19 août 2019 | International, Aérospatial

The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

By Joseph Marks

LAS VEGAS — In a Cosmopolitan hotel suite 16 stories above the Def Con cybersecurity conference this weekend, a team of highly vetted hackers tried to sabotage a vital flight system for a U.S. military fighter jet. And they succeeded.

It was the first time outside researchers were allowed physical access to the critical F-15 system to search for weaknesses. And after two long days, the seven hackers found a mother lode of vulnerabilities that — if exploited in real life — could have completely shut down the Trusted Aircraft Information Download Station, which collects reams of data from video cameras and sensors while the jet is in flight.

They even found bugs that the Air Force had tried but failed to fix after the same group of hackers performed similar tests in November without actually touching the device.

“They were able to get back in through the back doors they already knew were open,” Will Roper, the Air Force's top acquisition official, told me in an exclusive briefing of the results.

The hackers lobbed a variety of attacks — including injecting the system with malware and even going at it with pliers and screwdrivers. When I saw it, the metal box that's usually secure on the aircraft had wires hanging out the front.

The hackers briefed Roper on the findings on Saturday afternoon. He was surrounded by discarded pizza boxes, iced coffee drinks — and the hotel's drinking glasses filled with screws, nuts and bolts removed from five fully dismantled TADS devices, which run about $20,000 a pop.

He'd expected the results to be about this bad, Roper told me on a private tour of the hacking event. He pinned the weaknesses on decades of neglect of cybersecurity as a key issue in developing its products, as the Air Force prioritized time, cost and efficiency.

He's trying to turn that around, and is hopeful about the results of the U.S. government's newfound openness to ethical hackers. He'd come straight from Def Con's first-ever Aviation Village, which the Air Force helped establish, and was wearing a gray T-shirt with the words “No, Mr. Bond, I expect you to hack,” emblazoned on the front — a riff on a classic line from the 1964 James Bond film “Goldfinger.”

This is a drastic change from previous years, when the military would not allow hackers to try to search for vulnerabilities in extremely sensitive equipment, let alone take a literal whack at it. But the Air Force is convinced that unless it allows America's best hackers to search out all the digital vulnerabilities in its planes and weapons systems, then the best hackers from adversaries such as Russia, Iran and North Korea will find and exploit those vulnerabilities first, Roper told me.

“There are millions of lines of code that are in all of our aircraft and if there's one of them that's flawed, then a country that can't build a fighter to shoot down that aircraft might take it out with just a few keystrokes,” he said.

Roper wants to put his military hardware where his mouth is.

During next year's Def Con conference, he wants to bring vetted hackers to Nellis or Creech Air Force bases near Las Vegas where they can probe for bugs on every digital system in a military plane, including for ways that bugs in one system can allow hackers to exploit other systems until they've gained effective control of the entire plane.

He also wants to open up the ground control system for an operational military satellite for hacker testing, he said.

“We want to bring this community to bear on real weapons systems and real airplanes,” Roper told me. “And if they have vulnerabilities, it would be best to find them before we go into conflict.”

Those hacking challenges will also be useful for the private sector because military planes and satellites share many of their computer systems with the commercial versions of those products, Roper said, and the Air Force can share its findings.

The seven hackers probing the TADS devices were all brought to Vegas by the cybersecurity company Synack, which sells the Pentagon third-party vulnerability testing services, under a contract with the Defense Digital Service, a team of mostly private-sector technology stars who try to solve some of the Pentagon's thorniest technology problems during short-term tours.

The Defense Digital Service started by organizing large-scale hacking competitions in 2016, with names such as “Hack the Pentagon” and, eventually, “Hack the Air Force.” These were open to almost anybody — but included only public-facing hacking targets such as military service websites and apps.

Shortly after, they also began opening more sensitive systems to a smaller number of vetted hackers who sign nondisclosure agreements.

DDS has run about a dozen of those more sensitive hacking competitions so far, but this is the first time it has offered up the same system for hacking twice, said Brett Goldstein, DDS's director, who earned a reputation in technology as Open Table's IT director and chief data officer for the city of Chicago.

“That's important because security is a continuous process,” he told me. “You can't do an exercise and say, ‘Oh, we found everything' and check the box. You need to constantly go back and reevaluate.”

They also allowed the hackers to be more aggressive this time and to physically disassemble the TADS systems to get a better idea of what kinds of digital attacks might be effective, Goldstein said. That meant the hackers could simulate a cyberattack from adversaries that had infiltrated the vast network of suppliers that make TADS components and had sophisticated knowledge about how to compromise those elements.

They could also advise the Air Force about flaws in how the TADS hardware was built that make it more susceptible to digital attacks.

Moving forward, Roper told me, he wants to start using that knowledge to mandate that Air Force vendors build better software and hardware security controls into their planes and weapons systems upfront so the Air Force doesn't have to do so much cybersecurity work on the back end.

He's up against an arcane and byzantine military contracting process, however, that's going to make those sorts of fundamental reforms extremely difficult, he acknowledged.

In some cases, the company that built an Air Force system owns the software embedded in that system and won't let the Air Force open it up for outside testing, he says. In other cases, the Air Force is stuck with legacy IT systems that are so out of date that it's difficult for even the best technologists to make them more secure.

“It's difficult to do this going backward, but we're doing our best,” Roper told me. “I can't underscore enough, we just got into the batter's box for what's going to be a long baseball game.”

https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/08/14/the-cybersecurity-202-hackers-just-found-serious-vulnerabilities-in-a-u-s-military-fighter-jet/5d53111988e0fa79e5481f68/

Sur le même sujet

  • Naval Ship Management awarded contract to sustain Australian LHDs

    7 décembre 2018 | International, Naval

    Naval Ship Management awarded contract to sustain Australian LHDs

    The Australian Defence Force (ADF) has awarded Naval Ship Management (NSM) Australia, a 50/50 joint venture between engineering group UGL and Babcock, an AUD1.5 billion (USD1.1 billion) contract to support and sustain the Royal Australian Navy's (RAN's) two 26,800-tonne Canberra-class landing helicopter dock ships (LHDs) and their 12 associated amphibious landing craft for up to 15 years. The contract is for an initial five years, with the expectation of two further five-year extensions, Babcock announced in a 3 December statement, adding that its share for the first five years amounts to AUD250 million. The joint venture, which won the partnering agreement with the ADF in a competitive process, will begin to sustain and support these vessels in July 2019. Full article: https://www.janes.com/article/84973/naval-ship-management-awarded-contract-to-sustain-australian-lhds

  • Ce qu’est l’Europe de la défense. Ce qu’elle n’est pas

    7 novembre 2018 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Ce qu’est l’Europe de la défense. Ce qu’elle n’est pas

    (B2) Alors que le serpent de mer de l'armée européenne ressurgit par la gr'ce d'Emmanuel Macron (*), il n'est pas inutile de revenir sur terre. Ce qui existe aujourd'hui ... et ce qui n'existe pas en matière de défense au niveau européen. La réalité inscrite dans les Traités européens actuels est la politique (européenne) de sécurité et de défense commune (PeSDC). Ou en langage commun, l'Europe de la défense. Elle n'est cependant pas comparable à ce qui se définit au plan national comme une politique de défense. Que ce soit dans le langage des pro ou des anti-intégrations européennes, cet aspect est bien souvent gommé. Or, il est primordial d'avoir une vue ‘honnête' et ‘objective' de la situation actuelle. Une politique nationale de défense D'un point de vue national, une politique de défense se définit tout d'abord par une autorité qui imprime sa marque et un circuit décisionnel court (comme en France avec un président de la république acteur principal) ou plus long (comme en Allemagne avec une décision du gouvernement, une approbation du parlement). Elle répond à une stratégie de défense, qui est élaborée par strates successives, en répondant à des antécédents historiques et une logique politique. Elle se développe ensuite dans un budget d'investissement d'une armée, des équipements militaires, des troupes, une logique d'action et une légitimité dans l'opinion publique qui accepte, plus ou moins, un engagement militaire intérieur ou extérieur, à risque ou non. L'Europe de la défense : un projet politique L'Europe de la défense est tout d'abord un projet politique, qui vise à affirmer la place de l'Europe dans le monde, au service d'une politique étrangère. Elle ne consiste pas ainsi à assurer la défense du territoire ni la protection des citoyens (malgré les déclarations politiques en ce sens). Elle ne procède que d'une coordination des efforts des États membres. Son circuit décisionnel repose ainsi toujours, à toutes les étapes, de l'initiative à l'approbation puis au commandement et au contrôle, sur un accord de tous les États membres, de façon collégiale. Mettre tout le monde d'accord au même moment sur un enjeu commun est un véritable ‘challenge'. Elle a comme objectif unique d'avoir une capacité d'intervention, limitée, dans des missions ou opérations de paix ou de consolidation de l'état de droit. Elle n'est pas ainsi une force d'intervention tout azimut, n'a pas de commandement militaire direct (national) ou intégré (comme l'OTAN), ni de troupes ou de forces disponibles en permanence ni en propre. Elle ne peut intervenir qu'à l'extérieur des frontières, avec le consentement des États concernés (ou au moins de leurs gouvernements) et de la communauté internationale. On est ainsi très loin des ‘fondamentaux' d'une armée européenne. Quand on met face à face ainsi les principes d'une défense nationale et ceux de l'Europe de la défense, il est inévitable que la seconde soit moins efficace que la première. On peut considérer qu'il s'agit d'une faiblesse temporaire, due aux personnalités politiques du moment. Ce peut être le cas parfois. Mais il ne faut pas minorer les faiblesses structurelles dû à un fait principal : l'Europe n'est pas un État mais une structure juridique et économique de concertation et de coopération avant tout. Si on veut donner un aperçu plus mathématique, j'ai évalué, sous forme d'une note — sur une échelle de 0 à 3 — quels points remplit l'Union européenne, une fois mis en place tous les projets évoqués ces derniers temps. On va ainsi d'une note de 0 à 3 selon les thèmes : de 0 pour les équipements et les forces disponibles à 2 pour le budget de recherche, en passant par le mode de décision et le consensus politique que je cote à 1 sur 3. Article complet: https://www.bruxelles2.eu/2018/11/07/ce-quest-leurope-de-la-defense-ce-quelle-nest-pas/

  • French defence group Thales to recruit 12,000 staff as orders boom

    27 février 2023 | International, Aérospatial

    French defence group Thales to recruit 12,000 staff as orders boom

    French defence and technology group Thales plans to hire 12,000 new staff this year as there is strong demand across its product range, CEO Patrice Caine said in an interview with French weekly Le Journal du Dimanche.

Toutes les nouvelles