CISA Insights TLP White: Mitigating Attacks Against Uninterruptible Power Supply Devices
The Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Energy are aware of threat actors gaining access to a variety of internet-connected uninterruptible power supply (UPS) devices, often through unchanged default usernames and passwords. In recent years, UPS vendors have added an Internet of Things capability, and UPSs are routinely attached to networks for power monitoring, routine maintenance, and/or convenience. UPS devices provide clean and emergency power in a variety of applications when normal input power sources are lost. Loads for UPSs can range from small (e.g., a few servers) to large (e.g., a building) to massive (e.g., a data center). Various different groups within an organization could have responsibility for UPSs, including but not limited to IT, building operations, industrial maintenance, or even third-party contract monitoring service vendors.
RECOMMENDED ACTIONS
- Immediately enumerate all UPSs and similar systems and ensure they are not accessible from the internet. In the rare situation where a UPS device or similar system’s management interface must be accessible from the internet, ensure that compensating controls are in place, including:
- Ensure the device or system is behind a virtual private network.
- Enforce multifactor authentication.
- Use strong, long passwords or passphrases in accordance with (for a humorous explanation of password strength, see ).
- Check if your UPS’s username/password is still set to the factory default. If it is, update your UPS username/password so that it no longer matches the default. This ensures that going forward, threat actors cannot use their knowledge of default passwords to access your UPS. Your vendor may provide additional guidance on changing default credentials and/or additional recommended practices.
- Ensure that credentials for all UPSs and similar systems adhere to strong password length requirements and adopt login timeout/lockout features.
INCIDENT RESPONSE
- If your organization is impacted by an incident or suspected incident: Implement your cyber incident response plan. See CISA’s for incident response practices and operational procedures.
- Follow guidance on in the joint Cybersecurity Advisory by CISA and the cybersecurity authorities of Australia, Canada, New Zealand, and the United Kingdom.
- Report incidents or anomalous activity immediately to CISA’s 24/7 Operations Center at report@cisa.gov or 888-282-0870.
ADDITIONAL RESOURCES
- See CISA’s e for additional actions to take now to defend against malicious cyberactivity.
- Refer to CISA’s for additional recommendations on managing cybersecurity risks.
- See for additional best practices to help companies understand their risks and prepare for cyber threats.
- See Cybersecurity Advisory: for more guidance specific to organizations supporting U.S. critical infrastructure.
- See CISA’s webpage for more information on CISA’s no-cost assessments to help organizations evaluate their operational resilience and cybersecurity practices.
View the detailed report below.
Act Now
Mitigate attacks against UPS devices by immediately removing management interfaces from the internet.
For help with Cybersecurity and Risk Advisory Services exclusively for AHA members, contact: