Incident: Google Building Management System Hack via Tridium Niagara AX Platform

Published Date: 2013-05-06

Postmortem Analysis
Timeline 1. The software failure incident at Google's Wharf 7 office in Sydney, Australia, happened when security researchers found vulnerabilities in the building management system. The incident was reported in an article published on 2013-05-06 [18686]. Therefore, the software failure incident at Google's Wharf 7 office likely occurred before May 2013.
System 1. Tridium Niagara AX platform [18686] 2. Tridium's SoftJACE system [18686]
Responsible Organization 1. The security researchers Billy Rios and Terry McCorkle were responsible for causing the software failure incident by easily hacking into Google's building management system at the Wharf 7 office in Sydney, Australia [18686].
Impacted Organization 1. Google Australia [18686]
Software Causes 1. The software causes of the failure incident were serious security vulnerabilities in the Tridium Niagara AX platform used in Google's building management system, which allowed hackers to easily hack into the system and obtain administrative passwords [18686]. 2. The failure incident was also caused by the unpatched vulnerabilities in the control system for Google's office building, which allowed researchers to access sensitive data and potentially install a rootkit on the system [18686].
Non-software Causes 1. Lack of proper patching and updating of the control system by the company (Google) despite the availability of patches from the system vendor (Tridium) [18686]. 2. Insecure configuration and setup of the building management system by a third-party integrator company, potentially leading to vulnerabilities [18686]. 3. Connection of the control system to the internet, making it accessible to potential hackers [18686].
Impacts 1. The security researchers were able to easily hack into Google's building management system for the Wharf 7 office in Sydney, Australia, due to serious security vulnerabilities in the Tridium Niagara AX platform [18686]. 2. The researchers accessed sensitive information such as blueprints of the floor and roof plans, water pipe locations, and temperature data, indicating a breach of confidential data [18686]. 3. The unpatched vulnerabilities in the control system allowed the researchers to potentially install a rootkit, take over the operating system, and access other control systems on the same network [18686]. 4. The incident highlighted the risks associated with integrators setting up systems insecurely and connecting them to the internet without proper security measures, leading to potential unauthorized access and control [18686]. 5. Despite Google disconnecting the control system from the internet and taking appropriate action to resolve the issue, the incident raised concerns about the security of industrial control systems and the lack of patch implementation by customers [18686].
Preventions 1. Implementing the patch released by Tridium for the vulnerability in the control system could have prevented the software failure incident [18686]. 2. Ensuring that control systems are not connected to the internet or to other systems that are connected to the internet could have prevented the vulnerability exploitation [18686]. 3. Regularly updating and maintaining security measures on control systems, including changing default passwords, could have prevented unauthorized access [18686].
Fixes 1. Implementing the patch released by Tridium for the vulnerability in the control system used by Google's office building [18686]. 2. Ensuring that all control systems are securely configured and not connected to the internet to prevent remote hacking attempts [18686]. 3. Increasing awareness among companies and integrators about the importance of installing patches for control systems to prevent security vulnerabilities [18686].
References 1. Security researchers Billy Rios and Terry McCorkle from security firm Cylance [18686] 2. Google Australia spokesperson [18686] 3. Tridium, the company behind the Niagara AX platform [18686] 4. Tridium's product documentation [18686] 5. Shodan search engine [18686] 6. Tridium's website and published case studies [18686]

Software Taxonomy of Faults

Category Option Rationale
Recurring multiple_organization (a) In the provided articles, it is mentioned that the software failure incident involving security vulnerabilities in industrial control systems, specifically related to the Tridium Niagara AX platform, occurred at Google's Wharf 7 office in Sydney, Australia [18686]. The incident involved researchers easily hacking into Google's building management system due to serious security vulnerabilities in the Tridium platform, which had not been patched by Google despite Tridium releasing a patch for the system. This incident highlights the importance of patching vulnerabilities in control systems to prevent unauthorized access and potential exploitation. (b) The articles also mention that the researchers found more than 25,000 Tridium systems connected to the internet, indicating that similar vulnerabilities and risks exist in other organizations using the Tridium Niagara AX platform [18686]. The incident at Google's office serves as a warning that other organizations with similar setups may also be at risk of unauthorized access and potential security breaches if vulnerabilities are not addressed and systems remain unpatched.
Phase (Design/Operation) design (a) The software failure incident described in the articles is primarily related to the design phase. The incident involved serious security vulnerabilities in the Tridium Niagara AX platform used in Google's building management system at the Wharf 7 office in Sydney, Australia. The vulnerabilities allowed security researchers to easily hack into the system, obtain administrative passwords, access control panels, view sensitive information like blueprints and water pipe locations, and potentially install a rootkit on the system [18686]. The incident highlighted issues with the design and implementation of the control systems, including hardcoded passwords, backdoors embedded by vendors, lack of patching, and insecure configurations that allowed remote access and control of critical building facilities. The vulnerabilities in the system design, such as the unchangeable administrative password ("anyonesguess") and the ability to remotely access and control the system, contributed to the security breach [18686]. (b) While the incident involved operation aspects such as the system running off a DSL line and the potential consequences of exploiting the vulnerabilities (e.g., taking over the operating system and accessing other control systems on the same network), the root cause of the failure can be traced back to design flaws and vulnerabilities in the system itself rather than operational misuse [18686].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident at Google's Wharf 7 office in Sydney, Australia, was primarily within the system. The incident involved serious security vulnerabilities in the building management system based on the Tridium Niagara AX platform. The system had hardcoded passwords that couldn't be changed, backdoors embedded by vendors, and unpatched vulnerabilities that allowed researchers to easily hack into the system and access sensitive information. The incident highlighted the lack of proper security measures within the system itself, leading to unauthorized access and potential risks ([18686]). (b) outside_system: The software failure incident also had elements originating from outside the system. The incident was discovered by external security researchers, Billy Rios and Terry McCorkle from Cylance, who found the vulnerabilities in the Tridium Niagara AX platform used by Google. Additionally, the researchers accessed the system remotely over the internet, indicating that external access played a role in the breach. The incident highlighted the risks associated with connecting control systems to the internet and the potential for external threats to exploit vulnerabilities in the system ([18686]).
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: The software failure incident at Google's Wharf 7 office in Sydney, Australia, was primarily due to serious security vulnerabilities in the Tridium Niagara AX platform, which allowed researchers to easily hack into the building management system. The vulnerabilities included hardcoded passwords, backdoors embedded by vendors, and unpatched systems, which enabled unauthorized access to control panels and sensitive information without any direct human involvement [18686]. (b) The software failure incident occurring due to human actions: The incident also involved human actions, particularly the actions of the security researchers Billy Rios and Terry McCorkle who discovered and exploited the vulnerabilities in the system. They intentionally accessed the control panel, obtained sensitive information, and could have potentially installed a rootkit or taken over the operating system if their intent was malicious. Additionally, the incident highlighted the role of integrators who set up systems insecurely and connect them to the internet without implementing necessary patches, thereby contributing to the vulnerability of the system [18686].
Dimension (Hardware/Software) hardware, software (a) The software failure incident related to hardware: - The incident involved a security vulnerability in the building management system for Google's Wharf 7 office in Sydney, Australia, which was built on the Tridium Niagara AX platform [18686]. - The system was running off a DSL line and had control only over heating and air conditioning in the building, not other critical building facilities like electricity, elevators, or door access [18686]. (b) The software failure incident related to software: - The software failure incident was primarily due to serious security vulnerabilities in the Tridium Niagara AX platform, which was used as the foundation for Google's building management system [18686]. - The researchers were able to exploit unpatched vulnerabilities in the system to obtain administrative passwords, access control panels, and potentially install a rootkit on the system [18686]. - Tridium had released a patch for the vulnerability, but Google's control system was not patched, leaving it vulnerable to exploitation [18686].
Objective (Malicious/Non-malicious) malicious, non-malicious (a) The software failure incident related to the Google building management system at Wharf 7 in Sydney, Australia, can be categorized as malicious. Security researchers were able to easily hack into the system due to serious security vulnerabilities in the Tridium Niagara AX platform, which was not patched by Google despite a patch being available. The researchers were able to obtain administrative passwords, access control panels, view sensitive information like blueprints and water pipe locations, and potentially could have installed a rootkit or taken over the operating system. The incident highlighted the risks posed by unpatched vulnerabilities and insecure configurations, which could have been exploited by attackers with malicious intent [18686]. (b) On the other hand, the software failure incident can also be considered non-malicious in the sense that the security researchers did not actually disrupt the system or exercise any management functionality on the device itself. Their intent was to identify vulnerabilities and report them to Google for appropriate action. Additionally, the Google spokesman confirmed that the control system accessed by the researchers could only control heating and air conditioning in the building and was not connected to other critical building automation systems like electricity, elevators, or door access. Google took action to disconnect the control system from the internet after being informed of the breach, indicating a non-malicious response to the incident [18686].
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident: The software failure incident involving Google's building management system at Wharf 7 in Sydney, Australia, was primarily due to poor decisions made in the setup and management of the system. The incident was a result of various factors such as the system being built on the Tridium Niagara AX platform known for serious security vulnerabilities, the system not being patched despite a patch being available, and the system being connected to the internet without adequate security measures in place. Additionally, the incident highlighted the risks associated with integrators setting up systems insecurely and failing to install necessary patches, leading to vulnerabilities that could be exploited by hackers [18686].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence can be seen in the case of the Google building management system at Wharf 7 in Sydney, Australia. The incident occurred because the system was not patched despite known security vulnerabilities in the Tridium Niagara AX platform it was built on. The researchers were able to easily hack into the system, obtain administrative passwords, access control panels, and potentially install a rootkit due to unpatched vulnerabilities. This highlights a lack of professional competence in ensuring the security of the system ([18686]). (b) The accidental aspect of the software failure incident is evident in the unintentional access gained by the security researchers into Google's building management system. The researchers, Billy Rios and Terry McCorkle, discovered the vulnerabilities in the system while exploring Tridium-based control systems connected to the internet. They did not intend to disrupt the system or exercise management functionality but reported the issue to Google after accessing sensitive information like blueprints and control panel details ([18686]).
Duration temporary (a) The software failure incident in the article appears to be temporary. The incident involved security researchers easily hacking into Google's building management system for the Wharf 7 office in Sydney, Australia, due to serious security vulnerabilities in the Tridium Niagara AX platform. The researchers were able to obtain administrative passwords and access control panels, including sensitive information like blueprints and water pipe locations. Google confirmed the breach and took appropriate action by disconnecting the control system from the internet [18686]. This indicates that the failure was temporary as it was resolved by disconnecting the system from the internet to prevent further unauthorized access.
Behaviour other (a) crash: The software failure incident described in the articles does not involve a crash where the system loses state and does not perform any of its intended functions. The incident involved security vulnerabilities in the building management system for Google's Wharf 7 office in Sydney, Australia, which allowed researchers to access control panels and sensitive information, but they did not disrupt the system or take it down [18686]. (b) omission: The software failure incident does not involve omission where the system omits to perform its intended functions at an instance(s). The incident primarily revolves around security vulnerabilities that allowed unauthorized access to the building management system, rather than the system omitting its functions [18686]. (c) timing: The software failure incident does not involve timing issues where the system performs its intended functions correctly, but too late or too early. The incident is centered around security vulnerabilities and unauthorized access to the building management system, rather than timing-related failures [18686]. (d) value: The software failure incident does not involve the system performing its intended functions incorrectly. The incident primarily focuses on security vulnerabilities that allowed unauthorized access to the building management system, rather than the system performing its functions incorrectly [18686]. (e) byzantine: The software failure incident does not involve the system behaving erroneously with inconsistent responses and interactions. The incident primarily revolves around security vulnerabilities that allowed unauthorized access to the building management system, rather than exhibiting inconsistent behavior [18686]. (f) other: The behavior of the software failure incident can be categorized as a security breach due to vulnerabilities in the building management system that allowed unauthorized access to control panels and sensitive information. The incident highlights the importance of patching systems to prevent such breaches [18686].

IoT System Layer

Layer Option Rationale
Perception network_communication, embedded_software (a) sensor: The software failure incident related to the Google building management system at Wharf 7 in Sydney, Australia, did not specifically mention a failure related to sensor error [18686]. (b) actuator: The incident did not involve a failure due to contributing factors introduced by actuator error [18686]. (c) processing_unit: The failure was not directly attributed to contributing factors introduced by processing error [18686]. (d) network_communication: The software failure incident involved vulnerabilities in the Tridium Niagara AX platform, which allowed hackers to remotely control the building management system due to network communication errors and unpatched vulnerabilities [18686]. (e) embedded_software: The incident highlighted serious security vulnerabilities in the Tridium Niagara AX platform, indicating a failure due to contributing factors introduced by embedded software error [18686].
Communication connectivity_level The software failure incident related to the Google building management system at Wharf 7 in Sydney, Australia, was primarily related to the connectivity level of the cyber-physical system that failed. The incident involved security researchers easily hacking into the building management system due to serious security vulnerabilities in the Tridium Niagara AX platform, which is the platform the system was built on [18686]. The researchers were able to exploit unpatched vulnerabilities in the system, obtain administrative passwords, access control panels, and potentially install a rootkit to take over the operating system and access other control systems on the same network [18686]. This indicates that the failure was more related to network-level vulnerabilities and insecure configurations rather than issues at the physical layer of the system.
Application TRUE The software failure incident related to the Google building management system at Wharf 7 in Sydney, Australia, was indeed related to the application layer of the cyber physical system. The incident involved security researchers easily hacking into the building management system due to serious security vulnerabilities in the Tridium Niagara AX platform, which is the platform the system was built on. The researchers were able to obtain administrative passwords, access control panels, and even view blueprints and control panels, showcasing a breach at the application layer level due to unpatched vulnerabilities in the system ([18686]).

Other Details

Category Option Rationale
Consequence non-human, theoretical_consequence, other (a) death: There is no mention of any deaths resulting from the software failure incident reported in the articles [18686]. (b) harm: There is no mention of physical harm to individuals resulting from the software failure incident reported in the articles [18686]. (c) basic: There is no mention of people's access to food or shelter being impacted due to the software failure incident reported in the articles [18686]. (d) property: The software failure incident did not result in any direct loss of material goods, money, or data for individuals as it primarily involved a security breach in a building management system [18686]. (e) delay: There is no mention of people having to postpone an activity due to the software failure incident reported in the articles [18686]. (f) non-human: The software failure incident impacted non-human entities, specifically the building management system controlling heating and air conditioning in the Google office building in Sydney, Australia [18686]. (g) no_consequence: The software failure incident did have observed consequences, such as unauthorized access to the building management system, potential data exposure, and security vulnerabilities [18686]. (h) theoretical_consequence: The articles discuss potential consequences of the software failure incident, such as the ability for attackers to take over the operating system and access other control systems on the same network, although the researchers did not carry out such actions [18686]. (i) other: The software failure incident led to the exposure of sensitive information, such as blueprints of the building, water pipe locations, and control panel access, which could have had further implications if exploited by malicious actors [18686].
Domain information (a) The failed system was related to the industry of information. The incident involved a security breach in Google's building management system at their Wharf 7 office in Sydney, Australia, which was built on the Tridium Niagara AX platform. The system vulnerability allowed unauthorized access to control panels and sensitive information, such as blueprints and water pipe locations within the building [18686]. The system was intended for managing heating and air conditioning in the building, and it was disconnected from the internet after the breach was reported [18686].

Sources

Back to List