Premium]Kaspersky Premium Support (MSA)

            Learn more

          o [kl_Threat_]Kaspersky Threat Intelligence

            Learn more

          o [kl_APT_Int]Kaspersky APT Intelligence Reporting

            Learn more

          o [kl_Targete]Kaspersky Targeted Attack Discovery

            Learn more

      + 
          o Other Services

          o Kaspersky Professional Services
          o Kaspersky Incident Response
          o Kaspersky Cybersecurity Training
          o Kaspersky Incident Communications
          o Kaspersky Security Awareness
          o View all
  * Resource Center
      + Case Studies
      + White Papers
      + Datasheets
      + Technologies
      + MITRE ATT&CK
  * About Us
      + Transparency
      + Corporate News
      + Press Center
      + Careers
      + Innovation Hub
      + Sponsorship
      + Policy Blog
      + Contacts
  * GDPR
  * Blog
      + Business
      + News
      + Privacy
      + Products
      + Special Projects
      + Technology
      + Threats
      + Tips
      + RSS
      + Newsletter subscription
  * Secure Futures
  *  
    [                    ]
     

  * Solutions for:
  * Home Users
      + Products
          o KasperskySecurity Cloud
          o KasperskyTotal Security
          o KasperskyInternet Security
          o KasperskyAnti-Virus
          o KasperskyInternet Security for Mac
          o Kaspersky Internet Security for Android
          o KasperskySecure Connection
          o Free Tools

          o Kaspersky Safe Kids
          o Kaspersky Password Manager
          o Kaspersky Software Updater
          o View more
      + Renew
      + Downloads
      + Support
      + Resource Center
      + My Kaspersky
          o My Devices
          o My Products / Subscriptions
          o My Orders
  * Small Business(1-50 employees)
      + Products
          o KasperskySmall Office Security
          o KasperskyEndpoint Security Cloud
          o KasperskyEndpoint Security for Business Select
          o KasperskyEndpoint Security for Business Advanced
      + Renew
      + Downloads
      + Support
      + Resource Center
          o Insights
          o Products & Solutions
          o Customer Stories
          o Awards & Recognition
          o Technology
      + My Kaspersky
          o My Devices
          o My Products / Subscriptions
          o My Orders
  * Medium Business(51-999 employees)
      + Products
          o KasperskyEndpoint Security Cloud
          o KasperskyEndpoint Security for Business Select
          o KasperskyEndpoint Security for Business Advanced
          o KasperskySecurity for Business Total
          o TARGETED SECURITY SOLUTIONS

          o Mail Server
          o File Server
          o Mobile
          o Internet Gateway
          o Virtualization
          o Collaboration
          o Vulnerability and Patch Management
          o Storage
          o View More
      + Services
      + Downloads
      + Support
      + Resource Center
          o Insights
          o Products & Solutions
          o Customer Stories
          o Awards & Recognition
          o Technology
      + CompanyAccount
  * Enterprise(1000+ employees)
      + Solutions
          o Anti Targeted Attack
          o Endpoint Security
          o Cloud Security
          o Security Operations Center
          o Cybersecurity Services
          o Fraud Prevention
          o Industries

          o Finance
          o Telecom
          o Healthcare
          o Data Center
          o Government
          o Industrial
      + Products
          o KasperskyAnti Targeted Attack Platform
          o KasperskyPrivate Security Network
          o KasperskyEmbedded Systems Security
      + Services
          o KasperskySecurity Awareness
          o KasperskyCybersecurity Services
          o KasperskyDDoS Protection
          o KasperskyPremium Support and Professional Services
      + Resource Center
          o Case Studies
          o White Papers
          o Datasheets
      + Contact Us
      + CompanyAccount
  * 
  * Search blog posts
  * Blog
      + Business
      + News
      + Privacy
      + Products
      + Special Projects
      + Technology
      + Threats
      + Tips
      + RSS
  * Partners
      + Partners
      + Find a Partner
      + Affiliate
      + Technology
      + Whitelist Program
  * About Us
      + About Us
      + Company
      + Team
      + How We Work
      + Press Releases
      + Press Center
      + Careers
      + Motorsport
  * Support
  * Contact Us
  * Search

[                    ]
Search
  * [target] DEF CON

Farm equipment security at DEF CON 29

At DEF CON 29, a researcher explained why agricultural machinery
should be considered critical infrastructure and demonstrated
vulnerabilities in the main manufacturers' equipment.

  * [Enoch-]

    Enoch Root

  * October 11, 2021

One of the most unusual presentations at the DEF CON 29 conference,
held in early August, covered farm equipment vulnerabilities found by
an Australian researcher who goes by the alias Sick Codes.

Vulnerabilities affecting the major manufacturers John Deere and Case
IH were found not in tractors and combine harvesters, but in web
services more familiar to researchers. Through them, it was possible
to gain direct control over multi-ton and very expensive equipment,
which poses a particular danger.

Modern agricultural machinery

For those unfamiliar with modern farming, the price of machinery
seems astronomical. In his presentation, Sick Codes explained why
tractors and combine harvesters are so expensive.  The best examples
of modern agricultural machinery are computerized and automated to a
fairly high degree. This is illustrated by the example of the John
Deere 9000 Series forage harvester, which is advertised as follows:

The 24-liter V12 engine and six-figure price tag are not even the
main thing -- this particular commercial enumerates the technical
capabilities of the machine: spatial orientation system, automatic
row pickup and location sensors and synchronization with the truck
that receives the cut grain. To these capabilities, Sick Codes adds
remote control and the ability to automatically connect tech support
directly to the harvester for troubleshooting. It's here that he
makes a bold claim: modern farming is entirely dependent on the
Internet.

Farming machinery threat model

Unsurprisingly, modern machinery is packed full of modern technology,
from conventional GPS and 3G/4G/LTE positioning and communication
systems to quite exotic inertial navigation methods for determining
location on the ground with centimeter-level accuracy. The threat
model conceived by Sick Codes is based on IT concepts, and sounds
rather threatening when applied to reality.

What does a DoS attack on a field look like? Let's suppose we can
change a couple of variables in the software for spraying fertilizer
on the soil and increase the dose multiple times over. We could
easily make the field unfit for agriculture for years, or even
decades, to come.

Or how about a simpler theoretical variant: we take control of a
combine harvester and use it to damage, say, a power line. Or we hack
the harvester itself, disrupt the harvesting process causing huge
losses for the farmer. On a national scale, such "experiments" could
ultimately threaten food security. Networked farm equipment is,
therefore, genuinely critical infrastructure.

And according to Sick Codes, the protection put in place by the
suppliers of this very technology and infrastructure leaves a lot to
be desired. Here's what he and his like-minded team managed to find.

Username brute-forcing, password hardcoding and so on

Some of the John Deer infrastructure vulnerabilities presented at the
conference are also described in an article on the researcher's
website. Sick Codes started out by signing up for a legitimate
developer account on the company's website (although, as he writes,
he later forgot the name he used). Trying to remember, he encountered
something unexpected: the API made username look-ups every time he
typed a character. A quick check revealed that, yes, the usernames
already in the system could be brute-forced.

Brute-forcing usernames

Brute-forcing usernames. Source.

The traditional limit on the number of requests from one IP address
in such systems was not set. In just a couple of minutes, Sick Codes
sent 1,000 queries, checking for usernames matching the names of the
Fortune 1000 companies - he got 192 hits.

The next vulnerability was discovered in an internal service allowing
customers to keep records of purchased equipment. As Sick Codes found
out, anyone with access to this tool can view information about any
tractor or combine harvester in the database. Access rights to such
data are not checked. What's more, the information is fairly
confidential: vehicle owner, location, etc.

At DEF CON 29, Sick Codes revealed a little more than what he wrote
on his website. For instance, he also managed to access the service
for managing demo equipment, with full demonstration history and
personal data of company employees. Lastly, his colleagues detected a
vulnerability in the corporate service Pega Chat Access Group, in the
shape of a hardcoded admin password. Through this, he was able to get
the access keys to John Deere's client account. True, Sick Codes
didn't say what exactly this key opens up, but it appears to be
another set of internal services.

For a bit of balance, Sick Codes also presented some vulnerabilities
affecting John Deere's European competitor, Case IH. There, he was
able to access an unsecured Java Melody server monitoring some of the
manufacturer's services, which gave up detailed information about
users and showed the theoretical possibility of hijacking any
account.

Contacting the companies

For the sake of fairness, we should note that Sick Codes draws no
direct link between the above-mentioned threats and the
vulnerabilities he detected. Perhaps in order not to endanger
ordinary farmers. Or maybe he didn't find any such link. But based on
the trivial security flaws presented, he concludes that the safety
culture in these companies is low, allowing us to assume that direct
control over the combine harvesters is similarly protected. But this
remains an assumption.

All of the vulnerabilities in John Deere services have since been
closed, but with some provisos. The manufacturer did not have any
special contact channel for reporting vulnerabilities. Sick Codes had
a brief exchange with John Deere's social media manager, after which
he was asked to report the vulnerabilities through the bug-bounty
program on the HackerOne service - however no such service was found.
A rewards program for reporting vulnerabilities was eventually
introduced, but participants are required to sign a non-disclosure
agreement.

  * critical infrastructure
  * DEF CON
  * vulnerabilities

Share article

kindle
 
[protect-yo][protect-yo]

Related

 

8 fun facts about fax. Yes, fax!

 

MitM and DoS attacks on domains through the use of residual
certificates

 

  * Read next

FinSpy: the ultimate spying tool

FinSpy spyware targets Android, iOS, macOS, Windows, and Linux users.
Here's what it can do and how to stay protected.

 

  * #

    Julia Glazova

  * October 8, 2021

Tips

  * [chip] Tips

6 antiphishing tips

How to spot dangerous links sent in messages and other tricks
scammers use to steal your data.

  * #

    Hugh Aver

  * October 4, 2021

  * [chip] Tips

BloodyStealer is hunting for gamers

Gamer accounts are in demand on the underground market. Proof
positive is BloodyStealer, which steals account data from popular
gaming stores.

  * #

    Julia Glazova

  * September 27, 2021

  * [chip] Tips

Antivirus won't let you run a program? Here's what to do

Here's how to open a program if your antivirus app blocks it.

  * #

    Kaspersky Team

  * September 20, 2021

  * [chip] Tips

How to open a blocked website

If your antivirus stops you from going to a website, don't disable
it, create exclusions.

  * #

    Kaspersky Team

  * September 13, 2021

Sign up to receive our headlines in your inbox

  * *
    [                    ]
  * 
  * *
      + [ ] I agree to provide my email address to "AO Kaspersky Lab"
        to receive information about new posts on the site. I
        understand that I can withdraw this consent at any time via
        e-mail by clicking the "unsubscribe" link that I find at the
        bottom of any e-mail sent to me for the purposes mentioned
        above.

[Sign me Up] 
This iframe contains the logic required to handle Ajax powered
Gravity Forms.

Home Products

  * Kaspersky Anti-Virus
  * Kaspersky Android Antivirus
  * Kaspersky Internet Security
  * Kaspersky Total Security
  * Kaspersky Security Cloud
  * Kaspersky VPN Secure Connection
  * Free Antivirus
  * All Products

Small Business Products

1-50 EMPLOYEES

  * Kaspersky Small Office Security
  * Kaspersky Endpoint Security Cloud
  * All Products

Medium Business Products

51-999 EMPLOYEES

  * Kaspersky Endpoint Security Cloud
  * Kaspersky Endpoint Security for Business Select
  * Kaspersky Endpoint Security for Business Advanced
  * All Products

Enterprise Solutions

1000 EMPLOYEES

  * Cybersecurity Services
  * Threat Management and Defense
  * Endpoint Security
  * Hybrid Cloud Security
  * Cybersecurity Training
  * Threat Intelligence
  * All Solutions

Copyright (c) 2021 AO Kaspersky Lab. All Rights Reserved.

  * Privacy Policy
  * Anti-Corruption Policy
  * License Agreement

  * Contact Us
  * About Us
  * Partners
  * Blog
  * Resource Center
  * Press Releases
  * Sitemap

  * Securelist

  * Threatpost

  * Eugene Personal Blog

  * Encyclopedia

  *  

  *  

  *  

  *  

Global

 

  * Americas
  * Brasil
  * Mexico
  * United States

  * Africa
  * South Africa

  * Middle East
  * Middle East
  * lshrq l'wsT

  * Western Europe
  * Deutschland & Schweiz
  * Espana
  * France & Suisse
  * Italia & Svizzera
  * Nederland & Belgie
  * United Kingdom

  * Eastern Europe
  * Polska
  * Turkiye
  * Rossiia (Russia)
  * Kazakhstan

  * Asia & Pacific
  * Australia
  * India
  * Zhong Guo  (China)
  * Ri Ben  (Japan)

  * For all other countries
  * Global