Readit News logoReadit News
diftraku · 3 years ago
> In the video it appears that Peter was using the Flipper Zero to wireless turn the power meter on and off, which also controlled the power to a large AC unit. Eventually switching the meter on and off while under a heavy load resulted in the meter self destructing and releasing the magic smoke.

Calling out Flipper Zero for someone (ab)using the meter's remote control features cuts me the wrong way: you could've done the same with any other SDR, not just the Flipper Zero.

It's not even a surprise this happened, the cut-off is not meant to be operated constantly to cut heavy loads. Similarly you should not use a breaker to turn off heavy (or any, in that matter) loads as you're needlessly wearing down the protective device, instead of a separate cut-off switch that's designed to be replaceable. Especially since it can be positioned downstream from the protective device.

It all boils down to which part of the circuit you can easily repair in case of a fault, in this case the meter is by far the least accessible.

PietdeVries · 3 years ago
Why would a power meter allow an unauthenticated client to turn the thing on and off wireless?!? Sure, if you flip a switch handling a large current often enough, something will break (and I am impressed it's not the AC in this case).

But why does the power meter accept commands from something 'outside', something untrusted?

onetrickwolf · 3 years ago
I mean why are power lines not locked up and buried underground secured locked steel cages?

Because some things work better with trust vs convoluted security.

I think this is something a lot of computer nerds don't get (myself included at one point). It's almost like if something can be accessed we are allowed to access it and it's the fault of the person securing it. But a lot of our society works on trust and I think we'd live in a much more difficult world if everything had to be secure enough to resist any attack.

If this thing was connected to the internet I get it, but you already need physical access to the meter why add another layer of security on top of that? If someone has wants to mess up your power and they have physical access there's plenty of ways they can do it without wireless communication.

nyberg · 3 years ago
Because security is not a priority for the industry. Most have no security, default authentication in the rare case that they have it, and they use protocols with no support for it. The field is decades behind in security practices (it's pretty much IoT) and won't improve unless forced to.

It's also difficult to update such devices in the field so even if they do fix such issues it's only for new units or a new product line which most customers won't bother with until forced to by regulations / incidents as it's expensive to replace them (you have to send someone out on the field as there are pretty much no OTA updates).

the_mitsuhiko · 3 years ago
> Why would a power meter allow an unauthenticated client to turn the thing on and off wireless?!? Sure, if you flip a switch handling a large current often enough, something will break (and I am impressed it's not the AC in this case).

I would guess until recently power meters just had no reason to be secured. We live in a multi unit building (I would guess around 120 of them). There is a shared key that goes to the central electricity room where the meters for all units are. I could turn off anyone's electricity by either unscrewing the main fuses there or by switching the breaker. People are a lot more trustworthy in practice than you would think.

voxadam · 3 years ago
The security of billions and billions of devices (e.g. industrial control systems, PLCs,[0] SCADA,[1] ERTs,[2] etc.) that are responsible for controlling and monitoring virtually every aspect of modern life (e.g. power grid, water purification, natural gas transmission, oil and gas extraction, vehicle traffic control, rail signalling, pharmaceutical manufacturing, etc.) is appalling.

The manufactures and integrators of these devices are just now beginning to realize that the internet exists and that their devices aren't always connected to perfectly isolated RS-485[2] networks or connected to a network at all. They commonly contain hard coded passwords, passwords with staggeringly limited length and complexity, plain text authentication, default passwords, and other backdoors. Working with such devices is like taking a Delorean back to the early 90s, the eighties, or even earlier... it's the wild west.

It pleases me beyond words that hacking contests like Pwn2Own[4] have begun to include these systems in their competitions. This is a massively important area of security research that has historically been ignored.

[0] https://en.wikipedia.org/wiki/Programmable_logic_controller

[1] https://en.wikipedia.org/wiki/SCADA

[2] https://en.wikipedia.org/wiki/Encoder_receiver_transmitter

[3] https://en.wikipedia.org/wiki/RS-485

[4] https://en.wikipedia.org/wiki/Pwn2Own

bayindirh · 3 years ago
We don't know whether the meter accepts every command, or the device has a fixed security protocol reverse engineered and known by researchers.

These protocols exist to get current readings from meters for data retrieval ease, and generally have a combination of security through obscurity and simple authentication to enable mass readings (by authorized people) easier. IIRC, these things can talk P2P in densely populated areas, and you can get all meters' readings in mere minutes, tops.

In any way, after and initial PoC, the rest of the video gets into territory of equipment abuse, and I got angry and sad while watching it. You can do it, OK, then why damage things which are not yours? Document your findings and leave.

dreamcompiler · 3 years ago
Security will almost always be found in products where it dependably increases profit. See comment about John Deere below.

But security is rarely found in products where it only might prevent the loss of profit.

The presence or absence of security in a product always reflects the incentive structure of the business that produces the product.

eddyg · 3 years ago
Not all smart meters allow unauthenticated connections.

Itron's OpenWay system, for example, has used ECC encryption for quite a while:

https://www.itron.com/pl/company/newsroom/2016/06/09/itron-r...

conk · 3 years ago
An untrusted finger can just switch the main breaker or an untrusted hammer can just smash the meter. There’s far easier ways to be destructive if you have physical access to the meter, which by default everyone is going to have because meters are required to be accessible by the public per electrical/fire/building codes.
Am4TIfIsER0ppos · 3 years ago
The whole goal of a smart meter is to allow remote access so the government can turn off your power to shed load rather than provide supply.
number6 · 3 years ago
Blaming this on any device other than the smart meter is disingenuous.

Deleted Comment

Dead Comment

rocqua · 3 years ago
> you could've done the same with any other SDR, not just the Flipper Zero.

The specialness of the flipper zero is not that it can do more than any other SDR. The specialness is how easy it is to use. The question is what you can do in that 'easy mode'.

That, in the easy mode, you can do this kind of realistic and meaningful damage is noteworthy. Because this potential is brought to the masses. It probably won't be the start of widespread SDR-based cyber-crime, but that brings it one step closer. That is why I consider this noteworthy news about the flipper zero specifically.

anilakar · 3 years ago
> The specialness is how easy it is to use.

Citation needed.

Since the advent of cheap SDRs and TI CC1100 devkits it's been a case of "grab code off Github and go do shenanigans". The only specialness here is that it's battery powered, but even previously you could have been running a laptop and HackRF in your backpack.

pftburger · 3 years ago
That said, it’s also important to demand device makers build better protections into their software (like rate limiting) in the same way they do for the hardware. Otherwise it leaves the door open for legislature trying to ban screwdrivers (tools)
salawat · 3 years ago
I hate these types of arguments, as they boil down to "I'm afraid of what you'll do with $nice_thing.

I don't want to live in a world of max pessimum.

dreamcompiler · 3 years ago
For any remotely-controllable power meter, its contactor switch should have been designed to sync with the zero crossings of the AC waveform. That would have completely prevented this damage.

I know it would have made the meter more expensive, but it was absolutely forseeable that a wild RF signal could have induced repeated contactor reclosings. They should have built it properly.

wilg · 3 years ago
I got the vibe they were treating it as a cool hacker tool not calling out the Flipper Zero. But I don't know what any of this is really. I'm just some guy!
AviationAtom · 3 years ago
Some very cool videos from lineman showing high voltage air switches opening under even a reduced load.

I think most folks don't understand electric components don't like being manipulated under a load.

diftraku · 3 years ago
At the same time, I'm in awe and in horror of seeing those high current, high voltage disconnects being opened only to end up with a few meter high arc of current jumping through the air between contacts.

I was taught the procedure of disconnecting a 10/20kV disconnect for an on-site transformer (alas, only an old one that had been decommissioned) and that thing scared the crap out of me when I first heard the spring loaded high voltage disconnect actuate.

Having a 3 meter fibreglass pole to actuate the thing, just incase, tells you there is a real risk of the thing blow up in your face, on a good day.

Deleted Comment

weare138 · 3 years ago
Exactly. They probably could have done the same thing if they just kept throwing the main breaker.

Deleted Comment

sschueller · 3 years ago
This has nothing to do with the flipper zero or any other device using the CC1101 chip. It is the responsibility of the manufacturer of such smart meters to make them safe and if they are incapable of preventing a sub $10 chip found in thousands of devices from causing catastrophic failure then who is guaranteeing me that the meter is actually counting correctly!

This is a failure of regulators and manufacturer, the media will spin it and next thing you know flipper zeros will be banned and smart meters will be as shitty as this one.

Sosh101 · 3 years ago
The biggest failure of responsibility is not requiring any form of authentication.
zirgs · 3 years ago
In my country they have been banned already.
pyrolistical · 3 years ago
How was this banned? By name? By intent?
zwirbl · 3 years ago
The flipper specifically or the way they are typically used?
Daz1 · 3 years ago
Incredible mental gymnastics
atoav · 3 years ago
If any sequence of (radio) button presses can lead to the violent destruction of your product, you are at fault.

To rate limit switching would be a no brainer here.

raverbashing · 3 years ago
No device is built for abuse like this. You could flip a switch manually multiple times and cause failure

Do you even know how much regulation exists behind meters and electrical equipment?

What's next, complaining that the meter can't handle a sledgehammer?

You call weakness I call vandalism

Same as the brats who go and do a "tiktok challenge" of robbing an easily accessible car than finding out they're not immune to handcuffs and jail cells

Edit: and while a self-protection/rate limiting would be good, this could as well as easily be turned into a denial-of-service attack by causing the switch to be off. Better than failure, sure, but still an issue.

sschueller · 3 years ago
A smart meter should be capable of noticing that it is being turned off and on over and over which could harm it.

My freaking standing desk has protection if I go up and down too much within a certain period of time.

Like I said, I have zero trust this meter is accurate when it doesn't even have simple protective circuitry.

fsh · 3 years ago
I agree that for a single meter (which for some reason is bolted to the outside of the house), the risk of vandalism is the same, whether it is remote controlled or not. However, a vulnerable wireless (or even internet-connected) meter would allow massively scaling up the attack. Taking an entire city (or even country) off the grid by flipping all the breakers would cause some serious damage.
atoav · 3 years ago
And here I am believing rate limiting remote commands is a pretty default thing to do, especially if the commands switches power under load.

Sure, this is targeted abuse, but your device should not accept unauthenticated radio input that allows destruction.

eecc · 3 years ago
Oh no, it definitely can and should. There’s absolutely no excuse for not adding a sensor or even a dumb counter to implement a simple action limiter and constrain operation with a safe envelope. It’s basic engineering
slow_typist · 3 years ago
The meter shouldn’t react to the flipper’s orders at all in the first place.
goodpoint · 3 years ago
> You call weakness I call vandalism

This is ridiculous. Manufacturers are responsible for the safety and security of their products. It's a perfectly legitimate expectation.

The meter should not accept unauthenticated commands and should have temperature protection.

mynameisvlad · 3 years ago
Turning on and off quickly is “abuse” now?

What if the electric operator’s software malfunctions and causes rapid power cycles to customers’ meters?

The end result would be the same, and it certainly wouldn’t be considered “abuse” then.

jrockway · 3 years ago
I think the law is a good second line of defense. Humans are wired to think "if I gave into that Intrusive Thought, I would suffer consequences." So that mostly keeps us in line. But, a good password and some input validation also get you pretty far; nothing is better than a computer at telling you "No!" No judge, jury, or building with bars over the windows required. Just some text in your text editor, and then if someone wants to be evil, they can't be. Pretty good.
mannykannot · 3 years ago
The denial-of-service scenario does not render the issue moot; on the contrary, it is another example of what can go wrong when these devices are not secured properly.

In general you have a point, but making these devices accessible to remote tampering is an avoidable escalation of risk with no counterbalancing upside.

teawrecks · 3 years ago
no one is saying that it should be legal to go destroy other people's stuff. if that's the message you're hearing, go back and re-read.
medellin · 3 years ago
Abuse of an unauthenticated device that anyone can walk by and do. Regulations are really working!
mtlmtlmtlmtl · 3 years ago
Found the firmware author.
aetherspawn · 3 years ago
The more media attention and crappy unauthenticated infrastructure broken, the better.

Requiring proper security in public infra creates market requirement for companies to release better, more secure, products to the public infra market. Not just whatever open radio based MVP thing they can whip up.

And that creates jobs for not just EE engineers, but as security requirements increase then it creates jobs for SW engineers also (and if the existing players are too slow, opens the market for agile startups that can do it better).

What's more, it makes our infrastructure more resilient to random RF and electronic warfare.

nextlevelwizard · 3 years ago
My bet is that they are leading with the Flipper Zero for a reason.

This shit has been broken since the beginning and enacting laws to fix this shit will be slow and expensive and many companies will be lobbying against it. Much easier to outlaw the Flipper Zero - as if that was the problem.

tgsovlerkhgsel · 3 years ago
The author of the original video (https://www.youtube.com/watch?v=kF6o9Ec4k_o) likely called it that because they're showing off what their new toy can do.

The SDR-related blog is also unlikely to have an agenda that includes getting certain types of SDRs banned.

jojobas · 3 years ago
Unfortunately even though the unprotected meter is at fault here, this is more likely to result in an SDR ban rather than getting all crappy meters fixed.
Vitamin_Sushi · 3 years ago
Interesting... I used to work on testing these old elster meters. Looking at the style number of this meter, it doesn't look like it's equipped with a disconnect relay, so at least he's not messing with that (even if a meter was equipped with a disconnect relay, the meter display should still be on during a disconnect event). I suspect he's cutting power to something other than the meter itself. I also see it's equipped with an energy axis (elster proprietary wireless network) so at the very least he'll be getting a fun visit from his power company wondering why he tripped various tamper detect flags in the meter (assuming his power company is actually ameren, a utility company in Missouri and Illinois and not canada like his yt profile says...). Since it also has that radio, I know it should also be encrypted. Unless that specific power company disabled LAN/WAN encryption... which we generally don't recommend and Canadian power infrastructure is pretty strict anyway when it comes to meter security. I'd be interested to see what exactly the flipper was communicating with (I'm sure my upper management would be even more interested as well).

edit: I also just noticed the meter is stuck in test mode and the backup battery is missing. You can actually buy these meters on ebay, which is what I'm suspecting this guy did.

jacquesm · 3 years ago
The smart meter should have had better security. But the device isn't designed to switch heavy loads repeatedly, this is only meant to be used sporadically as an emergency cut-off (for instance, in case of a fire or if the customer is permanently disconnected for some reason). In case of a fire nobody cares about whether or not the smart meter survives. In case of a disconnect for administrative reasons the disconnect usually happens at night to minimize the risk of arcing.

Keep in mind that your typical electrical service is 10's of KW and that switching that kind of power repeatedly under load requires a device that is essentially sacrificial in nature. Now let's see what they charge you for that meter replacement, it's not going to be cheap.

Note that the meter isn't yours to mess with, it is in your house and on your property but from an administrative perspective your stuff starts after the mains cutoff which is downstream from the smart meter. Anything before that including the mains cutoff is the property of whoever manages the local network, either a specialized grid operator or the utility company that sells you the power. You can see which way it works by looking at your electricity bill and by whether or not you call your utility when there is a problem with the local grid or the network operator. Where I live these are separate legal entities, but in some places it is just the one.

Finally: don't mess with the grid, it's a shared resource. It is trivial to cause damage by for instance injecting power at higher voltage levels than the appliances in the houses around you can deal with, blowing up a meter before your ability to cut off can have very unpredictable effects. In theory it is all safe and it should be able to withstand some abuse but in practice older networks still exist and not all of them are equally robust. So just don't.

iudqnolq · 3 years ago
Companies are remotely turning off meters for billing reasons when that isn't completely safe? They're just hoping and assuming if they do it at night there won't be much load? That doesn't sound very reassuring.
jacquesm · 3 years ago
Name one instance where this led to a problem.

Utilities are - if anything - usually quite responsible and if they mess up they are liable for any damage they cause.

bdavbdav · 3 years ago
I'd argue that the load is partially to blame as well for not soft-starting, like most ACs do.
jacquesm · 3 years ago
Yes, but in that case the disconnect in the smart meter stays closed continuously.
randunel · 3 years ago
The apartment buildings in my area all have wireless gas leak detectors, this video makes me want to take out my HackRF and start experimenting with mine.

Flipper Zero isn't what's causing this, the bad "smart" devices are, and the culprits themselves, of course. Just because you can hack a system, doesn't make it legal. Know your local laws. Mine says "accessing any IT system without authorisation is punishable with imprisonment from 3m to 3y; accessing the aforementioned system with the purpose of obtaining data is punishable with imprisonment from 6m to 5y.", vague enough for all of these things.

Demmme · 3 years ago
Black hat vs white hat.

As soon as I would discover I could do that, I would inform the company not some scritkiddies on the internet.

This is just irresponsible

TeMPOraL · 3 years ago
> This is just irresponsible

And reporting to the vendor is suicidal. At least assuming the stories I hear about vulnerability disclosures are representative, which I think they are.

In their place, if I were to inform the company, I'd do it anonymously. If it was an actually important issue - as this very much looks like - I'd consider informing the building manager, HOA, the gas installation company they use, and every local journalist, all together so they know about each other - and then CC that to the vendor.

nextlevelwizard · 3 years ago
How often have we seen good intentions be punished?
knorker · 3 years ago
I don't think that's what "self" destructs means.

You can't self destruct something else. You can only self destruct yourself.

planb · 3 years ago
Came here to write this. What a bad headline. And it makes it sound like Flipper Zero is unintentionally doing something wrong here.
_fizz_buzz_ · 3 years ago
It self destructs in the sense that no external force was applied to it.
dismalpedigree · 3 years ago
Technically the radio waves provide force, even if it is infinitesimally small
globular-toast · 3 years ago
I thought the same. I think they probably meant "causes meter to self-destruct". Whether that's true or not depends on whether the functionality was used correctly. It's definitely possible to destroy a device by abusing "permitted" inputs. For example, revving a cold petrol engine will eventually ruin it. In that case the title should really be "guy destroys meter (using a Flipper Zero)".
praseodym · 3 years ago
In The Netherlands, functionality to remotely disable smart meters is forbidden by law to protect from (large scale) cyber attacks. Seeing how poor the security on this specific meter is, it only confirms that this was a great decision.