Okay, I read the security report, and pretty much know exactly what they have managed to do. And no, they do not have access to control systems - probably. I’ll get to the ‘probably’ in a minute.
For background, I have been working with control systems software for almost 20 years. I have contributed to software almost exactly like what’s shown in that screenshot.
So what you saw in that screenshot was an HMI for a SCADA package. When you build out a control system for a plant, you design the plant in the SCADA software, which produces the diagram you saw. If the software was live, you would see that screen shot animated, showing the actual state of all the controls defined for the project. For example, a valve will be represented with a symbol, and that symbol will show whether or not the valve is open.
Now, the actual SCADA systems in any factory with better than half-assed IT will be on its own internal network. So what these guys managed to glom onto is either a copy of the control software running on a test network, or output from a control system that some engineer copied for study or a report, or something like that. It could have been just a static screen shot stored in someone’s e-mail. The presence of that screen shot does NOT indicate that hackers have actual access to control systems inside the facility. Just that they have the definition of the facility, including how it’s structured, what types of equipment and material are being used, and perhaps recipes for manufacture or operations - that sort of thing.
The risk here is that their phishing will uncover someone doing something stupid, like having installed remote desktop software on a server on the factory network for ‘convenience’, and then getting access to that RDP server and being able to control the actual SCADA system from there. Or, they might be able to control it a backdoor way - by modifying the code stored in the dev repository that could be on the main network, then hoping it gets migrated to the actual control system. That sort of thing.
But Maddow was wrong, and the New York Times was wrong. This report itself does not suggest in any way that hackers have actually gained access to the factory control system itself. However, what they have is bad enough. They have the complete definition of the facility, including how everything in it is wired together and probably complete definitions of the control system, which will allow them to reverse-engineer an awful lot. Couple that with all the other data they’ve no doubt collected, and they have a lot of ammunition that can be used for further hacking/social engineering attacks.
The state of tech reporting in the media is godawful.