Connect with us

Hi, what are you looking for?

HEADLINES

Gas stations also vulnerable to hackers, according to study

Kaspersky Lab researchers helped uncover a number of unknown vulnerabilities that have left gas stations around the world exposed to remote takeover, often for years.  The vulnerabilities were found in an embedded gas station controller of which there are currently over 1,000 installed and online. The manufacturer was notified when the threat was confirmed.

IMAGE SOURCE

Kaspersky Lab researchers helped uncover a number of unknown vulnerabilities that have left gas stations around the world exposed to remote takeover, often for years.  The vulnerabilities were found in an embedded gas station controller of which there are currently over 1,000 installed and online. The manufacturer was notified when the threat was confirmed.

Ido Naor, senior security researcher at Kaspersky Lab, together with another researcher found the controller during unrelated research into devices with open connections to the internet. In many cases the controller had been placed in the fuel station over a decade ago and had been connected to the internet ever since.

The controller, which runs a Linux machine, operates with high privileges and the researchers discovered a number of vulnerabilities that leave the device and the systems it is connected to open to cyberattack.  For example, the researchers were able to monitor and configure many of the gas station settings.  An intruder able to bypass the login screen and gain access to the main interfaces would be able to do any of the following:

  • Shut down all fueling systems
  • Change the fuel prices
  • Cause fuel leakages
  • Circumvent payment terminals to steal money (the controller connects directly to the payment terminal, so payment transactions could be hijacked)
  • Scrape vehicle license plates and driver identities
  • Execute code on the controller unit
  • Move freely within the gas station network

“When it comes to connected devices it is easy to focus on the new and to forget about products installed many years ago that might be leaving the business wide open to attack.  The damage that could be done by sabotaging a gas station doesn’t bear thinking about. We have shared our findings with the manufacturer,” said Naor.

The  vulnerabilities have been reported to MITRE and the research is ongoing.

Kaspersky Lab advises manufacturers of connected internet-of-thing devices to consider the security of their products from the very first moment of development and design, and to review legacy devices for possible security vulnerabilities. Users of connected devices are urged to review regularly the security of these devices and not to rely on factory settings.

Advertisement. Scroll to continue reading.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The Philippines’ global ranking for local threats rose from 76th to 66th, highlighting the need for stronger cybersecurity measures.

HEADLINES

Despite 65% having adopted generative artificial intelligence (GenAI capabilities), 89% of IT leaders are concerned that flaws in GenAI cybersecurity tools could put their...

APPS

PSBank is reinforcing its commitment to security through key enhancements to its PSBank Mobile app.

White Papers

Hyper-personalized attacks and agent AI subversion will require industry-wide effort to root out and address. Business leaders should remember that there’s no such thing...

HEADLINES

GCash, a financial super app and cashless ecosystem, reaffirmed its commitment to trust, security, and collaboration with customers, stakeholders, and law enforcement to ensure...

HEADLINES

Senator Mark Villar recently filed a resolution seeking a senate inquiry on the trade of International Mobile Subscriber Identity (IMSI) catchers, which allow fraudsters...

HEADLINES

Under the DSA, Globe and GoTyme may share with digital bank GoTyme information about mobile numbers potentially used by fraudsters, including names, addresses, and...

HEADLINES

In 2024, Converge blocked a record 183 billion entry attempts to  683,000 URLs / domains it has registered in its system as illegal sites....

Advertisement