Kuboid
Open Luck·Kuboid.in
Black Hat2023
Open in YouTube ↗

Seeing Through the Invisible: Radiation Spikes Detected in Chernobyl

Black Hat1,851 views38:31about 2 years ago

This talk demonstrates a technique for detecting data fabrication in industrial control systems by analyzing anomalies in reported sensor data. The research focuses on the Automatic Radiation Monitoring System (ASKRS) in the Chernobyl Exclusion Zone, specifically identifying patterns of manipulated measurements that contradict physical reality. The speaker provides a methodology for using mathematical modeling to validate sensor data integrity and detect potential cyber-physical attacks. The presentation highlights the importance of cross-referencing sensor data with physical environmental factors to identify malicious activity.

Detecting Data Fabrication in Industrial Control Systems: Lessons from Chernobyl

TLDR: This research exposes how sensor data in industrial control systems can be manipulated to create false narratives, using the Chernobyl radiation monitoring network as a case study. By applying mathematical modeling to cross-reference reported sensor values with physical environmental constraints, researchers identified clear patterns of data fabrication. Pentesters and security researchers should prioritize integrity checks on sensor data pipelines, as these systems often lack the robust validation required to detect sophisticated, targeted manipulation.

Industrial control systems are often treated as black boxes where the data coming out is assumed to be the absolute truth. When a sensor reports a radiation spike, the immediate reaction is to trust the telemetry. However, as demonstrated by the analysis of the Automatic Radiation Monitoring System (ASKRS) in the Chernobyl Exclusion Zone, telemetry can be weaponized to manufacture reality. This research is a masterclass in using physical constraints to perform forensic validation on digital data, a skill that every red teamer and security researcher needs when auditing critical infrastructure.

The Anatomy of a Sensor Spoofing Attack

The core of this research centers on the GammaTRACER radiation detectors and the SkyLINK transmission system. These devices are designed to be autonomous, transmitting ambient dose rate data to a central processing station. The attack vector identified here is not a simple network-level denial of service, but a sophisticated data manipulation campaign. By injecting fabricated spikes into the DataEXPERT software, an adversary can trigger false alarms, manipulate public perception, or force emergency response protocols that are not actually required.

Mechanically, the fabrication follows a structured pattern. The researchers identified four distinct signatures of manipulation:

  1. A unique spike is reported, followed by the station going offline.
  2. Two spikes are injected using an incremental logic where the second is always lower than the first.
  3. Three spikes are injected using an incremental logic.
  4. A spike is injected, followed by a decrease, and then a return to baseline.

These patterns are too structured to be the result of natural phenomena. In a real-world engagement, a pentester should look for these "too perfect" anomalies. If you are auditing an ICS environment, do not just look for unauthorized access; look for data that defies the laws of physics or the expected operational baseline of the equipment.

Validating Data Integrity with Physical Constraints

The most powerful takeaway from this talk is the methodology for validating sensor data. The researchers used the IAEA guidelines on operational intervention levels to create a mathematical model that tests the plausibility of the reported radiation spikes.

If a sensor reports a massive spike in radiation, there must be a corresponding physical explanation. In the case of the Chernobyl data, the reported spikes were attributed to the resuspension of radioactive soil by heavy military vehicles. However, the researchers proved this was physically impossible. By calculating the airborne concentration of Cesium-137 required to produce such a spike, they showed that the required dust levels would have been orders of magnitude higher than what is physically possible in that environment.

For those conducting assessments, this is the gold standard for data integrity testing. If you can define the physical or operational boundaries of a system, you can write scripts to flag any data that falls outside those bounds. For example, if you are testing a water treatment facility, you can model the expected chemical levels based on flow rates. If the sensor reports a value that would require a chemical concentration physically impossible to achieve with the current pump settings, you have found your data fabrication.

Real-World Applicability for Pentesters

When you are on an engagement targeting an ICS or IoT environment, your goal is to understand the data pipeline from the sensor to the HMI. Most of these systems use proprietary protocols, but the logic remains the same. You need to identify where the data is ingested and where it is stored.

If you can gain access to the database or the middleware, you can perform the same "spike-and-offline" technique. The impact is significant: you can cause a plant to shut down, trigger unnecessary maintenance, or mask a physical attack by keeping the HMI showing "normal" values while the system is failing. The OWASP IoT Top 10 project provides a great framework for understanding these risks, specifically regarding insecure data transfer and storage.

Defending Against Data Fabrication

Defending against this type of attack requires moving beyond perimeter security. You must implement data validation at the application layer. If your system receives a value from a sensor, it should be cross-referenced against other sensors in the same area or against a physical model of the process. If a sensor reports a value that is physically impossible, the system should flag it as a potential integrity compromise rather than treating it as a valid operational event.

Furthermore, ensure that your transmission protocols include robust integrity checks. While the researchers noted that the SkyLINK protocol includes a CRC, a CRC only protects against transmission errors, not malicious data injection. If the adversary can inject data at the software level, the CRC will be recalculated for the malicious packet, rendering it useless as a security control.

The next time you are looking at a dashboard in an industrial environment, ask yourself: how do I know this is real? The data is only as good as the integrity of the sensor that captured it and the pipeline that delivered it. Start looking for the gaps between the digital representation and the physical reality. That is where the most interesting vulnerabilities are hiding.

Talk Type
research presentation
Difficulty
advanced
Category
iot security
Has Demo Has Code Tool Released


Black Hat USA 2023

118 talks · 2023
Browse conference →
Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in