You are on page 1of 3

Looking into

Windows
Windows XP has reached the end of its
life – what are the implications?

VOLKER JUNG, ANTHONY BYATT – Microsoft’s successful no new patches and no active support. The effect of this
and very popular Windows XP operating system is now is that XP will slowly become unsecure, unreliable and
well over a decade old. While about 30 percent of Win- incompatible with most newly released IT hardware, such
dows users worldwide still rely on XP, an operating as PCs, PC components, network equipment and printers.
system as old as this cannot be supported forever. In other words, the end of the XP era is affecting many
Accordingly, Microsoft ceased XP support on April 8th, industrial applications and requires a proactive response
2014. This means there are no new security updates, from users.

Looking into Windows ­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­3 9


The answers to these questions were not
1 Control/HMI (human-machine interface)
always straightforward and easy, and it be- systems to be evolved
came clear that there were indeed signifi-
System/HMI Comment
cant issues raised by the end of XP sup-
port. The most significant issues can be 800xA core systems
System 800xA
grouped into four major categories: (V5.0 and older)

− Security
Freelance Freelance systems (V6.2 – V9.1)
− Compliance
− Lack of independent software
Power Generation
vendor support Portal/Tenore
All Windows-based versions

− Hardware manufacturer support


All Windows-based versions;
Conductor NT count is number of servers,
Of these, security issues are the most critical. not number of systems

Process Portal B All versions


Windows XP security updates
In 2010, the Stuxnet worm made head-
lines around the world. With a size of just
500 kB, this malicious software attacked Once the host system is compromised,
at least 14 industrial sites in Iran, including the intruder may use it to distribute more
a uranium-enrichment plant. Stuxnet at- RATs to form a botnet – a collection of
tacked in three phases: First, it targeted compromised computers that are ma-
Microsoft Windows machines and net- nipulated in concert to cause further
works, then it sought out software (also ­disruption.
Windows-based) used to program indus-
trial control systems and finally it insinuat- Because a RAT enables administrative
ed itself into the programmable logic con- control, it allows the intruder to monitor

A
trollers used to control machinery. user behavior through keyloggers or other
t one time, the idea of running spyware; activate a webcam; access con-
an industrial application using Since Stuxnet, the target-rich landscape of fidential information; format drives; delete
Microsoft Windows would not industrial IT has been under a sustained or alter files; and so on.
have been entertained. How- assault that has grown ever more sophisti-
ever, when Microsoft introduced their Win- cated. For example, the so-called watering In June 2014, the Havex malware family
dows XP operating system over a decade hole strategy has been devised as a way to made headlines by attacking control sys-
ago, industry sat up and took notice. Win- introduce malware into the target systems. tems in different branches of industry,
dows XP provided the stability, flexibility In this strategy, the malicious party guess- including the energy sector. A RAT is a
and functionality needed by many indus- es or observes which websites the com- main component of Havex. The RAT tro-
trial users and soon appeared in every pany often uses,
imaginable type of application. then they infect it
and sit back and An intruder can manipulate
However, all good things come to an end: wait for the victim
On April 8th, 2014 the Windows XP era to visit the site and authentic user profiles on a
concluded when Microsoft support for the
product ceased. Of course, Microsoft had
unwittingly down-
load malware onto
system to allow outsiders
given ample notice and companies had their computer. This access.
been preparing for the switch for some strategic Web com-
years. Yet many questions had to be an- promise (SWC) tac-
swered: Could a standalone XP system tic catches victims unawares because the janized websites of industrial control sys-
continue to run unaffected? What would infected websites have previously been tem (ICS) and supervisory control and
happen if the XP system was integrated trusted. data acquisition (SCADA) manufacturers.
into another system? Would new hardware In total, 146 servers were attacked by
be needed and what would be the cost of Further, an intruder can manipulate authen- Havex; 88 variants of the Havex RAT
this across the entire organization? What tic user profiles on a system to allow out- were used; and 1500 IP addresses were
would the budget for the switch likely to siders access. PC configurations can also traced in an attempt to identify victims.
be? Could virtualization fix the problem? be manipulated and PCs can then, for Clearly, Havex represented a serious
What support would be available to mi- example, become the homes of remote ­attack on industry.
grate over onto a new system? access trojans (RATs) – malware pro-
grams that give an intruder administrative In July 2014, the “energetic bear” virus in-
control over the target computer. RATs fected over 1,000 energy firms in Europe
Title picture
can be infiltrated into a PC via an email and the United States. This virus theoreti-
Microsoft support for Windows XP ceased on
April 8th, 2014. What are the implications for attachment. cally allows hackers to take control of
industrial users? power plants.

­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­4 0 ABB review 3|15


− Utilize domain name server (DNS)
2 XP upgrade strategies
sinkholes to block access to the real
website.
Controller
− Issue an alert when an endpoint-initiat-
3.1 ed remote desktop or virtual network
4.0
800xA
4.1
All 800xA 5.1 6.0 connection is detected.
5.0 − Prevent binary execution for temporary
6.2
7.1 users in the file system or issue an alert
7.2
Freelance
8.1
All Freelance 2013 2015 when this occurs.
8.2 − Whitelist service binaries in the operat-
9.1
DCI 800xA 5.1 6.0
ing system.
Freelance 2013 2015 − Issue an alert for service starts/stops/
Freelance
Conductor NT All 800xA 5.1 6.0 changes.
800xA 5.1 6.0
Harmony − Audit access control lists, etc.
Symphony + 2.0
MOD 300 800xA 5.1 6.0 − Make regular control system backups.
Freelance
Freelance 2013 2015 − Buy a stock of compatible IT parts.
PPB All 800xA 5.1 6.0
800xA 5.1 6.0
Harmony
Symphony + 2.0
Retaining Windows XP is becoming unten-
Freelance 2013 2015 able. It is an inevitable part of industrial IT
Freelance
800xA 5.1 6.0 life that an evolutionary software step has
PGP/Tenore All 800xA 5.1 6.0
Harmony to be taken every so often and the move
Symphony + 2.0
upwards from Windows XP is one of the
more significant of these. The move will
put users in a position where they are well
From these examples it is apparent that they are no longer able to satisfy compli- placed to meet the security, hardware,
the industrial IT environment is quite vul- ance requirements if they remain with software and compliance demands of the
nerable enough – and without critical Win- ­W indows XP. With so much personal and modern industrial IT world.
dows XP security updates, PCs are wide private data now stored on servers, data
open to attack by viruses, spyware and security is a very significant concern. ABB strongly recommends that customers
other malicious software that can steal or running Windows XP operating systems
damage business data and information. Lack of independent evaluate their system life-cycle plans and
Antivirus software no longer provides full software vendor support risk mitigation strategy. Simultaneously,
protection for XP systems. Any devices re- Many software vendors no longer support ABB is offering solutions that can remedy
maining with XP can be used by attackers their products that run on Windows XP as or mitigate risks and help customers better
as an entry point into IT networks. This they are unable to receive Windows XP protect their plants and personnel while
means that even computers running sup- updates. For example, the new Microsoft ensuring safe operations and continuous
ported operating systems can then also be Office package takes advantage of the production. Services are available to help
compromised. newest Windows and does not run on meet the needs of every customer – in-
Windows XP. cluding customers who are unable to up-
Hardware grade immediately and those who elect to
Most manufacturers of PC hardware, What to do remain on Windows XP.
printers and network equipment have al- With so many issues to be overcome, what
ready stopped supporting Windows XP course of action should be taken? The rec-
on new hardware. This means that the ommendation made by Microsoft and all
software drivers required to run Windows cyber security companies is to upgrade
XP on such new hardware are, in most to Windows 7 or 8. This includes distrib-
cases, no longer available – ie, there will uted control system vendors with control
be no XP drivers for new hard disks, print- systems running operating systems with
ers, graphic cards, network equipment, ­W indows XP and older ➔ 1 – 2.
etc. Buying a replacement XP computer
will not be easy or cheap. XP-based hard- Of course, an evaluation can be made of
ware will become obsolete and hard to the cost of keeping XP installations safe
find. Unplanned shutdowns caused by versus upgrade costs. Remaining with
unavailability of hardware components Windows XP is a high-maintenance under- Volker Jung
will become more frequent. taking and requires tools and support from Process Automation Division
experienced cyber security companies. Mannheim, Germany
Compliance Some of the actions that need to be volker.jung@de.abb.com
Businesses that are governed by regula- ­undertaken include:
tory obligations, such as the Health Insur- − Reduce the size of the registry to Anthony Byatt
ance Portability and Accountability Act include only those services that are Editorial consultant
(HIPAA) in the United States, may find that absolutely needed. Louth Village, Ireland

Looking into Windows ­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­4 1

You might also like