Incident: Gas Station Software Vulnerabilities Lead to Cyberattacks and Data Theft

Published Date: 2018-03-12

Postmortem Analysis
Timeline 1. The software failure incident with gas station vulnerabilities was reported on March 9, 2018 [Article 69855]. Therefore, the software failure incident likely happened around March 2018.
System 1. Gas station pumps connected to the internet with default passwords that owners couldn't change and controls that give an attacker complete access to the machine [69855]. 2. Online software from Orpak Systems, a fuel management company acquired by North Carolina-based Gilbarco Veeder-Root, installed in more than 35,000 gas stations around the world [69855].
Responsible Organization 1. Gas station pumps connected to the internet with default passwords that owners couldn't change and controls that give an attacker complete access to the machine [69855]. 2. Orpak Systems, the fuel management company acquired by North Carolina-based Gilbarco Veeder-Root, responsible for the online software used in more than 35,000 gas stations worldwide [69855].
Impacted Organization 1. Gas stations worldwide, including more than 1,000 gas stations from the US to India, were impacted by the software failure incident [69855].
Software Causes 1. Gas station pumps connected to the internet with default passwords that owners couldn't change, giving attackers complete access to the machines [69855]. 2. Vulnerabilities in the online software provided by Orpak Systems, a fuel management company, which allowed attackers to change gas prices, steal credit card information, get license plate numbers, steal gas, adjust temperature monitors, and more [69855]. 3. Lack of software updates and security measures for the outdated machines and software used in gas stations, making them susceptible to cyberattacks [69855].
Non-software Causes 1. Weak passwords on gas station pumps connected to the internet, which owners couldn't change [69855]. 2. Lack of security measures in place for gas station software and hardware systems [69855]. 3. Outdated machines and software, some more than a decade old, with no real updating mechanisms [69855].
Impacts 1. The software failure incident allowed attackers to change gas prices, steal credit card information, get license plate numbers, steal gas, adjust temperature monitors, and more at over 1,000 gas stations globally [69855]. 2. The vulnerability could potentially lead to dangerous scenarios such as adjusting pressure and temperatures in the tank, risking explosions [69855]. 3. The incident highlighted the risks associated with internet-of-things devices and the lack of security in such systems [69855]. 4. The software failure incident could lead to the remote shutdown of gas stations, grounding entire fleets without the operators' knowledge [69855].
Preventions 1. Implementing strong password policies and ensuring default passwords are changed on all internet-connected devices, such as gas station pumps [69855]. 2. Regularly updating software and firmware on the gas station pumps to patch vulnerabilities and improve security [69855]. 3. Conducting thorough security assessments and penetration testing on the gas station software to identify and address potential weaknesses [69855]. 4. Establishing secure network configurations and access controls to prevent unauthorized access to the gas station systems [69855]. 5. Providing timely responses to security researchers who report vulnerabilities, and actively engaging with them to address the issues [69855].
Fixes 1. Implementing software patches and upgrades to address the vulnerabilities [69855]. 2. Notifying sites with vulnerabilities to implement additional IT security measures to reduce or eliminate risks [69855]. 3. Updating the outdated machines and software with real updating mechanisms to ensure security [69855].
References 1. Kaspersky Lab [69855] 2. Israeli security researcher Amihai Neiderman [69855] 3. Orpak Systems [69855] 4. North Carolina-based Gilbarco Veeder-Root [69855] 5. Aviv Tal, spokesman for Orpak [69855]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to gas station vulnerabilities has happened again within the same organization. Orpak Systems, the fuel management company whose online software was found to have vulnerabilities, had its software installed in more than 35,000 gas stations around the world. The incident highlighted the lack of security in internet-of-things devices and the risks associated with unsecured systems [69855]. (b) The software failure incident related to gas station vulnerabilities has also happened at multiple organizations. The research conducted by Kaspersky Lab revealed that more than 1,000 gas stations, from the US to India, were open to cyberattacks due to issues with the gas station pumps connected to the internet with default passwords that couldn't be changed. This indicates a widespread problem across different gas stations globally [69855].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the vulnerability of gas station pumps connected to the internet with default passwords that owners couldn't change. This design flaw allowed attackers to have complete access to the machines, enabling them to change gas prices, steal credit card information, get license plate numbers, steal gas, and more [69855]. (b) The software failure incident related to the operation phase is evident in the fact that attackers could exploit the weak passwords remotely, without needing physical access to the gas stations. This highlights the operational aspect of the failure, where the misuse of the system's online connectivity and weak security measures allowed for potential cyberattacks [69855].
Boundary (Internal/External) within_system (a) The software failure incident related to the gas station vulnerabilities can be categorized as within_system. The vulnerabilities stemmed from issues within the gas station pumps' software and controls, such as default passwords that couldn't be changed, giving attackers complete access to the machines [69855]. Additionally, the software vulnerabilities were related to the online software provided by Orpak Systems, which was acquired by Gilbarco Veeder-Root, and the lack of updating mechanisms in the software [69855]. These factors indicate that the failure originated from within the system itself.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: The software failure incident at gas stations was primarily due to vulnerabilities in the gas station pumps connected to the internet with default passwords that owners couldn't change, giving attackers complete access to the machines. This allowed attackers to remotely change gas prices, steal credit card information, get license plate numbers, steal gas, and adjust temperature monitors [69855]. (b) The software failure incident occurring due to human actions: The human actions contributing to the software failure incident included the lack of response from vendors despite being contacted by security researchers in 2017 about the vulnerabilities. The vendors mostly ignored the warnings, and the vulnerabilities remained unresolved. Additionally, the software and machines were out of date, with outdated software lacking real updating mechanisms [69855].
Dimension (Hardware/Software) hardware, software (a) The software failure incident related to hardware: - The software failure incident in the gas stations was primarily due to vulnerabilities in the hardware components, specifically the gas station pumps connected to the internet with default passwords that couldn't be changed, giving attackers complete access to the machines [69855]. - The vulnerabilities in the gas station hardware allowed attackers to remotely manipulate various aspects such as changing gas prices, stealing credit card information, stealing gas, adjusting temperature monitors, and potentially causing dangerous scenarios like explosions by tampering with pressure and temperatures in the tank [69855]. (b) The software failure incident related to software: - The software failure incident was also attributed to the online software provided by Orpak Systems, a fuel management company, which was acquired by Gilbarco Veeder-Root. The software vulnerabilities allowed attackers to exploit weak passwords and gain root access to the gas station systems, enabling them to carry out malicious activities remotely [69855]. - The outdated software in the gas station machines, with no apparent updating mechanisms, contributed to the persistence of vulnerabilities even after being notified by security researchers. The lack of response and updates from the vendors indicated a software-related failure in addressing and mitigating the security risks [69855].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in the article is malicious in nature. The vulnerability in gas station pumps connected to the internet with default passwords that couldn't be changed allowed attackers to have complete access to the machines. Attackers could change gas prices, steal credit card information, get license plate numbers, steal gas, adjust temperature monitors, and potentially cause explosions by adjusting pressure and temperatures in the tank [69855]. The security researchers who discovered the vulnerabilities tried to contact the vendors in 2017 but were mostly ignored, indicating a lack of proactive response to address the issues [69855].
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident related to the gas station vulnerabilities can be attributed to poor decisions made by the gas station software providers and manufacturers. The vulnerabilities stemmed from gas station pumps being connected to the internet with default passwords that owners couldn't change, giving attackers complete access to the machines [69855]. Additionally, the vendors were contacted about the vulnerabilities in 2017 but mostly ignored the warnings, indicating a lack of proactive action to address the security flaws [69855]. The software and machines were described as out of date, sometimes more than a decade old, with no apparent real updating mechanisms in place [69855]. These factors point to poor decisions and negligence on the part of the software providers and manufacturers in ensuring the security of the gas station systems.
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence is evident in the gas station vulnerabilities highlighted in the article. The vulnerabilities stemmed from gas station pumps being connected to the internet with default passwords that owners couldn't change, giving attackers complete access to the machines [69855]. Additionally, the software used in these gas stations, provided by Orpak Systems, was found to have weak security measures, including online guides with technical details, passwords, and screenshots that could be easily accessed [69855]. Despite being notified about the vulnerabilities in 2017, the vendors mostly ignored the researchers who discovered the issues, indicating a lack of proactive response to security concerns [69855]. (b) The software failure incident related to accidental factors is demonstrated by the unintended consequences of the vulnerabilities in the gas station software. The vulnerabilities allowed attackers to remotely change gas prices, steal credit card information, adjust temperature monitors, and potentially cause dangerous scenarios like explosions by manipulating tank pressures and temperatures [69855]. These unintended consequences highlight the severity of the security flaws in the software, which could lead to significant harm if exploited by malicious actors.
Duration permanent The software failure incident related to the gas station vulnerabilities discussed in the article is more likely to be categorized as a permanent failure. This is indicated by the fact that the vulnerabilities stemmed from fundamental issues such as gas station pumps being connected to the internet with default passwords that owners couldn't change, outdated machines and software, and lack of real updating mechanisms [69855]. These underlying factors suggest that the vulnerabilities were not just due to specific circumstances but were inherent to the design and implementation of the systems, making the failure more permanent in nature.
Behaviour value, other (a) crash: The software failure incident described in the article does not specifically mention a crash where the system loses state and does not perform any of its intended functions. (b) omission: The incident does not directly relate to a failure caused by the system omitting to perform its intended functions at an instance(s). (c) timing: The incident does not involve a failure due to the system performing its intended functions correctly but too late or too early. (d) value: The software failure incident in the article is related to a failure due to the system performing its intended functions incorrectly. The vulnerabilities in the gas station software allowed attackers to change gas prices, steal credit card information, adjust temperature monitors, and more, showcasing incorrect behavior of the system [69855]. (e) byzantine: The incident does not align with a failure due to the system behaving erroneously with inconsistent responses and interactions. (f) other: The behavior of the software failure incident in this case involves security vulnerabilities that allowed attackers to gain complete access to gas station pumps, change prices, steal information, and potentially cause dangerous scenarios like explosions. The system's behavior in this context can be categorized as a security breach leading to unauthorized access and manipulation of sensitive data and operations [69855].

IoT System Layer

Layer Option Rationale
Perception processing_unit, network_communication, embedded_software (a) sensor: The software failure incident related to gas station vulnerabilities was not specifically mentioned to be related to sensor errors. However, the vulnerability stemmed from gas station pumps connected to the internet with default passwords that owners couldn't change, allowing attackers to manipulate various aspects such as gas prices, steal credit card information, and adjust temperature monitors [69855]. (b) actuator: The incident did not directly involve actuator errors. The vulnerability allowed attackers to remotely change gas prices, steal credit card information, and potentially cause dangerous scenarios like adjusting pressure and temperatures in the tank, but there was no specific mention of actuator errors [69855]. (c) processing_unit: The software failure incident was related to vulnerabilities in the software used in gas station pumps, particularly the online software from Orpak Systems. The attackers could gain root access and manipulate various functions of the gas station machines, indicating a failure related to processing errors in the software [69855]. (d) network_communication: The failure in this incident was closely tied to network communication errors. The vulnerability arose from gas station pumps being connected online with weak passwords, allowing attackers to exploit the network communication to remotely access and control the machines [69855]. (e) embedded_software: The software failure incident was primarily attributed to vulnerabilities in the embedded software used in gas station pumps. The online software from Orpak Systems, which was acquired by Gilbarco Veeder-Root, was found to have security flaws that allowed attackers to gain complete access to the machines and manipulate various functions [69855].
Communication connectivity_level The software failure incident related to the gas station vulnerabilities reported in Article 69855 was primarily related to the connectivity_level of the cyber physical system. The vulnerability stemmed from gas station pumps connected to the internet with default passwords that owners couldn't change, giving attackers complete access to the machines remotely. The attackers could change gas prices, steal credit card information, adjust temperature monitors, and more, all through online connections with weak passwords. The issue was highlighted as a cybersecurity risk associated with internet-of-things devices, emphasizing the lack of security in network connections rather than physical layer vulnerabilities [69855].
Application TRUE The software failure incident related to the gas station vulnerabilities reported in Article 69855 was indeed related to the application layer of the cyber physical system. The vulnerability stemmed from issues with the online software provided by Orpak Systems, a fuel management company, which was acquired by Gilbarco Veeder-Root. The software had weak passwords that could not be changed by the gas station owners, allowing attackers to gain complete access to the machines. This vulnerability allowed attackers to manipulate gas prices, steal credit card information, adjust temperature monitors, and more, showcasing a failure at the application layer due to security flaws introduced by the software [69855].

Other Details

Category Option Rationale
Consequence unknown (a) death: People lost their lives due to the software failure - No information in the provided article suggests that people lost their lives due to the software failure incident. [69855]
Domain utilities (a) The software failure incident reported in the article is related to the industry of utilities, specifically gas stations. The vulnerability in the gas station pumps connected to the internet allowed attackers to manipulate gas prices, steal credit card information, steal gas, and even potentially cause dangerous scenarios like adjusting pressure and temperatures in the tank to cause an explosion [Article 69855].

Sources

Back to List