The massive Target breach led to revelations that many companies use Internet-connected heating, ventilation, and air conditioning (HVAC) systems without adequate security, giving hackers a potential gateway to key corporate systems, a security firm warned Thursday.
Cloud security service provider Qualys said that its researchers have discovered that most of about 55,000 HVAC systems connected to the Internet over the past two years have flaws that can be easily exploited by hackers. Such a flaw was used by hackers in the Target breach.
[ Also on InfoWorld: Target contractor says it was victim of cyber attack. | Keep up with key security issues with InfoWorld's Security Adviser blog and Security Central newsletter. ]
HVAC systems connect to networks at various retail companies, government buildings and even hospitals, according to the security firm. HVAC vendors and other third parties often have remote access right to these systems for administrative and support purposes.
Hackers can exploit these systems to gain access to enterprise networks and leapfrog onto other corporate systems, Qualys said.
The recent breach at Target, which resulted in the theft of data on 40-million credit and debit cards, is believed to have occurred in this way. According to security blogger Brian Krebs, who first reported the massive breach, hackers gained access to the Target network using login credentials stolen from a company that provides HVAC services to the retailer.
The HVAC firm apparently had access rights to Target's network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The Target data thieves used the remote access rights to gain a foothold on the retailer's network and subsequently leapfrog onto the company's payment systems.
Most companies have no idea HVAC systems are connected to the Internet and can serve as gateways into the corporate network and sensitive data, said Billy Rios director of intelligence at Qualys, in an email.
"This breach doesn't just affect Target. There are many other control systems for other companies that are exposed," Rios said.
After the disclosure about how attackers accessed the Target network, Qualys did some network scanning and found that that the HVAC system at Target's headquarters is still visible online. So too is the HVAC and energy management systems at the Sochi Olympics arena, he said.
"The Sochi system doesn't even require a password, so if you know the IP address, you're in. We've contacted the integrator to warn them of this problem," Rios noted.
Often, the companies that have remote access to HVAC systems fail to realize that the systems can be used as a gateway to sensitive corporate networks. So they typically tend to have lax security measures, he said. For instance, many HVAC management companies use the same password to access systems belonging to multiple customers, he said.
Qualys has been working with the DHS on this issue for three years, so the threat is not unknown to all, Rios said. "Most people just don't know about it yet," he added.
Boatner Blankenstein, senior director of solutions engineering at Bomgar, a company that provides tools for securing remote access, said the Target breach shows why companies need to implement measures for controlling what third-parties can do on their networks.
Large enterprises often grant remote access rights to software, hardware, and numerous other vendors and external third parties. But few have measures in place for ensuring that the access is properly authenticated and secured.
While many companies might routinely log remote access sessions, few have capabilities to audit the access from a security standpoint, he said.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is firstname.lastname@example.org.
Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.
This story, "Target attack shows danger of remotely accessible HVAC systems" was originally published by Computerworld .