Mideast Hackers May Be Attacking US Gas Stations

Credit: Melinda Fawver/Shutterstock

(Image credit: Melinda Fawver/Shutterstock)

LAS VEGAS — Fuel-level monitors of the sort used by many U.S. gas stations may be under attack by hackers in Iran and Syria, two researchers told attendees of the Black Hat security conference here yesterday (Aug. 5).

Kyle Wilhoit and Stephen Hilt, researchers for antivirus maker Trend Micro, set up 10 "honeypots," fake machines placed on the Internet to lure malicious hackers. Normal honeypots mimic computers, but these pretended to be Guardian AST automated tank gauges made by Veeder-Root of Simsbury, Conn.

The researchers were surprised by the number of politically motivated attacks they observed from volatile Middle Eastern countries. They weren't worried about terrorists using the Internet to blow up gas-station fuel tanks, but said that the attackers might be performing reconnaissance for future projects.

Automated tank gauges (ATGs) monitor fuel levels in gas-station tanks, sending messages to gas-station owners and fuel distributors when levels get low. Many of these systems are connected to the Internet, and a January 2015 paper by researchers at Boston security firm Rapid7 showed that about 5,800 ATGs worldwide— most in the United States — were connected to the Internet without a password.

Most of the vulnerable systems found by Rapid7 were made by Veeder-Root, and operating manuals for its ATG systems — some of which date to the 1990s — can easily be found online.

Anyone can use the Shodan search engine to find Internet-connected ATGs, then refer to the manuals to send valid commands that could change tank names, alter fuel types, order or cancel deliveries or change the designated volume of a tank. Such changes could result in mixed fuel that could damage vehicle engines, tank overflows, or tanks running dry.

Hilt and Wilhoit set up 10 honeypots, or "GasPots" as the researchers dubbed them, in seven different countries around the world and ran them for the first six months of 2015. The GasPots mostly attracted low-level queries, but in 23 instances, attackers sent valid Guardian AST commands that changed pump names or performed other modifications.

MORE: How the Internet of Things Could Kill You

Two of the most serious incidents were against a GasPot installed on a server in Jordan. There, two separate attacks resulted in pump names being defaced to read "H4CK3D by IDC-TEAM" and "AHAAD WAS HERE."

Both messages are "tags" used in attacks attributed to Iranian Dark Coders (IDC), a crew of pro-Tehran hackers who mainly deface websites thought to be anti-Iranian. The attacks also came from Internet Protocol (IP) addresses previously linked to IDC attacks.

Meanwhile, a GasPot set up in Washington, D.C. suffered a substantial distributed denial-of-service (DDoS) attack, which flooded its Internet connection with bogus data, cutting it off from the world for two days.

An associated message declared affiliation with the Syrian Electronic Army (SEA), a group supporting Syrian President Bashar al-Assad, an ally of Iran. The SEA has become famous for defacing websites belonging to Western and Arab news organizations.

Wilhoit and Hilt made clear that the attacks were not truly destructive — there were no attempts to change tank volume, for instance, which might have resulted in gasoline spillage during tank refills. But the surprising number of attacks reinforces the dangers that result when non-protected devices are connected to the Internet.

The researchers invited members of the audience to set up more honeypots, using software that they posted online at github.com/sjhilt/GasPot. They also posted a research paper, which can be read on the Trend Micro website.

Follow Paul Wagenseil @snd_wagenseil. Follow us @TechNewsDailyFacebook or Google+.

TOPICS
Paul Wagenseil

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.

Latest in Online Security
23andME box
23andMe has declared bankruptcy — here's how to delete your data now
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
A man filing his taxes electronically on a laptop
AI-powered tax scams are here - how to stay safe from deepfakes, phishing and more this tax season
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Hacker using a stolen social security card
Your Social Security number is a literal gold mine for scammers and identity thieves — here’s how to keep it safe
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
Latest in News
Apple Watch Ultra 2
Apple Watch Ultra 3 just tipped for two major upgrades
NYTimes Connections
NYT Connections today hints and answers — Tuesday, March 25 (#653)
A first look at Amazon's Fallout TV series coming to Prime Video
‘Fallout’ season 3 plans are reportedly being made — while season 2 is still filming
Surface Laptop 7 from the front
Amazon just gave Surface Laptop 7 a 'frequently returned' label — here's what's going on
New emojis with iOS 18.4 beta release.
iOS 18.4 beta brings 8 new emoji to your iPhone — here's all the new options
23andME box
23andMe has declared bankruptcy — here's how to delete your data now